Delivery-Date: Thu, 24 Jul 2014 13:57:14 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,URIBL_BLACK autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 8AA401E0DAC
	for <archiver@seul.org>; Thu, 24 Jul 2014 13:57:11 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 9142D2E438;
	Thu, 24 Jul 2014 17:57:10 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 15A922E752
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 17:52:04 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id yjF-wwDvoNrc for <tor-talk@lists.torproject.org>;
 Thu, 24 Jul 2014 17:52:04 +0000 (UTC)
Received: from outbound.mailhostbox.com (outbound.mailhostbox.com
 [162.222.225.19])
 by eugeni.torproject.org (Postfix) with ESMTP id E43962E4CA
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 17:52:03 +0000 (UTC)
Received: from [0.0.0.0] (tor-exit0-readme.dfri.se [171.25.193.20])
 (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits))
 (No client certificate requested)
 (Authenticated sender: s7r@sky-ip.org)
 by outbound.mailhostbox.com (Postfix) with ESMTPSA id 65F38638EA6
 for <tor-talk@lists.torproject.org>; Thu, 24 Jul 2014 17:52:00 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sky-ip.org;
 s=20110108; t=1406224323;
 bh=JGBgJm1hD7FHYIYubSZTy6IZ/LOv9owAn50sTQtNIMg=;
 h=Message-ID:Date:From:Reply-To:MIME-Version:To:Subject:References:
 In-Reply-To:Content-Type:Content-Transfer-Encoding;
 b=BF5OaE7CTACZgSf5hYh0kUHHXYQUd/77l4aHgAV2PN6Vvaz/nDNkSfTgOF6JIeDTj
 hfq6FF6FuUt2dIJAzVVeUe5nR1NdhZnQDXBYW42Vur66VvnCgUpxRemf5Y8QYtGcFp
 3JHVhLcIwjH/lWAsVRw6Ow4uVfWyKDJdOv0BwqvA=
Message-ID: <53D147B6.90701@sky-ip.org>
Date: Thu, 24 Jul 2014 20:51:50 +0300
From: s7r <s7r@sky-ip.org>
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64;
 rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <BAY172-W52A94F1218C97E454879DAC4FF0@phx.gbl>
In-Reply-To: <BAY172-W52A94F1218C97E454879DAC4FF0@phx.gbl>
X-Enigmail-Version: 1.6
X-CTCH-RefID: str=0001.0A020202.53D147C0.0201, ss=1, re=0.000, recu=0.000,
 reip=0.000, cl=1, cld=1, fgs=0
X-CTCH-VOD: Unknown
X-CTCH-Spam: Unknown
X-CTCH-Score: 0.000
X-CTCH-Rules: 
X-CTCH-Flags: 0
X-CTCH-ScoreCust: 0.000
X-CTCH-SenderID: s7r@sky-ip.org
X-CTCH-SenderID-TotalMessages: 1
X-CTCH-SenderID-TotalSpam: 0
X-CTCH-SenderID-TotalSuspected: 0
X-CTCH-SenderID-TotalBulk: 0
X-CTCH-SenderID-TotalConfirmed: 0
X-CTCH-SenderID-TotalRecipients: 0
X-CTCH-SenderID-TotalVirus: 0
X-CTCH-SenderID-BlueWhiteFlag: 0
X-Scanned-By: MIMEDefang 2.72 on 172.18.214.134
Subject: Re: [tor-talk] ISP surveillance.
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 7/24/2014 8:24 PM, Marcos Eugenio Kehl wrote:
> 
> 
> 
> Hello experts! TAILS, running by usb stick, protect me against
> forensics tecnics in my pc. Ok. TOR, running as a client only or as
> a relay, protect (theoretically) my privacy. Ok. But... if my
> static IP, provided by my ISP, is under surveillance by a legal
> requirement, what kind of data they can sniff?
> 
> I mean, my connection looks like a simple HTTPS, or they know I am
> diving into the Deep Web, "hacking the world"? Could the ISP
> capture the downloads dropping into my pc when running TAILS? If
> so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold
> my ISP?
> 
> https://www.torproject.org/docs/proxychain.html.en
> 
> Thanks.
> 
> Marcos Kehl (Brazil)
> 
> 
> 
> 
> 

Hi

it is irrelevant if your IP is static or dynamic - the ISP has that
data tied to a broadband internet access account so they know it's you
either way, regardless your IP type.

Using Tor will encrypt your data totally with multiple layers, this
means that your ISP can see that you are using Tor, and nothing more.
They can't see what sites you visit, what data you download,
intercept, modify or alter the data you download, can't see if you are
accessing hidden services and what hidden services, etc. Bottom of the
line, your ISP can see you are using Tor and that's all, nothing more.
Using Tor is not a felony under any circumstances.

If you don't want your ISP to learn you are using Tor, you can choose
to connect to the Tor network via an obfuscating bridge (make sure you
choose obfs3 pluggable transport) and in this case your ISP won't even
see that you are using Tor, it will see obfuscated random traffic,
inconclusive traffic.

Go to https://bridges.torproject.org/ fetch your obfs3 bridges and put
them in your torrc for Tor Browser or at startup when booting Tails do
not select "This computer's connection is free of obstacles", choose
to enter a bridge, and enter your bridge previously fetched from
https://bridges.torproject.org/


- -- 
s7r
PGP Fingerprint: 7C36 9232 5ABD FB0B 3021 03F1 837F A52C 8126 5B11
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJT0Ue2AAoJEIN/pSyBJlsRjK0IAMUBgChpviniaGvNdY5iglO+
I7fXusrzlHJVRX5NXgUzL0bWiSgPFI8yl+mHzR1nGp+MkiC0x8doZaUFBeaJ2/tC
vGYDl/UhZJiZhmJtcO7aF5Jp2MhtAThXK1ddHUbusBt4iy8tqCT0OCD0+QkVsA3R
s5vWzMWEtxzYvqolVT6nA+Ru4HQhvx67ovePwCiYQhKEi67IxchpJGGCPV9gL9M8
FDo+xfR064OZeDmi/vgrNQxSt69XMz5pMbU40isCsbM9bIZZzEZUExS8Kcr0C3w+
CKlnG1iMNoG8q8TNm4cedsmPDiEuX0WzdYeCUxgXTvzCBO7EIyVnwQTXafBslKw=
=RVtG
-----END PGP SIGNATURE-----
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

