Hi there!
>On Wed, Apr 18, 2012 at 11:37, Robert Ransom wrote:
>
>>On 2012-04-18, Maxim Kammerer wrote:
>>
>> TL;DR: wget is 100% safe to use with Tor and it does not leak DNS
>> (also true for curl, by the way).
>
>Which version of wget did you audit? What information leaks did you
>check for
Hello,
Thanks for these config settings, Does it also leak if I use:
torify wget http://example.com
?
Is this what torify does?
On Saturday, May 26, 2012, wrote:
> Hi,
>
> Original Message
> From: helpfuln...@safe-mail.net
> Apparently from: tor-talk-boun...@lists.torproject
Hi,
Original Message
From: helpfuln...@safe-mail.net
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: [tor-talk] wget - secure?
Date: Sat, 26 May 2012 18:39:04 -0400
> Hi again :)
>
> >On Fri, Apr 20, 2012 at 17:15, Robert Ransom
Hi again :)
>On Fri, Apr 20, 2012 at 17:15, Robert Ransom wrote:
>
>>On 2012-04-18, Joseph Lorenzo Hall wrote:
>>
>>The underlying point is that it would be neat if
>>you've done a comprehensive analysis of a specific version of Tor,
>>etc., etc.
>No, the underlying point is that I have persona
>> msmtp's complement, fetchmail, speaks of SOCKS in its
>> docs, mentions a couple socks libs. But I've not tested
>> fetchmail with them yet, it should be.
>
> fetchmail leacks inesorably (?) dns requests also used through a proxy
> socks - this is my experience.
>
> I found fdm (http://fdm.sour
woar zitte?
On Sat, May 26, 2012 at 8:03 AM, Roger Dingledine wrote:
> On Fri, May 25, 2012 at 06:07:35PM +0200, pro...@secure-mail.biz wrote:
>> If I understand correctly, a bridge will be used as the first of three hops.
>
> Yes. See also Item #2 on
> https://blog.torproject.org/blog/research-
> If I run a Tor exit node and use Tor myself, is there any chance that my own
> traffic might exit my own node? Of course, if this were to happen, I'd
> still have plausible deniability since I'd be running an exit node but it
> would still be too close for comfort!
If your client is not also th
You have the possibility to change the way tor is building his circuits in
the torrc file. You can even choose what exit node you want to use.
On Sat, May 26, 2012 at 6:32 PM, Sam Whited wrote:
> > If I run a Tor exit node and use Tor myself, is there any chance that my
> own
> > traffic might e
> If I run a Tor exit node and use Tor myself, is there any chance that my own
> traffic might exit my own node? ...
No, your node will build a circuit consisting of nodes that are not
itself, and not in the same family as itself.
For more information, see here:
https://gitweb.torproject.org/tor
Hi,
Karsten N.:
> I would recommend the following settings to use English reply headers in
> the mail to hide personal language preferences of the user:
>
> mailnews.reply_header_authorwrote%s wrote
> mailnews.reply_header_ondate On %s
> mailnews.reply_header_locale
On 05/25/2012 08:24 PM, Jacob Appelbaum wrote:
> I'm pleased to say that Sukhbir, tanaq, and I are making progress on
> Torbutton-birdy, the Torbutton like plugin for Thunderbird.
I would recommend the following settings to use English reply headers in
the mail to hide personal language preference
This is going to be an amazingly silly question and I will admit ahead
of time that I've not fully reviewed the source code to find the
answer but I'm going to ask anyway.
If I run a Tor exit node and use Tor myself, is there any chance that
my own traffic might exit my own node? Of course
On Fri, May 25, 2012 at 06:07:35PM +0200, pro...@secure-mail.biz wrote:
> If I understand correctly, a bridge will be used as the first of three hops.
Yes. See also Item #2 on
https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor-bridges
including proposal 188:
https://gitweb.to
13 matches
Mail list logo