On Thu, Nov 17, 2011 at 03:08:27PM -0500, [email protected] wrote 1.8K bytes in 40 lines about: : The case of 'covert browser' is even worse: does anybody know if that's : even using Tor under the hood? In the case of Marco's packages, we know : what application-level protections to expect (basically none). In the case : of 'covert browser'... what should we expect? How do we evaluate whether : it achieves them? Does it screw up something else and not realize it, : so e.g. it's broadcasting something about you and you don't know?
I'm in contact with the covert browser dev. He's intending to join tor-dev mailing list and apparently has already found irc://irc.torproject.org/#tor-dev. Safety of covert browser needs to be evaluated. -- Andrew pgp key: 0x74ED336B _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
