-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Oskar Wendel <o.wen...@wp.pl>:
> 1. Maybe I should run a private (unpublished) bridge on the server and a > tor client on my tor PC, that would be able to connect only to the bridge > (through a VPN)? This way, all unencrypted traffic would never exit a tor > PC. This PC is secured enough to assume it's secure from being hacked > into. It's also encrypted and never left unattended. Additional question: For an idling client (that is, a tor client that is connected, but nobody connects to its socks port), what network activity takes place? I can think only of periodic consensus downloads. Anything else? - -- Oskar Wendel, o.wen...@wp.pl.remove.this Pubkey: https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C Fingerprint: C8C4 B75C BB72 36FB 94B4 925C 6690 CC52 318D B84C -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJWkp4XAAoJEGaQzFIxjbhM394H/R/99S/LIhfmAGv66hQtJl7V fVqPNHFDpJZQyTdPMMi5oonp2L8UCnF3Se6MB7M23WvkHELrrrDNQE3hMVNLVkHE 0HbbPWHu1fnamzDMSW+bc2r6yE7S/A5or1ekAjgd2v4UaYa/45WHhLnbKjvKGtI/ /2kjQofdM0QawS7mI8jODUYqykH5+X7YZSJU2Z5NT3y5EBEJKWhYnGquA89Xc0Md Crt0FtgGZxOzyMCHGyd8RBsmIvtYjTICVB5Rp6VeY2fgU/Y+5JHHNOIc8tsuqg0q Ofht7MShSk3xdy2ponD8yoVwz3w0nGCyUn5rUmClc1VUkew/GKn2+7/KE6ey48c= =lwnm -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk