intrigeri:
>> 3. In another place you say the ISP can distinguish the TAILS user with TOR
>> > users becouse the NOT-TAILS users are generated not TOR-traffic only. My
>> > question: Is the using by unsafe browser (while I'm working with TAILS) can
>> > say for anybody (ISP, Service I use by TOR and so as) that see me throus
>> > TOR anywhat about me? Is I anonimouse by TOR when I generate non-torified
>> > traffic by unsafe browser (my goal: hide I use TaILS).
> I'm sorry, I really don't get what you mean :/

I *think* what was meant was the following: If the problem is that a
Tails System doesn't generate non-Tor traffic, can't one then solve this
by using the Unsafe Browser to generate such traffic.

The answer is probably: No, because a "normal" system will also generate
a lot of other non-Tor traffic besides HTTP or HTTPS. Examples for this
being IMAP, SMTP, NTP, software updates and the corresponding DNS
requests for all of these.

Cheers!
_______________________________________________
tails-support mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-support
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to