[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
- To: or-talk@xxxxxxxxxxxxx
- Subject: DNS
- From: "Watson Ladd" <watsonbladd@xxxxxxxxx>
- Date: Sat, 18 Mar 2006 07:00:07 -0500
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivery-date: Sat, 18 Mar 2006 07:00:12 -0500
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type; b=aVNpR7tXItCrQN3HUVgnQzUOhWsK2+ev9gNI7+XV5cZ6jTAA3W+fwl7abA2CihTq67n+g1eamlO+w4E50CRHJsuDQqQNLeV8By8oe9Yt4IuJHAs67+/68Uz9gW+XyVf2pkbwestT4s+MaEtU6LmW3CAcdc6n9GtKeaPMT7lQCzk=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
We can protect TCP connections, right? So applications should be modified to use TCP connections for DNS and send the connections through Tor.
That will anonymize DNS. We also could have Tor itself do this for the DNS queries. Any suggestions?
"Those who would give up Essential Liberty to purchase a little Temporary Safety deserve neither Liberty nor Safety."
-- Benjamin Franklin