Reply
Thread Tools
Posts: 47 | Thanked: 10 times | Joined on Jan 2008 @ UK
#1
Just a quick question, I was wondering if any one had tried to get Tor (www.torproject.org) working on there N800? As I am interested in running Tor and maybe later on down the line a Tor end node. An don't want to reinvent the wheel if some one out there has already done it.
Thanks
 
Posts: 178 | Thanked: 40 times | Joined on Aug 2007 @ UK
#2
Have you checked out some of the rumours(?) about Tor nodes?
 
free's Avatar
Posts: 739 | Thanked: 159 times | Joined on Sep 2007 @ Germany - Munich
#3
Which rumor? I'm curious?
Tor set you a better anonymity, not privacy. Keep this in mind!!

And if you're talking about MiTM attack, just take care if you get a certificate popup warning arriving.
 
Posts: 333 | Thanked: 32 times | Joined on Jul 2007
#4
Originally Posted by muki View Post
Have you checked out some of the rumours(?) about Tor nodes?
Maybe that why he wants to run a Tor End-Node

===================

Lol, I'd love to see if you could run the Tor End-Node Service on the N800.....
And before you point out it's a crazy idea, I'd do it for the same reason I installed Windows 3.11 under DosBox....
 
free's Avatar
Posts: 739 | Thanked: 159 times | Joined on Sep 2007 @ Germany - Munich
#5
I hope he doesn't want to run a tor end-node on the n800
 
brendan's Avatar
Posts: 531 | Thanked: 79 times | Joined on Oct 2006 @ This side of insane, that side of genius
#6
your best bet is to run privoxy (or another socks4a proxy) and tor together on a full pc. leave the port for privoxy (8119) exposed and set the proxy on the n800 to the ip and port of the pc. i have this running at home. it works very well for my needs.
__________________
Nokia n800
OS 2008
Pharos iGPS 360-BT
ElmScan 5 BlueTooth
BlackBerry Bold (9000)
AT&T Wireless
 

The Following User Says Thank You to brendan For This Useful Post:
Posts: 178 | Thanked: 40 times | Joined on Aug 2007 @ UK
#7
I don't have links at hand as I read this stuff several months ago. I'm also no expert (no dummy either :-) ) but what I read at them time was enough to stop me from considering using Tor. IIRC many end-nodes are hosted by dodgy outfits (us/ru) who can exploit your connection in some way. Maybe FUD, I don't know, but no harm in checking around before risking anything.
 
Posts: 47 | Thanked: 10 times | Joined on Jan 2008 @ UK
#8
muki: Yer I am aware about what happens when people don't use Tor for what it is made for. People seem to mix it up as a secure way of transmitting data, but the last hop from the Tor endnode to the destination is send in plain text meaning all end nodes can sniff your data if you do not use some end to end encryption.

BOFH: That is part of the reason yes, I have been carrying out tests with Tor for abit now an wanting to see how portable this can be. A roaming Tor endnode in a university with there high speed connection should gather more traffic BUT would also like to have the use of tor when I need to be seen coming from another location an don't have a good proxy at hand

free: yer I do want to run one on the n800, it would not be running full time like
brendan: Thanks for that, I will set that up at home anyway.

muki: Yer I know what ya mean some of these Tor endnode are hosted on very VERY costly servers that have a dam site lot of traffic pass through them an like you said hosted by some very shady charectors.
 
free's Avatar
Posts: 739 | Thanked: 159 times | Joined on Sep 2007 @ Germany - Munich
#9
A collegue is hosting a tor endnode on a hosted server for 30 euros/month.
But he stopped it after several TBytes.. probably after a few days only.

And the dodgy end-node that was doing MiTM attack was located in .. germany
 
Posts: 47 | Thanked: 10 times | Joined on Jan 2008 @ UK
#10
Originally Posted by free View Post
A collegue is hosting a tor endnode on a hosted server for 30 euros/month.
But he stopped it after several TBytes.. probably after a few days only.

And the dodgy end-node that was doing MiTM attack was located in .. germany
Well one of them where in Germany. I think you will find there has been others. An as for the other people who are not preforming MiTM still can be doing bad stuff with your data, I mean any one can set up a server, and a sniffer on a pc all they have to do is leave it run an set some filters for interesting traffic such as stuff that is plain text comes from .gov or .mil. It could be a simple filter to grab all http traffic then session hijacking can be preformed with the cookies ( if they are still active ) also some sites send user / password credentials in plain text when logging in, or send in the cookies themselves, these can be grabbed as well. Hmm I have probably missed some stuff like but im sure you get the idea.
 
Reply

Thread Tools

 
Forum Jump


All times are GMT. The time now is 19:34.