[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: How are hackers breaking Tor and trojan users?



On Tue, 10 Jun 2008, MadAtTorHackers wrote:

> Is there a safe Tor Virtual Machine to use?

as always.. define what is "safe".

For me, Foxyproxy+Polipo+Tor is enough.


-- 
Florian Reitmeir