Silk Road forums
Discussion => Security => Topic started by: Heyenezz on January 24, 2012, 03:57 am
-
Suppose I run Tor through my own bridge on another computer.
How easy would it be to know what I was doing, which sites I was visiting, and whether I was using Tor?
How greatly wold my security along these 3 dimensions be compromised if one gained access to the computer running the bridge?
Thanks for help.
Edit--Here's a thread about bridge security: http://dkn255hz262ypmii.onion/index.php?topic=9272.0;topicseen