-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2016-08-25 21:49, 3n7r0...@gmail.com wrote:
> On Thursday, August 25, 2016 at 7:34:01 PM UTC, johny...@sigaint.org 
> wrote:
>> Setting up Tor and Firefox (with noscript, ssl observatory, adblocker) to
>> use it as a proxy is essentially the same effect as Whonix (or tbb). Even
>> if tor/firefox are on the same vm rather than separated, you're behind
>> sys-net and sys-firewall, so your real world address isn't going to
>> leak.
>> 
> 
> This is incorrect. The primary motivation for separating the Tor Gateway 
> from the User VM is to prevent a bypass of the Tor proxy. This is one of 
> the main advantages of Whonix / TorVM over Tails. If a packet reaches your 
> destination without having been routed through Tor, it will be stamped
> with your actual public IP as it's source, regardless of how many NATs / 
> firewalls might be involved.
> 
> There are real world examples of both malicious and non-malicious cases of
>  Tor circumvention. An example of the former includes the FBI's 
> TBB-targeted NIT, called Magneto. In terms of the latter, inadvertent
> leaks happen when programs don't respect proxy rules, as has happened with
> Flash, Skype, Torrents, WebRTC, etc.
> 
> Whether using an "isolating proxy" (multiple machines) or not, using a 
> white-listing proxy like Corridor can help ensure all of your traffic 
> passes through Tor (Entry Guard, at least).
> 

That's right. Also, using Firefox with those extensions is *not* the same as
using Tor Browser:

https://www.torproject.org/projects/torbrowser/design/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-----BEGIN PGP SIGNATURE-----
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=uu+p
-----END PGP SIGNATURE-----

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20544614-5419-efa4-41b8-2c776a5e15b0%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to