On Monday 15 October 2007 23:58:37 [EMAIL PROTECTED] wrote:
shnip
well then explain to me how they can monitor dns traffic if all dns
requests are made within the originating client box and not to any
outside source. maybe all you tor gurus can explain how clients usually
make dns
Yeah ok, thanks for explaining that, I am understanding it now. I think
my problems will be solved once I fix the dns/hosts file bug in Windows
so that it makes dns requests to my internal hosts file first.
But I will take a look at JanusVM also.
On Tue, 16 Oct 2007 20:46:10 +0100, Robert Hogan
Sorry for my pertubation. It just seems everything is more difficult
than it should be.
And I guess I am po'd at myself also for discovering too late that dns
requests were leaking.
I guess I should be happy that my tcp requests appear to have been
encrypted. Good thing I am not a terrorist, haha.
On Sun, 14 Oct 2007 01:53:52 +0100, KT [EMAIL PROTECTED] said:
On 10/14/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
This group has not changed. I give information in good faith and then
nobody replies. Course in the beginning of this thread,
[EMAIL PROTECTED] and Scott Bennett [EMAIL
. In these
situations, things like tor and SSH are about the only
significant
privacy
protection most users have.
no problem with tor and other wifi connections, dns goes to
tor, hence
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion
wifi connections, dns goes to tor,
hence
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion: Tor cannot be used with any confidence on
publically maintained machines, but there is no reference to this
on the
tor website; nor any real illumination from this group, so
On 10/14/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
This group has not changed. I give information in good faith and then
nobody replies. Course in the beginning of this thread,
[EMAIL PROTECTED] and Scott Bennett [EMAIL PROTECTED] were
replying with uninformative answers, but then as soon
On Sat, Oct 13, 2007 at 05:30:30PM -0700, [EMAIL PROTECTED] wrote 13K bytes in
288 lines about:
: This group has not changed. I give information in good faith and then
: nobody replies.
Actually, you seemed to be doing just fine without needing help. If
there were explicit questions you wanted
protection most users have.
no problem with tor and other wifi connections, dns goes to tor, hence
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion: Tor cannot be used with any confidence on
publically maintained machines, but there is no reference
, dns goes to tor, hence
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion: Tor cannot be used with any confidence on
publically maintained machines, but there is no reference to this on the
tor website; nor any real illumination from this group, so far. I
suppose now someone
are about the only significant
privacy
protection most users have.
no problem with tor and other wifi connections, dns goes to tor, hence
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion: Tor cannot be used with any confidence on
publically maintained machines
[EMAIL PROTECTED] wrote:
Then after agreeing to the TOS, you are able to connect to tor servers,
but all dns requests go through a library computer IP, such that they
can see and record where you are going. I am not sure if they can see
the TCP content, but the UDP (which I assume is the dns
my OP title LIBRARY DEFEATS TOR
Tentative Conclusion: Tor cannot be used with any confidence on
publically maintained machines, but there is no reference to this on the
tor website; nor any real illumination from this group, so far. I
suppose now someone is going to tell me to disable javascript
On Thu, 27 Sep 2007 20:35:58 -0400 Watson Ladd [EMAIL PROTECTED]
wrote:
[EMAIL PROTECTED] wrote:
Then after agreeing to the TOS, you are able to connect to tor servers,=
but all dns requests go through a library computer IP, such that they
can see and record where you are going. I am not
14 matches
Mail list logo