https://trac.torproject.org/projects/tor/ticket/6256
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
The canary domain will only disable DoH if you've been defaulted into using
DoH.
If you've actively turned it on, or set network.trr.mode to 3 then the
canary will not disable it.
On Fri, Mar 6, 2020 at 2:58 PM Nathaniel Suchy <
nathanielsu...@protonmail.com> wrote:
> Even if that option is en
What would stop a bad actor from creating a bunch of new circuits and making
all Tor IPs look bad if they were so inclined?
Cordially,
Nathaniel Suchy (they/them)
Sent from ProtonMail Mobile
On Sat, Mar 7, 2020 at 6:42 PM, nusenu wrote:
> As a tor user we are regularly affected by IP based re
Thank you.
I sent an email to that address, but they told me that I should ask here.
I'm using Android 7.1.1 on a BlackBerry Aurora cellphone.
The information is:
SYSTEM
Android Version: 7.1.1 (Nougat)
Build: AAN772
Security patch: April 1, 2017
Architecture: aarch64 (64-bit)
Instruction sets: arm
> What would stop a bad actor from creating a bunch of new circuits and
> making all Tor IPs look bad if they were so inclined?
yes there are distribution strategies that can prevent that
or make that very expensive (an /48 IPv6 block has a **lot** of IP addresses)
--
https://mastodon.social/
On 03/08/2020 02:40 PM, nusenu wrote:
>> What would stop a bad actor from creating a bunch of new circuits and
>> making all Tor IPs look bad if they were so inclined?
>
> yes there are distribution strategies that can prevent that
> or make that very expensive (an /48 IPv6 block has a **lot** of