Hi, my understanding is that clients that use Tor SOCKS port for name resolution are fine.
For clients who use the DNSPort, it's not clear to me if an attacker-controlled payload can make it's way from the exit node being used for the name resolution to the client. Has anyone looked into this? Cheers, -- intrigeri _______________________________________________ Tails-dev mailing list [email protected] https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to [email protected].
