On 03/08/2020 02:40 PM, nusenu wrote:
>> What would stop a bad actor from creating a bunch of new circuits and
>> making all Tor IPs look bad if they were so inclined?
>
> yes there are distribution strategies that can prevent that
> or make that very expensive (an /48 IPv6 block has a **lot** of
> What would stop a bad actor from creating a bunch of new circuits and
> making all Tor IPs look bad if they were so inclined?
yes there are distribution strategies that can prevent that
or make that very expensive (an /48 IPv6 block has a **lot** of IP addresses)
--
https://mastodon.social/
Thank you.
I sent an email to that address, but they told me that I should ask here.
I'm using Android 7.1.1 on a BlackBerry Aurora cellphone.
The information is:
SYSTEM
Android Version: 7.1.1 (Nougat)
Build: AAN772
Security patch: April 1, 2017
Architecture: aarch64 (64-bit)
Instruction sets: arm
What would stop a bad actor from creating a bunch of new circuits and making
all Tor IPs look bad if they were so inclined?
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sat, Mar 7, 2020 at 6:42 PM, nusenu wrote:
> As a tor user we are regularly affected by IP based re
The canary domain will only disable DoH if you've been defaulted into using
DoH.
If you've actively turned it on, or set network.trr.mode to 3 then the
canary will not disable it.
On Fri, Mar 6, 2020 at 2:58 PM Nathaniel Suchy <
nathanielsu...@protonmail.com> wrote:
> Even if that option is en
https://trac.torproject.org/projects/tor/ticket/6256
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk