On 05/04/2011 12:31 PM, Joseph Lorenzo Hall wrote: > On Wed, May 4, 2011 at 2:56 PM, katmagic <[email protected]> wrote: >> >> Tor2Web sends the X-Forwarded-For header which will contain the IP of >> the client that requested your site. Actual Tor users won't (shouldn't) >> send this header at all.
I'll look into this. > > That's very helpful to know, thanks... so it sounds like something > where participants were told to download torbrowser bundle and then > access a .onion site directly via torbrowser might be the best bet > here (the alternative, if they might be suspicious of a .onion site, > would be to have them change it to tor2web.org). > > This came up in a recent brainstorm on using Tor for research purposes > (other than breaking it or fixing it... but using it as infrastructure > for research that needs anonymity to get at certain questions). > > It strikes me that this kind of use (a guaranteed anonymous survey), > that involves having people with an interest in the research questions > download and use the torbrowser bundle could have a beneficial side > effect of teaching these participants how to use Tor for web activity. > Hmmm... I've advised a few places on how to conduct a survey via Tor - you're not alone in your endeavor but they're all rather quiet at the moment. So perhaps you'll be the first in public to do it! All the best, Jacob _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
