[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
- From: Tripple Moon <tripple.moon@xxxxxxxxx>
- Date: Thu, 16 Apr 2009 15:04:41 -0700 (PDT)
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Thu, 16 Apr 2009 18:04:44 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1239919481; bh=BMOsqAkg9FwNyp2xFzTpPlcqQIjkIf0qWydnl7V3EH4=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=DliY2oi4L2wz6BfJAUIOmz2OrEFDLBt68yz2po5FGQ2lJXEGZrQe1vE3p2ugnrghfGdYT5EVtv7AwD0DQA/o4cmt9Z9k47cg2KoQDzmIPw470hBxljKvqcnOLqQJLLicnVgAqtW2lVlGIsKzygM90dx1cKbXJ43YmQKPwZHbe7U=
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=gAhxg4eeCAPZhrMgJu98WuJHiBMmQz2R8CsS8dIiEsDyhKOmcSr84lhPKQbeITBEXuvOZZvu22VoJtuBGm3ftnsrVMze8YPwM6D04yeDSi6VWbxjS1PXFenVBgzwByr/3jWsjjTQnAY/oCri7AVPWt24lq3zoPm39ego8errpYc=;
- In-reply-to: <401723.86893.qm@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
--- On Tue, 4/14/09, Curious Kid <letsshareinformation@xxxxxxxxx> wrote:
> From: Curious Kid <letsshareinformation@xxxxxxxxx>
> Subject: Re: tor with OpenDNS as default DNS, using Firefox+FoxyProxy
> To: or-talk@xxxxxxxxxxxxx
> Date: Tuesday, April 14, 2009, 2:48 AM
> ----- Original Message ----
> > From: Tripple Moon <tripple.moon@xxxxxxxxx>
> > To: or-Talk Mailinglist <or-talk@xxxxxxxx>
> > Sent: Monday, April 13, 2009 3:47:50 PM
> > Subject: Re: tor with OpenDNS as default DNS, using
> > > Faking the address resolution does not alter the
> > > tracking abilities of web sites in the slightest.
> > Well there you are dead wrong sorry to disagree here.
> > Websites that track by IP-access are blocked this way.
> > Ofcourse, i know there are plenty of other ways to
> track visitors, but
> > IP-tracking is one that can be eliminated by _not_
> accessing certain web servers
> > at all in the 1st place...
> Are you saying that a solution to prevent websites from
> tracking their visitors is to have a third party block to
> have a content-based filter in case some of the blocked
> websites also happen to have IP tracking enabled (or are
> under some form of surveillance)? Is this really what you
> mean? How does this solution help when the traffic is coming
> from a Tor exit node and is reasonably well anonymized?
The tracking site still tracks access when hit on, ok in that case it will track the exit point, but i want to prevent them to track at all...
Yes im allergic to adverting companies that impose their needs on users without the user actually asking for it.
> > My intentions were not to corrupt the tor service but
> to cleanup corruption of
> > DNS servers used at certain locations in the world by
> authorities, and at the
> > same time block some personally setup domains for my
> own LAN-access.
> > Try to look at the big-picture what i want to
> accomplish as a whole, not just
> > from tor's P.O.V.
> > I want to circumvent the poluted DNS-service of my
> ISP/country and at same time
> > block personally chosen domains.
> What do you think national authorities would say about
> someone in their country openly providing access to Internet
> content that they have blocked? Why would someone want to
> block content that has not already been blocked by the
Perhaps because that someone has other opinions as the authorities in that country?
> Can you share with us in what way Turkish DNS servers are
> corrupted? If you think that would be off-topic here, feel
> free to email me directly, as I would be personally very
> interested in specific examples of Turkish content
You want examples..ok...try accessing YouTube/geocities/etc from within Turkey....
You get the idea i hope.
Some countries authorities are just mentally in the stone age in respect to the internet and personal responsibility while accessing information of any kind.
As an adult i can make certain choices for myself, i don't need nor want those choices made for me by 3rd parties....
> Does OpenDNS allow blocking on a per-domain basis? All I
> could get from their website was their list of content
> categories from which an operator could choose. May I ask,
> which domains and content categories were you interested in
> blocking? Also, why impose the same blocking that you would
> use for your own LAN-access upon any Tor user that happens
> upon your exit node? Would it not be better to have any
> blocking in your exit policy so that users interested in
> content that you have blocked may instead route around you
> rather than see your personal message to them?
Yes you can setup personal domains to block in your blocklist, besides the ones that have been categorized.
My blocklist is entirely composed of advertising servers not already categorized and blocked by the categories for adverts.
Im not interested in anykind of personal message delivered to the users, except the info of the blocking action.
IMHO imposing blocking of data transfer of advertisers is just a matter of accelerating webaccess over the tor-network.