intrigeri: >> 3. In another place you say the ISP can distinguish the TAILS user with TOR >> > users becouse the NOT-TAILS users are generated not TOR-traffic only. My >> > question: Is the using by unsafe browser (while I'm working with TAILS) can >> > say for anybody (ISP, Service I use by TOR and so as) that see me throus >> > TOR anywhat about me? Is I anonimouse by TOR when I generate non-torified >> > traffic by unsafe browser (my goal: hide I use TaILS). > I'm sorry, I really don't get what you mean :/
I *think* what was meant was the following: If the problem is that a Tails System doesn't generate non-Tor traffic, can't one then solve this by using the Unsafe Browser to generate such traffic. The answer is probably: No, because a "normal" system will also generate a lot of other non-Tor traffic besides HTTP or HTTPS. Examples for this being IMAP, SMTP, NTP, software updates and the corresponding DNS requests for all of these. Cheers! _______________________________________________ tails-support mailing list [email protected] https://mailman.boum.org/listinfo/tails-support To unsubscribe from this list, send an empty email to [email protected].
