[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Aggressive probe of anonymity
-----BEGIN PGP SIGNED MESSAGE-----
Hmm. I know GRC has that "leak test" program, though it's for Win32
AFAIK and I don't know how applicable it is. You could use logs and an
IDS such as Snort to monitor on localhost and within the LAN if you do
it right. I don't know of an out-of-the-box easy solution for all
platforms though. Maybe Roger or Arrakis have an idea?
Frivolous lawsuits. Unlawful government seizures. It's a scary world
Protect your privacy, keep what you earn, and even earn more income at:
P Jones wrote:
>> P Jones wrote:
>>> I'm wondering if there is a site or a set of scripts that I
>>> could host on my own site that agressively probes a browser
>>> connection for anonymity. I'd like to test various
>>> browser/proxy/os configurations, mostly for learning purposes
>>> and for identifying what and to what degree different
>>> technologies are vulnerable.
> On 9/21/06, Andrew Del Vecchio <firefox-gen@xxxxxxxxxx> wrote:
>> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
>> Ever been to www.pcflank.com? www.grc.com?
> Thanks for the reply, but both of those sites (I know grc well, new
> to pcflank) assume a direct connection to the internet. I'm
> looking for a test of this situation; on the tor network, behind a
> firewall on a network with a local IP; various operating systems.
> images, flash, etc. tested for leakage of identifying information.
> As an example, squid can be configured to send your proxy/host type
> (ipid.shat.net), which even though you're on tor will reveal your
> actual IP address (or at least your server name). So ipid.shat.net
> shows this, many other ip address testing pages do not.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v220.127.116.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----