On Wednesday, February 20, 2019 at 2:00:06 PM UTC-8, [email protected] wrote: > Hi All, > > > Recently I noticed ipv6-test website can see tor browser’s ipv6 address > > though it might not be necessaiyly my own ipv6, but that does somehow put me > on alart and to post a question at here, > > I do see other people asked this question at stackexchange before, but I > don't quite get the answer for the question of mine. > https://security.stackexchange.com/questions/193843/why-ipv6-showing-on-whatismyip-com > > So I like to know if it's secure to check webmail thought tor, since if exit > node's ipv6 can be identified, > there is a chance to track further back to other nodes as well. > > you can say mac address can be changed, but it's not difficult to find out > the real one as well. > > So should we use tor to check webmails? especially tor+VPN make it more > obviours on tor network, > does this make it actually wraker than just use firefox+vpn? > > if you are a qubes user, what browser do you use to check w > ebmails? > > really want know how you think, thank you
just checked it, and it looks like its using the exit nodes ipv6, not yours. so if there was a bug, it seems to be fixed. just in case, you should check it against the ipv6 in sys-net. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3674428b-0bba-4d8f-9d0b-67e7c2fb9ff1%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
