[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Hidden service security w. Apache/Win32



This is why it's wise to access Tor through reputable multi-hop VPNs that operate in privacy-friendly places. If it really matters, you can tunnel VPNs through other VPNs.

----- Original Message -----
From: Ralf-Philipp Weinmann
Sent: 02/20/12 10:06 AM
To: Ondrej Mikle
Subject: Re: [tor-talk] Hidden service security w. Apache/Win32

 On 2012-02-19 19:58 CET, Ondrej Mikle wrote: > Addendum for truly "uberparanoid" installation: > > [various "best practices"] > > With the uberparanoid installation, the greatest risk is a return-to-libc-style > attack on Tor where attacker instructs Tor to make circuit to a node controlled > by attacker, thus revealing IP. So this is the part where you should realize how futile all of that pain of setting up policies isâ -RPW _______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk