[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] http://torbrowser.sourceforge.net/



Do you mind testing a beta release of 1.35 with respect to this issue?

Thanks.

On Wed, Aug 15, 2012 at 11:35 PM, Karsten N. <kn@xxxxxxxxx> wrote:

> On 08/16/2012 01:06 AM, A. Megas wrote:
> > I recorded some raw and extremely verbose tcpdump data while visiting
> > ftp.debian.org using version 1.35 of Dooble. I'm unable to locate any
> > mention of the visit in the log. I also visited ftp.netbsd.org as I may
> > have some cached DNS queries. My browsing FTP settings are:
> > 219.111.10.220:8080, socks5. Version 1.35 doesn't use QFtp.
>
> I used the latest available download for Linux64 (version 1.31) from
> http://sourceforge.net/projects/dooble/files/
>
> > As for other
> > leaked information, did you have the "Display the IP..." option
> > (Settings->Security) enabled while interrogating the system?
>
> No.
>
> Best regards
> Karsten N.
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk