Hi I wanted to bring your attention to this recent Tor attack paper
published at the CCS conference:
https://arxiv.org/pdf/1808.07285.pdf
> We show that with moderate learning, DeepCorr can correlate Tor
> connections (and therefore break its anonymity) with accuracies significantly
> high
@intrigeri I'll post there. Thanks for the heads up.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
We at Whonix are currently porting to (non-VM) physical builds on arm64
- specifically RPi3. While this is great for headless applications we
are interested in GUI user adoption. Without Tor Browser for arm64 this
won't be as safe as it can be. Can you please consider releasing builds
for this hard
Hello. We are trying to safely deal with programs that don't support Tor
DNS stream isolation so they don't pollute TransPort.
I've read the manual but it's not clear if you enable
IsolateClientProtocol by default. Is that the case?
Also if the former is enabled, do you have IsolateDest enabled f
Hi. We are trying to get Tor Browser to work with privoxy to allow users
to optionally connect to other networks including I2P, Zeronet...
Here's what we tried:
* Disabling network.proxy.no_proxies_on
* Setting network.proxy.http_port to 8118 (privoxy’s port number)
network.proxy.http 127.0.0.1
Hi I was wondering if Tor Broswer supports environment variables to
customize about:config settings.
The idea is to ship an explicitly labelled, custom profile one day to
allow users seamless access to localhost daemons (like zeronet) by
changing network.proxy.no_proxies_on to 0 - so they don't ha