[Noisebridge-discuss] Transparent Tor-ification

Rubin Abdi rubin at starset.net
Wed Mar 17 10:39:27 UTC 2010


Sai Emrys wrote, On 20100317 032938:
> You missed that you can leak data (with DNS, javascript, headers, etc)
> despite using Tor, the outgoing Tor server could sniff your
> unencrypted traffic, the NSA could set up a bunch of high-availability
> Tor servers and own you end to end, ....

Re: Leaking data via DNS, javascript, headers, etc, that's not possible
if all traffic is being routed through Tor, which it is if I'm to
understand it correctly.

> Firefox + TorButton (+ Proxifier to cover other traffic sources)
> covers at least the first one. :-P

This setup works if you only care about http/web traffic, and have
Firefox setup correctly, and aren't running any extensions that don't
care about your proxy settings, and stay away from java and anything
else embedded, and live on the Google Opt Out Island.

-- 
Rubin Abdi
rubin at starset.net



More information about the Noisebridge-discuss mailing list