[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] http://torbrowser.sourceforge.net/
Hi again,
I recorded some raw and extremely verbose tcpdump data while visiting
ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any
mention of the visit in the log. I also visited ftp.netbsd.org as I may
have some cached DNS queries. My browsing FTP settings are:
219.111.10.220:8080, socks5. Version 1.35 doesn't use QFtp. As for other
leaked information, did you have the "Display the IP..." option
(Settings->Security) enabled while interrogating the system?
Thanks.
On Wed, Aug 15, 2012 at 6:04 PM, A. Megas <textbrowser@xxxxxxxxx> wrote:
> What do you consider the latest release?
>
>
>>
>> ---------- Forwarded message ----------
>> From: Karsten N. <kn@xxxxxxxxx>
>> Date: 2012/8/15
>> Subject: Re: [tor-talk] http://torbrowser.sourceforge.net/
>> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
>>
>>
>> Hi,
>>
>> I tested the latest Dooble release with SOCKS5 proxy (with Tor) and HTTP
>> proxy (with JonDo) and the preconfigured I2P proxy for eepsites.
>>
>> It leaks DNS queries and FTP requests in all cases. Yes - it leaks DNS
>> queries with the preconfigured I2P proxy too. At first the system DNS
>> resolver (defined in /etc/resolv.cónf) was asked for *.i2p domains.
>>
>> The issues are Webkit related. Other Webkit browsers like Google Chrome,
>> Rekonq and others are affected too.
>>
>> In my opinion Webkit-based browsers are not suited for anonymous surfing
>> with Tor or any other anonymisation service.
>>
>> Best regards
>> Karsten N.
>> _______________________________________________
>> tor-talk mailing list
>> tor-talk@xxxxxxxxxxxxxxxxxxxx
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
>>
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk