we always hear about torrifying things in the the distro, but i had question on Tor Design:
Lets say im living in US , and i want to use whonix,tails…etc:
* = Tor relays
a,b,c = tor nodes as guardian,middle,exit
zz,zgl = connection fingerprint
so me using Tor Browser to visit Signal website:
zzUS → a*Canada → b*France → c*Austria → signal.org (located in US) tagged as zz (lets say zz is the tag for tor browser)
on the same time i have downloaded/using signal:
(since we are using the same running Tor)
zglUS → a*Canada → b*France → c*Austria → signal.org (located in US) tagged as zgl (lets say zgl is the tag for Signal application)
now if Tor doesnt make new hops for each connection that an application connecting to it = my connection through Tor relays is very predictable/distinguishable.
if Tor does take each connection to it with a different path then that solve the issue, if not then connecting applications with one tor connection (like one GW) not really good idea.
Alternatively:
I2P does take each and every connection with new Tunnel.
Havent check what GNUnet is doing for this issue.
Note: my question above is not sure if Tor taking everything into one path or not.
So you’re asking if stream isolation is guaranteed?
If so, it isn’t. That feature wasn’t in Tor from the start, but it’s relied on now. See the torrc man page for the SOCKSPort isolation flags IsolateClientProtocol, IsolateDestPort, and IsolateDestAddr. It’s my understanding you can also use different SOCKSPorts to isolate streams as well.
If that wasn’t what you wanted to know, try asking your question differently. It’s hard to understand the way you put it.
For question two: Multiple gateways are going to use different guard nodes, that’s kind of against the design of Tor. I think Whonix’s stance is that multiple gateways shouldn’t be used, because doing it isn’t very well understood. Look in the wiki, you might find something.