Hi or-talkers, yet another issue concerning "without Tor" vs "with Tor".
Two hypothetical examples: 1. I´m using the normal Firefox (without Tor) with cookies enabled to log in on Yahoo email to make some stuff as my real identity. Then I close the normal Firefox and start Torpark Firefox with cookies enabled to log in on another Yahoo email to make some stuff as an fake identity. Now the question is, are the cookies capable to retrieve some unique information about my computer, that later is comparable at Yahoo head quarter, to figure out this two different Yahoo webmail accounts was actually runned from one same computer? 2. The same base as in the example 1 above, but with the difference that no cookies enabled anywhere and the webmail account is at Fastmail with complete https connection for everything. Now the question is, are there some unique properties by my computer´s https handling that appear the same on the Fastmail head quarter to make sure the two webmail accounts was runned from the one same computer? In neither of the 1 or 2 above, is java, script or images enabled. BTW, I´m not asking to do some criminality, just for curiosity :) To go in the same post... It would be nice to have something att the bottom of browser window (only a thin line, perhaps in the Firefox status field) that on the left hand show the IP and country of at the moment active entry node and on the right hand (in the same line) have the IP and country of at the moment active exit node in the circuit. This line should be in realtime refreshing, one saple at second or 5 second or something. -- http://www.fastmail.fm - Send your email first class