This is why it's wise to access Tor through reputable multi-hop VPNs that 
operate in privacy-friendly places. If it really matters, you can tunnel VPNs 
through other VPNs.

----- Original Message -----
From: Ralf-Philipp Weinmann
Sent: 02/20/12 10:06 AM
To: Ondrej Mikle
Subject: Re: [tor-talk] Hidden service security w. Apache/Win32

 On 2012-02-19 19:58 CET, Ondrej Mikle wrote: > Addendum for truly 
"uberparanoid" installation: > > [various "best practices"] > > With the 
uberparanoid installation, the greatest risk is a return-to-libc-style > attack 
on Tor where attacker instructs Tor to make circuit to a node controlled > by 
attacker, thus revealing IP. So this is the part where you should realize how 
futile all of that pain of setting up policies is… -RPW 
_______________________________________________ tor-talk mailing list 
[email protected] 
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
_______________________________________________
tor-talk mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to