[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
- From: Curious Kid <letsshareinformation@xxxxxxxxx>
- Date: Mon, 13 Apr 2009 23:48:43 -0700 (PDT)
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 14 Apr 2009 02:48:46 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1239691723; bh=2ymd4d46+q/wnABYEkf1BHgfIZKQFkYwWg8KEXf0UnY=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=Dw4kxajIe5EC49fEeaBRizmvUT6vDi/kFr5Zj+apROGjwhX0c7r5141fGmbdVYnBvPvlk/HMnsVwRPhpanBE3ZE6vvkMTABhDSED7z2qLorwS0WQ+XmeclHi1NbGR4woRgApd3kTCPadU/Sp9ePbRfZPDpLxPvKVxuPVvjUYBZI=
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:References:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=n4OGnbuJZ4mx+/+IhyLUYBhBUyPGcvsW8ODtnCNG57pm2LuzYtj27v9aE5hJdWYhHL7fwlO25ZhTQBfx90y4yM8Je46tJabVZWBav5h1m5wn3q0nAg+t9DD4fVxUwtEn+l9M3rygwXB4nl+sjY2k480+YcP0OVCk0JrK24pMVSE=;
- In-reply-to: <505892.53828.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- References: <505892.53828.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
----- Original Message ----
> From: Tripple Moon <tripple.moon@xxxxxxxxx>
> To: or-Talk Mailinglist <or-talk@xxxxxxxx>
> Sent: Monday, April 13, 2009 3:47:50 PM
> Subject: Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
>
> > Faking the address resolution does not alter the
> > tracking abilities of web sites in the slightest.
> Well there you are dead wrong sorry to disagree here.
> Websites that track by IP-access are blocked this way.
> Ofcourse, i know there are plenty of other ways to track visitors, but
> IP-tracking is one that can be eliminated by _not_ accessing certain web servers
> at all in the 1st place...
Are you saying that a solution to prevent websites from tracking their visitors is to have a third party block to have a content-based filter in case some of the blocked websites also happen to have IP tracking enabled (or are under some form of surveillance)? Is this really what you mean? How does this solution help when the traffic is coming from a Tor exit node and is reasonably well anonymized?
> My intentions were not to corrupt the tor service but to cleanup corruption of
> DNS servers used at certain locations in the world by authorities, and at the
> same time block some personally setup domains for my own LAN-access.
>
> Try to look at the big-picture what i want to accomplish as a whole, not just
> from tor's P.O.V.
> I want to circumvent the poluted DNS-service of my ISP/country and at same time
> block personally chosen domains.
What do you think national authorities would say about someone in their country openly providing access to Internet content that they have blocked? Why would someone want to block content that has not already been blocked by the authorities?
Can you share with us in what way Turkish DNS servers are corrupted? If you think that would be off-topic here, feel free to email me directly, as I would be personally very interested in specific examples of Turkish content filtering.
Does OpenDNS allow blocking on a per-domain basis? All I could get from their website was their list of content categories from which an operator could choose. May I ask, which domains and content categories were you interested in blocking? Also, why impose the same blocking that you would use for your own LAN-access upon any Tor user that happens upon your exit node? Would it not be better to have any blocking in your exit policy so that users interested in content that you have blocked may instead route around you rather than see your personal message to them?