-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Tor browser bundle is generally recommended for privacy due to its ability to blend in more with other people by having a commonly shared browser fingerprint.
The issue is however if one wishes to use tor browser bundle behind a transparent Tor proxy in which the Tor process is running on the router between the computer and LAN for better security. What is the best way to use Tor browser behind a physically isolated Tor router so to prevent Tor browser running on the computer from creating a Tor circuit inside another circuit? - -- Cannon PGP Fingerprint: 2BB5 15CD 66E7 4E28 45DC 6494 A5A2 2879 3F06 E832 Email: can...@cannon-ciota.info NOTICE: ALL EMAIL CORRESPONDENCE NOT SIGNED/ENCRYPTED WITH PGP SHOULD BE CONSIDERED POTENTIALLY FORGED, AND NOT PRIVATE. If this matters to you, use PGP. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJZIgobAAoJEAYDai9lH2mwLVAP+gLrK4YBSCmVLRSxWc5jB1Cj nsgVNlsXlC0DZeafJj2XVWWjqynTrzpVPL9YYKvd3dxFn93xd1JC01DyVVp/BXz0 dPiuMNHrKkLx84olY7UxF6fD95QycNJDTVfRObKV5ZBsHLogLFZVZmjatm7IZP/Z jzr0gYjCFBMzCvZzimcUZURTUSTOUoaGb0RYHl/oqLFpDz/CgYK8fMcVrr5vcMKI 3Uqrw+EvHYPl1zTsKxUZ2xEnYCkNkPXbK+D1RcSExWIw3amro1pjdxJ94px96hrV VePds3gJgBT4M5/B7aH2xUUn0QyAK/8QQk2eSHFwNburr+jsA3+zTqKG6c9EDE/k u55fhPahbSNKG5MBHgLu1bmAdUDlv34jirRWQKZrkrFtZNJDgXh+tRoJFcOuRM7P knF/v2syvIA7QQi4V6zocSs00yKaA3V74tE5U9YTY8zjUtElQhfv+iZfVJWaV4n/ qKE8F2hVKSFlS8/U6gFmVGB+KEQoqTiHJz5sdk1D4Yu39Du2S3FDRbgDzJALSme8 6jFqjPsvecpnW4J+FGEOG76tm1uMywfQ4V3AxcBNwC4+2nqQPJjG0uMAAcpt/DMo 5EhbJTre8YYUUaa8mW/u2Kdoko7EVfvDOV8A0WsdAJUM5lAeu4+j/q7jWdqKWBHL xW9QL4dlcbD3b/YkE8p9 =mWed -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk