This is why it's wise to access Tor through reputable multi-hop VPNs that operate in privacy-friendly places. If it really matters, you can tunnel VPNs through other VPNs.
----- Original Message ----- From: Ralf-Philipp Weinmann Sent: 02/20/12 10:06 AM To: Ondrej Mikle Subject: Re: [tor-talk] Hidden service security w. Apache/Win32 On 2012-02-19 19:58 CET, Ondrej Mikle wrote: > Addendum for truly "uberparanoid" installation: > > [various "best practices"] > > With the uberparanoid installation, the greatest risk is a return-to-libc-style > attack on Tor where attacker instructs Tor to make circuit to a node controlled > by attacker, thus revealing IP. So this is the part where you should realize how futile all of that pain of setting up policies is… -RPW _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk _______________________________________________ tor-talk mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
