On Thu, 27 Dec 2012 09:22:00 +0545
Nathan Freitas wrote:
> How does it work ? Well, Tor works just great 'out-of-the-box',
> however, by tweaking settings and controlling how Tor connects to its
> own network we can improve on privacy and security.
...based on what evidence?
> (1) Block 'Bad' E
I was just made aware of this "advanced" torrc configuration below. Any
comments on it, from a client-only/mobile device perspective? I can
understand how it might deanonymize you, but it might be a trade-off
that users seeking fast circumvention only may want to make.
http://xeronet.primeoptic.n