Am 28.02.2015 um 16:40 schrieb Lew Wolfgang:
On 02/28/2015 03:56 AM, Peter wrote:
Of course, since the hops in the network and the exit node might squeeze the bandwidth, trying to watch such media content might work better at some times than others. But if you were using the Tor Browser Bundle with its default restricted settings, you'd likely not be able to view such media at all. Point being, people use Tor for all sorts of reasons, not just for absolute anonymity/privacy.
I heard that Tor doesn't offer "absolute anonymity/privacy" in some cases. It's apparently possible for state-level actors to analyze Tor entry/exit node traffic to track connections. I can't offer more, I just heard it in passing.
See here for TOR's weaknesses: https://en.wikipedia.org/wiki/Tor_(anonymity_network)#Weaknesses In a nutshell, no technology is perfect. If you use TOR on websites that use HTTP (non-encrypted sites), then anyone on the way can read every single byte that goes over the wire. If you want to stay anonymous via TOR and then go to your favorite pr0n site which doesn't support https and log in there, then you've identified yourself to some extent. That's not a TOR problem as such. More about browser fingerprinting: https://en.wikipedia.org/wiki/Device_fingerprint Regards, -- Aaron "Optimizer" Digulla a.k.a. Philmann Dark "It's not the universe that's limited, it's our imagination. Follow me and I'll show you something beyond the limits." http://blog.pdark.de/ -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org