Re: Firefox extensions and anonymity, TOR etc
Hi, I see a node in Saudia Arabia. Some nodes in China.. and even a node in Iran! These countries strongly control the internet. How is it possible to believe, that these nodes are not some kind of honeypots ?! And for this, it would be great to be able to easily decide to not use some TOR nodes. How is it possible to believe that those country wouldn't run their honeypots from someplace else where they get less attention. In fact, if I would be running secret service I would set-up Tor exit node. :-)) But what if user is using end-to-end encryption (SSL, TLS, encrypted messaging,...)? And I still cannot know the origin of the communication, just the destination. bye, Matej
Re: Firefox extensions and anonymity, TOR etc
Jan Reister [EMAIL PROTECTED] Hi Abacus, have you tried the Firefox extension Flashblock? http://flashblock.mozdev.org/ Haven't actually tried that one, but NoScript (http://www.noscript.net) got an flash/java block option plus many other nice features. At http://northernsecurity.net/articles/noscript.html there's a guide how to remove the default white list. Besides noscript (and privoxy of course) I use: AdBlock - http://adblock.mozdev.org/ CustomizeGoogle - http://www.customizegoogle.com/ Scroogle search bar plugin - http://scroogle.org/ /Thomas signature.asc Description: OpenPGP digital signature
Re: Firefox extensions and anonymity, TOR etc
On 13/06/2006 11:24, [EMAIL PROTECTED] wrote: Well, I just installed it, and guess what? In the config box, I read Javascript must be enabled for FlashBlock to work !!! Uninstalled it... IMO better is to have Flash than JS enabled! Oh well, you're right! The Flashblock faq recommends NoScript, which is probably the way to go. http://flashblock.mozdev.org/faq.html#fbNojavascript Jan