Thanks Alec! This is very useful. Especially plain HTTP sites are unsafe because the attacker might inject something to HTTP traffic. For some weird reason many popular sites, like CNN in your example, are not supporting HTTPS. As a result, exit node or someone else can inject something nasty to this traffic. Tor user may want to see videos and interactive content of these sites and activates JS and videos (the user trusts CNN, but does not see the problem with HTTP).
-Juha On Sun, Feb 5, 2017 at 6:37 PM, Alec Muffett <alec.muff...@gmail.com> wrote: > I released EOTK (Enterprise Onion Toolkit) a few days ago. > > It's "alpha" code, very much still in development. > > I posted a couple of videos of how to set it up: > > * Introduction: https://www.youtube.com/watch?v=ti_VkVmE3J4 > > * Rough Edges & "Gotchas": https://www.youtube.com/watch?v=UieLTllLPlQ > > - alec > > -- > http://dropsafe.crypticide.com/aboutalecm > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk