Tor / Proxychains is leaking my hostname

[chan] privacy
Feb 9 20:32

I discovered that Tor leaks my hostname. When I use proxychains in verbose mode I can see the DNS lookup goes through Tor. Tor sends my hostname for localhost to the DNS server. It does this for every request. So every Tor exit node and Tor DNS can map every request I make to my internal hostname. This gives them a complete profile of all my browsing. Then they can check with my ISP to see who has this hostname in their WAN. There's no reason for tordns to use my internal hostname for anything whatsoever, most of all a DNS lookup. This is zero protection and zero privacy. Tor is worthless.

[chan3] privacy
Feb 9 20:45

Nothing new. Tor is a NSA product.

[chan] privacy
Feb 9 20:51

> When I use proxychains in verbose mode I can see the DNS lookup goes through Tor. So you see that SOMETHING is sending DNS requests for your local hostname THROUGH Tor, so TOR is the one leaking your info?

[chan] privacy
Feb 9 21:19

It should not be possible. Tor should immediately recognize a DNS request for any hostname that is not IANA compliant domain name and drop it. The fact it does not is troubling. All the operators of exit nodes and lookup servers are and have been noticing this all day long for YEARS, and it hasn't been patched. What a convenient coincidence.

[chan3] privacy
Feb 17 23:06

BE ADVISED that many services are now placing customers in CGN pools ( another layer of NATting ) those doing so were often triggering noscript blocks in browser profiles : "Request access to LAN resources" I do not take that to be a coincidence; it started happening as soon as I was using evasion against the more clumsy DPI / tor blocklist using providers that had NOCs equipped to identify and "teleport" tor traffic IANA IP assignments to other places. Especially obfuscation plugins Countermeasures are possible with some IANA CGN ranges.

[chan] privacy
Feb 23 08:24

Try using OpenVPN with "block-outside-dns" option.

[chan] privacy
BM-2cUJvFYHhXpBHyd96KHfjxsgTYi44BajdE

Subject Last Count
d®úg pÛ§HëR$ ÃRë §çÛm Feb 25 00:23 5
boost your credit score in 24 hours Feb 24 23:35 5
Can't use Tor over Bitmessage Feb 24 09:41 17
FLAT EARTH, why is there even a debate? ✞ Feb 24 09:17 1
JESUIT CONTROLLED PUTIN EXPOSED Feb 24 09:15 1
Something About the Space X Launch Nobody's Talking About Feb 24 09:09 1
Consider this problem. Feb 24 09:06 2
http://33xtkivab2nthghe.onion/7uim34gdxs5z6b5l72nbji7ste Feb 24 08:36 1
Mitigating exploited software with firejail Feb 24 01:56 2
Tor / Proxychains is leaking my hostname Feb 23 08:24 6
The Hidden Faith of The Founding Fathers Feb 23 04:18 1
Why the f**k the theregister.co.uk need JavaScript to show the Feb 22 14:21 1
@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange Feb 22 14:04 3
Why the f**k the theregister.co.uk need JavaScript to show the content? Feb 22 12:47 7
Your Mama 1$ §çÛM Feb 18 21:00 1
dRúG pú§HëR§ îë $ÇúM Feb 18 20:27 1
ЮÛG þÛ$hÊR$ ÃRë §Çúm Feb 18 19:29 1
Globewashing Feb 18 07:42 1
Critical vulnerability in v0.6.2 Feb 17 14:50 2
Download it. Feb 17 07:58 2
$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist Feb 16 02:20 1
lock down a computer with tor Feb 13 10:38 3
privacy software / services list Feb 11 12:32 6
About the political war against data security, good read Feb 10 14:55 4
hacker service? Feb 10 03:40 1
Using banknotes as ID tokens - sources for citation Feb 9 15:12 2
bump Feb 8 07:24 1
WARNING! denial of service message Feb 8 01:55 2
Susimail on i2p Feb 7 22:54 2
Not important human is back Feb 7 12:08 4
Anonymous VCS Feb 6 10:40 3
[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L Feb 5 11:47 1
Did the NSA ‘create’ Satoshi Nakamoto? Feb 3 07:55 1
second hand cpu? Feb 2 12:00 1
Help needed with identying crypto paper Feb 1 12:26 1
Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government Jan 31 11:05 11
Public announcement Jan 30 14:53 1
OMEGA user survey Jan 30 12:57 4
Fwd: Re: OMEGA user survey Jan 30 09:31 1