Please, pls, pls, consider to : declare/share your email-address and
GPG/PGP FPR, and also declare/show/share full code of GPG pubkey,
etc (with various form) in the DNS RR like "CERT PGP" then other
users can know for sure, what is real and actual and approved key
component by you. If users are u
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
After a quick read on it, i'm adding bit more info in below, might
or might not be related and might or might not be helpful.
DNS packets from Tor-client side toward a DNS-Server, should be
encrypted, to keep it non-viewable in exit-node computers,
If an Unbound type of DNSSEC/validating resolver exist on end-user's
(tor proxy user's) computer, then, it can be configured to prevent
accidental dns leaks from any apps on that computer, by using unbound
configuration command-lines like:
local-zone: "onion." refuse
local-zone: "exit." refuse
loca