[jitsi-users] chatting with Jitis using TOR - configuration?


#1

Dear All,
I want to use Jitsi to chat via the TOR network.
Can somebody send infos how to configure Jitsi (proxy etc) that the chat
will go via TOR? On my Macbook the vidalia package is installed and running.

thx a lot in advance!
Mr.Smith


#2

Tell jitsi to use socks5 port 9050. Use 127.0.0.1 for the server.

Tor only supports TCP. Most VOIP assume UDP. chatting via tor generally
works fine.

voice and video calls are wholly dependent upon the tor circuit at the
moment of initiation. Sometimes it works well. Sometimes you're routed
through a node on mobile 3G and it is horrible.

···

On Tue, 30 Oct 2012 19:59:46 +0100 "Mr.Smith" <mr.smith476@googlemail.com> wrote:

I want to use Jitsi to chat via the TOR network.
Can somebody send infos how to configure Jitsi (proxy etc) that the
chat will go via TOR? On my Macbook the vidalia package is installed
and running.

--
Andrew


#3

It's too slow and unreliable. First hand testing out of interest, it's
just not going to work. Calls are just broken up. Use the pirate bay
VPN if your insistent on obscuring, that works better. No worse off
since your trusting a known entity rather than an unknown endpoint.

Pete

···

Sent from my iPad

On 30 Oct 2012, at 21:00, "Mr.Smith" <mr.smith476@googlemail.com> wrote:

Dear All,
I want to use Jitsi to chat via the TOR network.
Can somebody send infos how to configure Jitsi (proxy etc) that the chat
will go via TOR? On my Macbook the vidalia package is installed and running.

thx a lot in advance!
Mr.Smith


#4

since your trusting a known entity rather than an unknown endpoint.

MUCH worse, thats the whole point about Tor: you are not trusting anybody.

But otherwise you are right: the Tor network was not made for videochat
(eventhought i think that audio might work as it uses alot less
bandwidth)(never tried any option, so its just theoretical) but you can
use it for chatting of cause.

Additionaly you need to take care that you do no leak private
information when connected throught tor, otherwies you could be
identified, if you just want to circumvent a firewall this is not the case.

0x220B25CA.asc (3.84 KB)

···

--
Yannik Völker


#5

You ate trusting your immediate exit on tor.

···

Sent from my iPad

On 30 Oct 2012, at 23:03, "Yannik Völker" <yannikv@yahoo.de> wrote:

since your trusting a known entity rather than an unknown endpoint.

MUCH worse, thats the whole point about Tor: you are not trusting anybody.

But otherwise you are right: the Tor network was not made for videochat
(eventhought i think that audio might work as it uses alot less
bandwidth)(never tried any option, so its just theoretical) but you can
use it for chatting of cause.

Additionaly you need to take care that you do no leak private
information when connected throught tor, otherwies you could be
identified, if you just want to circumvent a firewall this is not the case.

--
Yannik Völker
<0x220B25CA.asc>


#6

Replace "immediate exit on tor" with ISP, hosting chat server, remote
servers, all ISPs in the path, and other participants in the chat and
the risk is the same.

Use protocol encryption and OTR/ZRTP and the network is irrelevant.
Thankfully, jitsi has OTR/ZRTP, which have worked everytime.

···

On Tue, 30 Oct 2012 23:27:56 +0200 Peter Allebone <allebone@gmail.com> wrote:

You ate trusting your immediate exit on tor.

--
Andrew


#7

You ate trusting your immediate exit on tor.

No, you are not, the exit node has no idea who you actualy are because
there are 2 PCs in between and the "entrance" node has no idea where you
are heading or what you are sending/reciving because its encrypted with
a key he does not know.

0x220B25CA.asc (3.84 KB)

···

--
Yannik Völker


#8

I don't think tor provides encryption so I'm not sure what you mean.

Pete

···

Sent from my iPad

On 31 Oct 2012, at 00:18, "Yannik Völker" <yannikv@yahoo.de> wrote:

You ate trusting your immediate exit on tor.

No, you are not, the exit node has no idea who you actualy are because
there are 2 PCs in between and the "entrance" node has no idea where you
are heading or what you are sending/reciving because its encrypted with
a key he does not know.

--
Yannik Völker
<0x220B25CA.asc>


#9

I don't think tor provides encryption so I'm not sure what you mean.

Tor does encrypt the trafic while its inside the network, beginning from
your computer untill it leaves the exit-node.

0x220B25CA.asc (3.84 KB)

···

--
Yannik Völker