[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] torifying applications
> if it is possible to determine the
> identity of an attacker if he uses these applications behind tor.
Not unless these apps include the source IP or other info in
the packet payload.
> throughput ... latency
Those two. Some are happy with it. If not, go VPS.
> a socks proxy would not give the advantages of tor
Tor IS a socks proxy, use it.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk