I have been running dnssec over tor a month now and i am very happy havent had
any problems
Michael skrev: (3 november 2016 08:20:18 CET)
>There are many ways for your browser and other network traffic
> to betray your activities; it is not just DNS leaks ya got to be
> worried about, checkout
There are many ways for your browser and other network traffic
to betray your activities; it is not just DNS leaks ya got to be
worried about, checkout the browser cache attacks that where
shown at the BlackHat convention about two months ago.
Title: I Know Where You've Been: Geo-Inference At
sajolida:
> Alec Muffett:
>> On 14 Oct 2016 1:29 pm, "Justin" wrote:
>>> Not too long ago, a paper was published that talks about how Tor users
>>> can be deanonymized through their DNS lookups. Is this something I should
>>> be concerned about?
>>
>> That is an excellent question! What are you do
Alec Muffett:
> On 14 Oct 2016 1:29 pm, "Justin" wrote:
>> Not too long ago, a paper was published that talks about how Tor users
>> can be deanonymized through their DNS lookups. Is this something I should
>> be concerned about?
>
> That is an excellent question! What are you doing, and who are
On Tue, Oct 18, 2016 at 10:39 AM, Philipp Winter wrote:
> On Sun, Oct 16, 2016 at 01:15:32AM -0400, Nick Mathewson wrote:
>> On Fri, Oct 14, 2016 at 11:09 AM, Philipp Winter wrote:
>> [...]
>> > There are two ways to mitigate the issue. First, we need better
>> > defences against website finger
On Sun, Oct 16, 2016 at 01:15:32AM -0400, Nick Mathewson wrote:
> On Fri, Oct 14, 2016 at 11:09 AM, Philipp Winter wrote:
> [...]
> > There are two ways to mitigate the issue. First, we need better
> > defences against website fingerprinting, so an attacker learns less by
> > observing the conne
On Fri, Oct 14, 2016 at 11:09 AM, Philipp Winter wrote:
[...]
> There are two ways to mitigate the issue. First, we need better
> defences against website fingerprinting, so an attacker learns less by
> observing the connection to your guard relay. Second, we need to
> improve the DNS setup of
On Fri, Oct 14, 2016 at 07:29:17AM -0500, Justin wrote:
> Not too long ago, a paper was published that talks about how Tor users
> can be deanonymized through their DNS lookups. Is this something I
> should be concerned about?
I am one of the authors. While the attack is very precise in our
simul
I have asked around and ppl tell Me that dns over tls is the best , anyhow this
is how i solved it https://github.com/flipchan/Nohidy/blob/master/dns
Justin skrev: (14 oktober 2016 14:29:17 CEST)
>Hi,
>Not too long ago, a paper was published that talks about how Tor users
>can be deanonymized th
Using Tails for secure coms. I don't want the NSA to have an easy time of
spying on me.
- Justin
> On Oct 14, 2016, at 07:32, Alec Muffett wrote:
>
>> On 14 Oct 2016 1:29 pm, "Justin" wrote:
>>
>> Hi,
>> Not too long ago, a paper was published that talks about how Tor users
> can be deanony
On 14 Oct 2016 1:29 pm, "Justin" wrote:
>
> Hi,
> Not too long ago, a paper was published that talks about how Tor users
can be deanonymized through their DNS lookups. Is this something I should
be concerned about?
That is an excellent question! What are you doing, and who are you afraid
of? :-P
Hi,
Not too long ago, a paper was published that talks about how Tor users can be
deanonymized through their DNS lookups. Is this something I should be concerned
about?
Thanks,
Justin.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://
12 matches
Mail list logo