On Sat, Jul 14, 2018 at 09:13:56PM -0400,
 Nick Feamster <[email protected]> wrote 
 a message of 40 lines which said:

> 1. Tor is vulnerable to DNS fingerprinting, particularly at the
> recursive resolver. Many Tor exits use Google public DNS (~40%, by
> exit throughput),

I know this research but I don't see the point. You typically connect
to your DoH or DoT resolver by IP address so the resolver used by the
exit node is irrelevant.

(Also, if you use a .onion, there is no exit node.)

> 3. Tor and .onion in particular have some pretty serious usability
> problems.

Users typically don't interact directly with their DNS resolver,
unlike they like to use dig so, again, I don't see how it is related
to the problem.

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to