Re: [tor-talk] Getting de-anonymized with SSH (J. S. Evans)

2018-04-09 Thread grarpamp
Users really need to dissect and understand how each method of constraining application traffic to tor works before choosing one, then set it up and test extensively before use. And deploying an out of band managed catchall packet filter is essential to helping prevent eventual IP leaks. Four

Re: [tor-talk] Getting de-anonymized with SSH (J. S. Evans)

2018-04-08 Thread jsevans
Hello, first of all, thank you for the feedback. On 2018-04-08 15:40, Me wrote: It can be complicated. Tor itself provides a multi-hop anonymizing TCP connection, however what your application may or may not do outside of Tor is uncontrolled, this is why the Tor Browser is recommended for use

Re: [tor-talk] Getting de-anonymized with SSH (J. S. Evans)

2018-04-08 Thread Me
It can be complicated. Tor itself provides a multi-hop anonymizing TCP connection, however what your application may or may not do outside of Tor is uncontrolled, this is why the Tor Browser is recommended for use instead of simply proxying your regular browser through Tor, TBB is designed to