Hello fellow autodidacts!
I've been reading up on proxy chains and tor routing and find it very interesting, as well as maybe just a little confusing.
I understand the general principle behind both methods, with Tor's onion protocol and proxychaining to reroute traffic via a proxy server, so my question is:
1) I've heard that who ever "owns" the exit nodes of a tor network can view all the traffic in and out. What exactly are exit nodes, and how would someone, say the NSA or FBI, find them in order to view the traffic? And does encrypted traffic stop them from actually viewing the content?
2) Does proxy chaining first through the Tor network then via a anonymous proxy reduce the risk of anyone intercepting the data?
I've launched a kali linux vm, installed tor and started the services, configured the proxychains.conf file to point to Tor then to a russian anonymous proxy as a test. I've then run several test and all show my IP as the Russian proxy, which is good (i hope). I understand that if someone were to gain access to the russian proxy, or if the proxy were to give anyone their logs, they would see the IP before it hits the proxy, so would routing through Tor first prevent the traffic being traced back?
Thank you!
Comments
No Comments Exist
Be the first, drop a comment!