On Wed, Nov 21, 2012 at 12:20 AM, adrelanos wrote:
> I've been told it's not a bug and supposed to be the way it is:
> https://trac.torproject.org/projects/tor/ticket/6342
> https://trac.torproject.org/projects/tor/ticket/6595
When someone complains that they get same IP after issuing NEWNYM, it
Maxim Kammerer:
> On Wed, Nov 21, 2012 at 12:20 AM, adrelanos wrote:
>> I've been told it's not a bug and supposed to be the way it is:
>> https://trac.torproject.org/projects/tor/ticket/6342
>> https://trac.torproject.org/projects/tor/ticket/6595
>
> *When someone complains that they get same IP
On Wed, Nov 21, 2012 at 1:30 PM, adrelanos wrote:
> Isn't that what I said with new circuit =/= new ip?
I understood it as implying that a new circuit does not guarantee a
different exit node IP, and hence why the OP might be seeing same exit
IPs. Which is apparently not the problem here, as the
I want to know whether my program leaks my ip. So I found wireshark.
I want to check ip leak so I studied wireshark. But I don't know about
wireshark filters well. I want to know there are my ip leaks include my packets
contents. Not only dns leak.
If I use filter "host (my ip address and port
Hi,
a wiki page with a description of a Bridge Firewall has been created by me:
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall
> '''This isn't a tutorial/advice. It's merely about researching and
> documenting an idea. It has not been thoroughly discussed.
>
> [[T