[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Nice to meet you! / WhatsApp by Tor?
Em ter, 16 de abr de 2019 às 12:33, Cyaniventer <cyaniventer@xxxxxxxxxx>
> No! Don't use it if you are actually very serious about this.
Well, my mistake can cost me my life.
My country is one of those who has blocked WhatsApp and dings who tries to
show their abuses. It is repressive, but for some reason the world sees it
with good eyes, perhaps because it is not openly declared socialist, but it
is certainly authoritarian, corrupt and very dangerous and constantly puts
innocents in jail without the slightest humanitarian feeling.
> > or whatever you want and set that vpn to
> > > `always on`. Idk what else you can do, also your first method of
> > > routing your traffic through your computer is not that good.
> > >
> > Why?
> because what if something fails somewhere and your ip gets leaked? are
> you really sure that everything you've setup will work without fail?
> Also see nathan@xxxxxxxxxxx 's email, > Since WhatsApp is executable
> code on your Android phone, it can access information about your device
> directly. This includes accessing your "real" IP address through local
> network information APIs.
That's why I'm here asking, I'm not sure of anything.
> > > If you are real serious about this thing then just setup a virtual
> > > machine and route all traffic from that vm through Tor. This is the
> > > best method that comes to my mind.
> > >
> > Could you give me more details?
> The idea is you'll setup a virtual machine and route all traffic from
> that vm through Tor. First search result is ->
> Note: I don't know how they did it and didn't read that article.
I'll take a look, but what the best current way is the physical protection
how to use public WiFi far.
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to