[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor 0.2.7.6 is released
-----BEGIN PGP SIGNED MESSAGE-----
> the changelog says "bugfix on 0.2.4.8-alpha" which means all tor
> releases since 0.2.4.8-alpha and released before 2015-12-10 are affected.
I'm just wondering if users that rely on maximum anonymity should switch
to 0.2.7.6, given it is still an unstable branch.
> but most ordinary users will probably (and should) just use torbrowser
> and the tor version that comes with it (so we might see an update there
I don't want to use torbrowser because of three things.
1. As I understand, torbrowser allows only browsing the web. I use tor
mainly with protocols different than http.
2. I have a tor node constantly in network, which is better both for the
network and for me, as I believe that there might be greater risk of
deanonymization by correlating when the node is up and when my network
activity takes place.
3. I have tor on one machine and all stuff that uses it on another
machine. Tor machine obviously has access to the Internet, while this
"user" machine has access only to the tor machine with a dedicated
interface. Access to anything other than tor socks port is externally
blocked. This way, even if some bug in browser (or any other program that
I use with tor) causes it to leak anything, I can be pretty sure that my
external IP address will never be exposed. This approach is similar to the
> If you want to read more about directory guards (compared to an entry
Thanks, I will read it.
Oskar Wendel, o.wendel@xxxxxxxxxxxxxxxxx
Pubkey at https://pgp.mit.edu/pks/lookup?search=0x6690CC52318DB84C
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to