Security Basics mailing list archives

RE: Anonymizing Packets yet ensuring 0 % packet loss


From: "Strykar" <str () hackerzlair org>
Date: Fri, 28 Sep 2007 04:15:55 +0530

There is no such problem with TOR, the only problem here is that, it
doesn't solve my purpose. 

Is this still about breaking into a college network?
It's Tor, not TOR.
Ask and ye shall receive. What is this "purpose" and its underlying problem
that you're facing? 


I am looking into the technology which TOR
has been built on.  I am trying to understand the technology of
tunneling connections from a root machine to many machine (technology
which developers of TOR has implemented in a great way), my
requirement is something simliar but i would want it to serve my
requirements in an intranet & a secured environment...

Don't patronize the Tor developers, read Tor's documentation. You can use
Tor to implement onion routing in an Intranet, this has been documented to
death. 


Any suggestion about the technology & any simiat tools that you all
have tried & tested before!!
I am anxious to work on this front to solve the mystery...

There is no onion routing/anonymizing network as thoroughly tested as Tor.
You're attempting to re-invent the wheel.
Be specific. Describe an end to shed light on the means.


- S



On 9/27/07, Brett Cunningham <cssniper22 () gmail com> wrote:
Can you be more specific at why TOR isn't working for you? Need
details of what you don't care for about it.


Current thread: