2

Just wondering if http://www.tcpcrypt.org/ would be useful to add? Also is there any work being done to replace/add encryption at the ODI level?

Jens Kubieziel
  • 8,630
  • 5
  • 35
  • 116
Hueristic
  • 37
  • 2

2 Answers2

4

This isn't a good idea.

  1. TCPCrypt is, and I can't stress this enough, absolute trash.
    • It provides no protection against an active MITM attacker, it's not authenticated.
  2. The remote party too must support TCPCrypt, otherwise it won't work.
    • Any remote party could just use TLS or an onion service and gain greater protection than that offered by TCPCrypt.

Tor cannot magically add crypto to traffic after leaves the network, it absolutely must be the responsibility of applications sending data over Tor to apply appropriate levels of cryptography to their communications, there is no alternative.

cacahuatl
  • 11,047
  • 2
  • 17
  • 39
1

No it does not. Tor makes your "request->destination" chain to be private, at the exit node traffic is released "as-is", no modifications

Alexey Vesnin
  • 6,385
  • 3
  • 15
  • 36