On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes...@gmail.com wrote 1.0K bytes
in 19 lines about:
: Clearly brute forcing would be way, way out of the question just based on
: sheer size. I've read about the introduction points being stored on some
: type of DHT. Is it possible to access the hash
On Mon, Sep 17, 2012 at 2:22 PM, and...@torproject.is wrote:
Is it possible? Yes. I've met some people who tell me they run a relay
which records every hidden service descriptor. They don't tell me more
than that.
Judging from the Rendezvous spec [1, §§1.3, 1.4, 1.6], a relay with an
HSDir
New name will be: Whonix.
Thanks to everyone for all the all suggestions!
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
hello!
How dangerous are the DNS leak for some user? If I understand, the main problem
is own ISP knowing about some access, but not any details of the transaction?
--
Jerzy Łogiewa -- jerz...@interia.eu
___
tor-talk mailing list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd like to add to this question: can a DNS request be used to track
which IP addresses have visited which sites (assuming that your ISP is
not a threat)?
Cheers,
Ed
hello!
How dangerous are the DNS leak for some user? If I understand, the
main
Is the addon unplug safe to use with Tor for downloading videos? That
is, will it (Unplug) provide anonymity?
Thanks.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk