On 18.08.2011 23:38, and...@torproject.org wrote: > On Thu, Aug 18, 2011 at 10:52:54PM +0000, jbrownfi...@gmail.com wrote 1.0K > bytes in 17 lines about: > : 1) Is it need to use ssl when connecting to hidden service? What can > : see the last tor-node in the traffic to a hidden service? I don't > : understand it well. > > No, ssl is not required. > https://www.torproject.org/docs/hidden-services.html.en may help you > understand it.
Thanks. I thought so but Mr. Atrebates confused me. > > : 2) It is very pitty but now many sites required using JS for its > : services. As I know the JS can "steel" only internal ip-address not the > : external. Or I am wrong? > > There's no proof that javascript itself can leak your IP address, at > least none that we've seen. It can be used to leak lots of other > information about you, see https://panopticlick.eff.org/ for more > details. > I know. But in some cases I need to use such sites (as various internet-bankings, some sites of courts and etc.) with their full functinalities and I don't want to uncover my real location when I gives orders to my banks or bring my pleadings to the courts through the Internet. _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk