They're using the same argument as everywhere else: there are laws in
place that ban access to harmful sites, namely child porn. Child
pornographers and other "criminals" use circumventing technology such as
proxies and Tor to bypass the ban. Therefore, if you love children, ban
all proxies! And th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd like to add to this question: can a DNS request be used to track
which IP addresses have visited which sites (assuming that your ISP is
not a threat)?
Cheers,
Ed
> hello!
>
> How dangerous are the DNS leak for some user? If I understand, the
ma
Hi Hugh,
No such thing as a stupid question!
Can you give us some more information about your computer, which
operating system are you using, what version of Tor Browser Bundle did
you install and how... when you start it the way you do, do you see the
little onion icon in the system tray?
Chee
Dear Anonymous Person,
I have to admit, it was a very interesting read, even though I am not
too sure I agree completely. It seems as if your threat model has
encompassed every single tiny thing that could possibly (theoretically)
go wrong, without much thought given to real-world randomness and
i
Good question, it's been bugging me since they introduced TBB. The best
alternative I came up with it having it constantly running and just
moving the browser to a different desktop (in linux).
Hopefully they'll figure something out soon!
On 05/28/2012 03:20 PM, Runa A. Sandvik wrote:
> On Mon, M
A secure VPN (meaning no logging, and anonymous payment) with Tor, plus
HTTPS or FTPS to the server you want to upload to...
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
> What are the most recent recommendations to securely and easily upload
> files/content to websites using Tor?