> I think the topic Bridge Firewall is also related here: > https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall > > (The topic didn't move there yet, but it's all very similar ideas > we're discussing here.)
Isn't corridor exactly what that article is describing? It seems like it's also vulnerable to the 'Severe issue' in the article -- a compromised tor host behind corridor can get its public IP address with the 'getinfo address' Tor control protocol command and deanonymize. Whonix includes this in its threat model -- you should be able to run arbitrary/compromised code behind the tor gateway and be safe. Can corridor do anything about it? -- tor-talk mailing list - [email protected] To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
