Do you mind testing a beta release of 1.35 with respect to this issue? Thanks.
On Wed, Aug 15, 2012 at 11:35 PM, Karsten N. <k...@awxcnx.de> wrote: > On 08/16/2012 01:06 AM, A. Megas wrote: > > I recorded some raw and extremely verbose tcpdump data while visiting > > ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any > > mention of the visit in the log. I also visited ftp.netbsd.org as I may > > have some cached DNS queries. My browsing FTP settings are: > > 219.111.10.220:8080, socks5. Version 1.35 doesn't use QFtp. > > I used the latest available download for Linux64 (version 1.31) from > http://sourceforge.net/projects/dooble/files/ > > > As for other > > leaked information, did you have the "Display the IP..." option > > (Settings->Security) enabled while interrogating the system? > > No. > > Best regards > Karsten N. > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk