Hi, my understanding is that clients that use Tor SOCKS port for name resolution are fine.
For clients who use the DNSPort, it's not clear to me if an attacker-controlled payload can make it's way from the exit node being used for the name resolution to the client. Has anyone looked into this? Cheers, -- intrigeri _______________________________________________ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.