> Hello, I have recently started using TOR and would like to understand and
> clarify some doubts:
>
>
>
> My DNS doubts:
>
> 1) If I use Norton ConnectSafe for Home (the cloud-based DNS Web filtering
> service); am I risking i) to loose my anonymity (i.e my IP, etc.) and/or
> ii) to be totally sus
Thanks - yes, this is what I think happens:
Tor:
Client (me) ---> Tor Node 1 ---> Tor Node 2 ---> Tor Node 3 (exit node) --->
Internet (HTTP or HTTPS).
Internet (HTTP or HTTPS) ---> Tor Node 3 ---> Tor Node 2 ---> Tor Node 1 --->
Client (me).
The DNS is done remotely at Tor Node 3 (exit node)
./start-tor-browser displays (on the command line):
Launching Tor Browser Bundle for Linux in /home/countess/tor-browser_en-US
Qt: Session management error: None of the authentication protocols specified
are supported
I am using Ubuntu 10.04. Does this error matter?
Thanks.
__
Hi,
i would like to know if it's possible to determine if a TorHS is
non-existing or if it's non-reachable (exists but there is a connection
problem).
-naif
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mai
On Wed, May 30, 2012 at 2:38 AM, Fabio Pietrosanti (naif)
wrote:
> Hi all,
>
> i've been thinking some days ago that the Tor infrastructure maybe a
> very valuable infrastructure also for other software that would like to
> stay distributed without a "central directory".
Basically, there are som
It depend where all those applications are hooked. If it only change system
settings it should not be a problem if you configured your applications
well because no DNS request sould be sent by "torified" client application.
HardKor
On Wed, May 30, 2012 at 3:35 PM, Pasan tus cosas, siempre. <
pasa
Hello, I have recently started using TOR and would like to understand and
clarify some doubts:
My DNS doubts:
1) If I use Norton ConnectSafe for Home (the cloud-based DNS Web filtering
service); am I risking i) to loose my anonymity (i.e my IP, etc.) and/or ii) to
be totally susceptible for
On 5/30/12 3:18 PM, Gregory Maxwell wrote:
> On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif)
> wrote:
>> So basically "on top of Tor software and Tor Infrastructure" it would be
>> possible to build other kind of networks, given that they participate to
>> the Tor network itself.
>
> An
On Wed, May 30, 2012 at 9:07 AM, Fabio Pietrosanti (naif)
wrote:
> So basically "on top of Tor software and Tor Infrastructure" it would be
> possible to build other kind of networks, given that they participate to
> the Tor network itself.
And the directory authorities could freely attack such u
On 5/30/12 2:08 PM, krishna e bera wrote:
> On Wed, May 30, 2012 at 08:38:10AM +0200, Fabio Pietrosanti (naif) wrote:
>> i've been thinking some days ago that the Tor infrastructure maybe a
>> very valuable infrastructure also for other software that would like to
>> stay distributed without a "cen
On Wed, May 30, 2012 at 08:38:10AM +0200, Fabio Pietrosanti (naif) wrote:
> i've been thinking some days ago that the Tor infrastructure maybe a
> very valuable infrastructure also for other software that would like to
> stay distributed without a "central directory".
>
> In order to do so, a serv
Hi all,
i've been thinking some days ago that the Tor infrastructure maybe a
very valuable infrastructure also for other software that would like to
stay distributed without a "central directory".
In order to do so, a server-software for a distributed network, may also
run a Tor Relay and write i
12 matches
Mail list logo