My question is, if you NEVER requested the 1 web page in the first
place, would you have experienced the same attack? I mean if I were
looking for new live Tor services I would probably periodically just
roll through unknown IPs and check for a live node (or something) as one
layer of attack.
I too am looking for an answer to this. Using the vanilla Tor browser
your identity changes (based on IP) automatically. While that enforced
anonymity is good in many cases, sometimes it makes a site impossible to
use. Personally for my Tor use I would like it ONLY to switch exit
nodes when
I just this evening signed up for a google mail account using only the
vanilla Tor browser and a random node.
I used a 10 minute email to verify the email account, I was a little
surprised it got past google as a valid email domain. Google did send
an email and I used the link, no phone numbe
It's not just ESL, it's the lack of an easy familiar format for
communication, support, and dumb newbie questions. From an outsider
perspective, this list is difficult to access and lacks appeal to a
greenhorn like myself (it appears to be a hardcore dev talk from the
description- you know the