Delivery-Date: Mon, 06 Oct 2014 15:06:42 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 2A0CD1E0DA2;
	Mon,  6 Oct 2014 15:06:41 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 2EFA9309A1;
	Mon,  6 Oct 2014 19:06:37 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 90765303E2
 for <tor-talk@lists.torproject.org>; Mon,  6 Oct 2014 19:06:33 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 8bxnMyM8q2yq for <tor-talk@lists.torproject.org>;
 Mon,  6 Oct 2014 19:06:33 +0000 (UTC)
Received: from atl4mhob06.myregisteredsite.com
 (atl4mhob06.myregisteredsite.com [209.17.115.44])
 by eugeni.torproject.org (Postfix) with ESMTP id 658032C040
 for <tor-talk@lists.torproject.org>; Mon,  6 Oct 2014 19:06:33 +0000 (UTC)
Received: from mailpod.hostingplatform.com ([10.30.71.209])
 by atl4mhob06.myregisteredsite.com (8.14.4/8.14.4) with ESMTP id
 s96J6TGe027012
 for <tor-talk@lists.torproject.org>; Mon, 6 Oct 2014 15:06:29 -0400
Received: (qmail 15547 invoked by uid 0); 6 Oct 2014 19:06:29 -0000
X-TCPREMOTEIP: 162.17.205.153
X-Authenticated-UID: datzrott@alizeepathology.com
Received: from unknown (HELO ALPATH26)
 (datzrott@alizeepathology.com@162.17.205.153)
 by 0 with ESMTPA; 6 Oct 2014 19:06:29 -0000
From: "Derric Atzrott" <datzrott@alizeepathology.com>
To: <tor-talk@lists.torproject.org>
References: <N1-5MCoZ9YQJd@Safe-mail.net>
In-Reply-To: <N1-5MCoZ9YQJd@Safe-mail.net>
Date: Mon, 6 Oct 2014 15:06:29 -0400
Organization: Alizee Pathology LLC.
Message-ID: <00f501cfe198$a2888bd0$e799a370$@alizeepathology.com>
MIME-Version: 1.0
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQHp3MIj9WNLHsmMUdRsFtAmDZfUe5vvdufw
Content-Language: en-gb
Subject: Re: [tor-talk] isp monitoring tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> How difficult would it be for an ISP to monitor your Tor activity from the
> modem and determine what sites you visit? 
> 
> I only need to know if it would be very hard, impossible, or very possible to
> do. If it's possible what technique would they use?

I tend to agree with the other response that more information is needed to
really answer this question well, but generally speaking, if you are using Tor
correctly, your ISP should only know that you are using Tor, not what you are
doing with Tor.

The ISP of the exit relay that you end up using will know someone is visiting
these website using Tor, but not who.

If you use a Tor bridge, then it should be much harder for your ISP to tell
that you are using Tor.

https://www.torproject.org/download/download#warning
/\ You should give these a read if you haven't already.

Thank you,
Derric Atzrott
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFUMugvRHoDdZBwKDgRAg/yAJ93JkaX3RkoZx2nZp9AzAG7X5LfMQCgmnjI
NySWSIQwyjeaqPsHnHhlfkU=
=emCe
-----END PGP SIGNATURE-----

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

