Comment Re:My thoughts on Tor. (Score 2, Insightful) 139
You're misunderstanding the protocol. The purpose is to anonymize connections versus content.
An example scenario: a US intelligence agent may need to contact an agency server from within a foriegn country. Anyone sniffing packets would notice that a user is connecting to a server at www.someagency.mil, even if the content itself was encrypted. Tor anonymizes the connection, as the agent now connects to one of any number of Tor nodes. Tor uses encryption to protect route and address information, not content. It should be used in conjunction with another strong encryption protocol (SSL etc.).
An example scenario: a US intelligence agent may need to contact an agency server from within a foriegn country. Anyone sniffing packets would notice that a user is connecting to a server at www.someagency.mil, even if the content itself was encrypted. Tor anonymizes the connection, as the agent now connects to one of any number of Tor nodes. Tor uses encryption to protect route and address information, not content. It should be used in conjunction with another strong encryption protocol (SSL etc.).