On 1/23/19, nusenu wrote:
> thanks for adding tor relays.
> If you are using them for research purposes please ensure
> you follow the safety guidelines:
> https://research.torproject.org/safetyboard.html
> https://medium.com/@nusenu/some-tor-relays-you-might-want-to-avoid-5901597ad821
>
Hi bf@ctct,
thanks for adding tor relays.
If you are using them for research purposes please ensure
you follow the safety guidelines:
https://research.torproject.org/safetyboard.html
You care currently not setting the MyFamily option on your relays,
which puts tor users at risk.
Please
On Wed, 23 Jan 2019 11:23:50 +0100
dns1...@riseup.net wrote:
> Of course. But, as far as I know, you can host multiple domains to
> the same ip. So, in such case, if you only know the ip you can't tell
> what domain I visit.
>
If your adversary is able to catch your packets, then he's able to
Ok, i understood. So, for my purposes it's not useful to change dns servers.
I'll continue to use my ISP DNS servers or those of my virtual server provider.
Thanks
Il 23 gennaio 2019 15:54:34 CET, Dmitrii Tcvetkov ha
scritto:
>On Wed, 23 Jan 2019 11:23:50 +0100
>dns1...@riseup.net wrote:
>
>>
Of course. But, as far as I know, you can host multiple domains to the
same ip. So, in such case, if you only know the ip you can't tell what
domain I visit.
It's just that I don't understand why the public dns providers claim to
improve privacy.
Il 23/01/19 09:01, Rose ha scritto:
adversaries can already see what IP addresses you are connecting to,
even though they can't see your DNS queries, they can easily just do a
reverse DNS on the IP addresses you connect to, to find out what you
were doing.
On 23/01/19 2:32 PM, dns1...@riseup.net wrote:
> In the threat model that I