Hi,
My argument is first based on the fact that the entry point (firefox outdated
version) is vulnerable
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox. Since the entry
point is broken, everything that builds on it shall fall to pieces.
Second, I used to use Tor when it took about
On 18/03/14 17:29, perezza.manuel wrote:
Hi,
My argument is first based on the fact that the entry point (firefox
outdated version) is vulnerable
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=firefox.
Tor uses the Firefox ESR releases, which Mozilla backports security
patches to. Every
I strongly discourage any user to use the tor network for the following
reasons:
1) Bundled browser is full of vulnerabilities (Remote access included)
2) Most of the nodes are owned by people who will perform Mitm attacks even
more if you use a layer 7 encrypted protocol. The chances of
Is it possible to create your own basic personal DNS server? A bit like
creating your own personal email server? Or is such a personal setup not
possible in DNS form for some reason?
This will help to understand http://www.zytrax.com/books/dns/.
This will answer any pending queries http://unbound.net.
On 17/03/14 19:00, perezza.manuel wrote:
I strongly discourage any user to use the tor network for the
following reasons:
1) Bundled browser is full of vulnerabilities (Remote access
included)
[citation needed]
2) Most of the nodes are owned by people who will perform Mitm
attacks
OpenDNS is fair, however I have never seen them deny keeping logs. OpenNIC is
the best alternative since a majority of their user operated servers on
purposely don't log your DNS queries. http://www.opennicproject.org/
Additionally you can still use DNSCrypt which adds considerably strong
DNS as in quickest shortcut to insecurity with all kinds of powerful
counterparties watching over it.
For legitimate traffic, I suggest using your own caching resolver validating
DNS's RR with DNSSEC. To my knowledge UNBOUND is the best for this atm.
DNSSEC is not implemented by
Using TorBrowser will protect yourself from revealing any info about your
surfing to your ISP. However, it also has some disadvantages.
One question I have (it might be terribly stupid, lol), is if DNS is only
used when accessing www.namewebsite.com or if it is also used even if we
use
On 16/03/14 00:10, gnuser wrote:
Using TorBrowser will protect yourself from revealing any info about
your surfing to your ISP. However, it also has some disadvantages.
One question I have (it might be terribly stupid, lol), is if DNS is
only used when accessing www.namewebsite.com or if it
Anyone know anything about OpenDNS? Is it safe to use, or should it be
avoided? If it should be avoided, what are the alternatives?
I use OpenDNS, but with the OpenDNS DNSCrypt proxy that is available for
Ubuntu 12.04/Trisquel 6: https://launchpad.net/~shnatsel/+archive/dnscrypt
Technically I am encrypting data between me and my DNS provider (OpenDNS)
meaning that my ISP or anyone else cannot see my DNS traffic. Of
It may be better to you your ISP's DNS server, oshirowanen, because they
already know the web sites you visit.
13 matches
Mail list logo