On Fri, Oct 12, 2012 at 06:16:08PM +0200, Sebastian G. bastik.tor wrote:
What happens if an Flashproxy (bridge) operator visits websites that has
a badge on it so he proving a proxy. (What happens if someone is both
flashproxy relay and flashproxy?)
This question seeks to answer if it is OK
On Fri, Oct 12, 2012 at 06:21:13PM +0200, Sebastian G. bastik.tor wrote:
beside the case that the connection itself looks different due to the
use of (web)sockets (like explained in the paper) is there any impact on
how one could fingerprint on Tors' traffic?
No, using a flash proxy doesn't in
David Fifield:
On Fri, Oct 12, 2012 at 06:21:13PM +0200, Sebastian G. bastik.tor wrote:
beside the case that the connection itself looks different due to the
use of (web)sockets (like explained in the paper) is there any impact on
how one could fingerprint on Tors' traffic?
No, using a
Its very much possible and very easy as long as the software supports
socks proxy.
Even if the software does not provide proxy support you can try transparent
proxy and activate over Tor.
On Oct 13, 2012 12:27 AM, Achter Lieber zzretro...@email2me.net wrote:
Hello.
Has anyone any experience
Hey folks,
I've implemented a TorVM service for Qubes OS [1] and I am seeking
feedback from more knowledgeable eyes on the tor+iptables configuration.
Quick background to give this context:
Qubes is an OS based on Xen and Linux that isolates applications to
domains. Each domain is a virtual
Hi,
released under which license?
Cheers,
adrelanos
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk