Delivery-Date: Sun, 21 Sep 2014 20:52:59 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,FREEMAIL_FROM,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 1D4B41E0B6F;
	Sun, 21 Sep 2014 20:52:58 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A0C952BA04;
	Mon, 22 Sep 2014 00:52:52 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 6D5C52B9FF
 for <tor-talk@lists.torproject.org>; Mon, 22 Sep 2014 00:52:48 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id NAUYn3aYc8zc for <tor-talk@lists.torproject.org>;
 Mon, 22 Sep 2014 00:52:48 +0000 (UTC)
Received: from SNT004-OMC3S11.hotmail.com (snt004-omc3s11.hotmail.com
 [65.55.90.150])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 39D2E2B9E7
 for <tor-talk@lists.torproject.org>; Mon, 22 Sep 2014 00:52:48 +0000 (UTC)
Received: from SNT146-W35 ([65.55.90.137]) by SNT004-OMC3S11.hotmail.com with
 Microsoft SMTPSVC(7.5.7601.22724); Sun, 21 Sep 2014 17:52:45 -0700
X-TMN: [XAfABQ4I+efPQJlD3blJD/c7AI6NVox8]
X-Originating-Email: [chewy0914@hotmail.com]
Message-ID: <SNT146-W3595EA58B7FA3F2D856E5BA3B30@phx.gbl>
From: Ben Healey <chewy0914@hotmail.com>
To: "tor-talk@lists.torproject.org" <tor-talk@lists.torproject.org>
Date: Sun, 21 Sep 2014 18:52:45 -0600
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 22 Sep 2014 00:52:45.0419 (UTC)
 FILETIME=[85BD5BB0:01CFD5FF]
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: [tor-talk] Security of Tor Like Services With Or Without Tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

So, 
I'm wondering Tor securely covers what's been done on the computers over a network right?
Why is it not secure and why does it need to be secured?
????
Others won't know what's going over the network?
Tracking all encrypted data from point a-point-b? Does this still allow tracking?
What could would happen if all the data was completely accessible and viewable by the public?
In a different form? Has this been tried?

Example: 
Copy of the clear web on the onion network? 
One page or combo of pages can create from data collusion a different web page?
Software/hardware on the user side with a way to comb and collect data from sites?
Inside programmed parameters?  All info/pictures/text/other is data?
Could take a set of 11111111111111 and combine it with 000000111111, 0011111111000 or anything to
create any information.

So In the onion network or without one would it not be possibly more secure to make the data so it has to be complied with a key on the user side so any data intercepted if any would only be random data(or webpage/other) if decrypted and could create 10,000+ possible output of any and every kind so that there could be very low chance of being able to say someone accessed a or b with the server hosting 10,000 sites(not hosting any output version of the site/info at all) that are normal and maybe 1-2 versions that are secret or whatever?


 		 	   		  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

