Users really need to dissect and understand how
each method of constraining application traffic to tor
works before choosing one, then set it up and test
extensively before use. And deploying an out of band
managed catchall packet filter is essential to helping
prevent eventual IP leaks.
Four comm
LY your expected
Tor connects and disallow everything else.
I don't think this would be an issue in my situation as there would be
one application only using Tor and not the entire system.
Message: 1
Date: Sun, 8 Apr 2018 02:40:22 -0600
From: "J. S. Evans"
To:
Subject: [tor-t
's important to set your routing rules to allow ONLY your expected Tor
connects and disallow everything else.
> Message: 1
> Date: Sun, 8 Apr 2018 02:40:22 -0600
> From: "J. S. Evans"
> To:
> Subject: [tor-talk] Getting de-anonymized with SSH
> Message-ID: <00
Hi all,
First of all, I know that the best way to stay anonymous on Tor when
browsing the web is to use the Tor Browser and be smart about how you use
it.
What about when you're not using the web? If I am using ssh over Tor, is
there a good chance that I can be de-anonymized? By this I mean ssh to