HI,
> Mirimir wrote:
> > So hey, I just got this. Anyone else?
I got this too. Seems a list member (allmyjenks at gmail.com?) uses
this service and reply to the author of the mail. Very annoying.
Best regards,
MH
--
Masayuki Hatta
Associate Professor, Faculty of Economics and Management,
Hi,
> > I2P by design safer than Tor. but due to the usage and rapid development
> > of Tor , I2P left behind many steps which needs long time to catch up or
> > sudden magic stick effect.
I might be a kind of a rare bird here since I'm involved with both I2P
and Tor. I was also involved with
I began using Tor as a way to circumvent censorship... so anonymity or
privacy were not my primary goals. Some of you may know that I made a
program called ProxAllium which keeps Tor running in the background so
that I can use the SOCKS proxy in my browser to circumvent censorship.
These days it
On 12/10/2018 10:05 AM, Nathaniel Suchy wrote:
> Hi,
>
> I'm curious to learn the reasons that various people on the lists, for those
> who are comfortable sharing, why they use Tor. I'm also curious as to whether
> users on this list only use Tor or if there are times they use a normal
>
Hi,
I'm curious to learn the reasons that various people on the lists, for those
who are comfortable sharing, why they use Tor. I'm also curious as to whether
users on this list only use Tor or if there are times they use a normal browser
(if so what tasks).
I use Tor mainly as an incognito
Kevin Burress dijo [Mon, Dec 10, 2018 at 10:21:22AM -0500]:
> I just have to check, is tor secure yet?
>
> I was thinking it might be more secure with these AI based timing attacks
> now if the number of hops is more adjustable. Although I would like to see
> a means of negotiating a layer
I just have to check, is tor secure yet?
I was thinking it might be more secure with these AI based timing attacks
now if the number of hops is more adjustable. Although I would like to see
a means of negotiating a layer between a hidden service or exit node using
multiple connections in
1. not serious?
JS leaks my OS name, architecture name, clock setting, fonts, and
more... These are not my IP address even though I don't welcome JS.
2. serious!
If malicious attackers/softwares can get my IP address but can't send it
to their server directly, they may replace my OS name to
Well, there are many ways to use JavaScript to deanonymize you.
For instance, JS can be used to measure the speed of specific operations
on your computer, which already gives some information on what kind of
computer you are using. Firefox contains some counter-measures against
this, TorBrowser
Are there any serious disadvantages to using JS with the TBB.
As we know, disabling JS prevents some sites working at all while other
sites has reduced functionality.
Correct me if I am wrong, but I'm sure that server-side JS cannot get the
user's real (non-Tor) IP address.
If that's correct,
10 matches
Mail list logo