Re: [tor-dev] Fraudulent PGP key with my email address (CEE1590D)

2013-09-01 Thread Bry8 Star
Please, pls, pls, consider to : declare/share your email-address and GPG/PGP FPR, and also declare/show/share full code of GPG pubkey, etc (with various form) in the DNS RR like "CERT PGP" then other users can know for sure, what is real and actual and approved key component by you. If users are u

Re: [tor-dev] [draft] Proposal 219: Support for full DNS and DNSSEC resolution in Tor

2013-08-13 Thread Bry8 Star
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 After a quick read on it, i'm adding bit more info in below, might or might not be related and might or might not be helpful. DNS packets from Tor-client side toward a DNS-Server, should be encrypted, to keep it non-viewable in exit-node computers,

Re: [tor-dev] DNS(SEC) draft update

2012-09-16 Thread Bry8 Star
If an Unbound type of DNSSEC/validating resolver exist on end-user's (tor proxy user's) computer, then, it can be configured to prevent accidental dns leaks from any apps on that computer, by using unbound configuration command-lines like: local-zone: "onion." refuse local-zone: "exit." refuse loca