Hi again, I recorded some raw and extremely verbose tcpdump data while visiting ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any mention of the visit in the log. I also visited ftp.netbsd.org as I may have some cached DNS queries. My browsing FTP settings are: 219.111.10.220:8080, socks5. Version 1.35 doesn't use QFtp. As for other leaked information, did you have the "Display the IP..." option (Settings->Security) enabled while interrogating the system?
Thanks. On Wed, Aug 15, 2012 at 6:04 PM, A. Megas <textbrow...@gmail.com> wrote: > What do you consider the latest release? > > >> >> ---------- Forwarded message ---------- >> From: Karsten N. <k...@awxcnx.de> >> Date: 2012/8/15 >> Subject: Re: [tor-talk] http://torbrowser.sourceforge.net/ >> To: tor-talk@lists.torproject.org >> >> >> Hi, >> >> I tested the latest Dooble release with SOCKS5 proxy (with Tor) and HTTP >> proxy (with JonDo) and the preconfigured I2P proxy for eepsites. >> >> It leaks DNS queries and FTP requests in all cases. Yes - it leaks DNS >> queries with the preconfigured I2P proxy too. At first the system DNS >> resolver (defined in /etc/resolv.cónf) was asked for *.i2p domains. >> >> The issues are Webkit related. Other Webkit browsers like Google Chrome, >> Rekonq and others are affected too. >> >> In my opinion Webkit-based browsers are not suited for anonymous surfing >> with Tor or any other anonymisation service. >> >> Best regards >> Karsten N. >> _______________________________________________ >> tor-talk mailing list >> tor-talk@lists.torproject.org >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> >> > _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk