They will know that you are using Tor, but not what you are doing with Tor.
Check this nice overview: https://www.eff.org/pages/tor-and-https You can click the buttons and see what everyone knows about you. On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl <marcosk...@hotmail.com> wrote: > > > > Hello experts! > TAILS, running by usb stick, protect me against forensics tecnics in my pc. > Ok. > TOR, running as a client only or as a relay, protect (theoretically) my > privacy. Ok. > But... if my static IP, provided by my ISP, is under surveillance by a legal > requirement, what kind of data they can sniff? > > I mean, my connection looks like a simple HTTPS, or they know I am diving > into the Deep Web, "hacking the world"? Could the ISP capture the downloads > dropping into my pc when running TAILS? > If so, TOR Socks (proxy + TOR) is the pathway to deceive and blindfold my ISP? > > https://www.torproject.org/docs/proxychain.html.en > > Thanks. > > Marcos Kehl (Brazil) > > > > > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk