Changes between Version 182 and Version 183 of doc/FAQUnanswered


Ignore:
Timestamp:
Apr 23, 2010, 10:49:25 AM (9 years ago)
Author:
trac
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • doc/FAQUnanswered

    v182 v183  
    7777'''How does tor relate to ipv6 and how should typical applications handle ipv6 if they use tor (or tor via Privoxy)?'''
    7878
     79
     80---- /!\ '''Edit conflict - other version:''' ----
    7981Like a dog talking to a quasar... I never was good with similes.
    8082
     
    8486
    8587Privoxy? Same as currently, if it handles it..
     88
     89---- /!\ '''Edit conflict - your version:''' ----
     90
     91---- /!\ '''End of edit conflict''' ----
    8692
    8793'''What version of libevent should I be using?'''
     
    152158'''Can anonymity be broken if all Tor servers in the chain are compromised/malicious and so are keeping logs to trace the chain?'''
    153159
     160
     161---- /!\ '''Edit conflict - other version:''' ----
     162
     163---- /!\ '''Edit conflict - your version:''' ----
     164Yes. Indeed, if all the servers in a circuit are compromised then they need not even be communicated with.. the entry node can decipher for all the (possibly even non-existent) nodes. In order to maintain a superficial view of anonymity, it would probably be good to forward it to the exit server however.
     165
     166---- /!\ '''End of edit conflict''' ----
    154167
    155168'''What system resources does a TOR server use?  The FAQ already dicusses memory a bit.  What about CPU?  Encryption is CPU-intensive.  Specific question I'd like answered: I'll be setting up a TOR node bandwidth-limited to about 256kbps (half my upstream bandwidth).  Will an old 300MHz G3 Mac easily handle this, or will a faster processor be needed? How 'bout a P90?  Presumably, TOR's disk usage and I/O is minimal.''' (Votes: 1)