Feb 9 20:32
I discovered that Tor leaks my hostname. When I use proxychains in verbose mode I can see the DNS lookup goes through Tor. Tor sends my hostname for localhost to the DNS server. It does this for every request. So every Tor exit node and Tor DNS can map every request I make to my internal hostname. This gives them a complete profile of all my browsing. Then they can check with my ISP to see who has this hostname in their WAN. There's no reason for tordns to use my internal hostname for anything whatsoever, most of all a DNS lookup. This is zero protection and zero privacy. Tor is worthless.
Feb 9 20:45
Nothing new. Tor is a NSA product.
Feb 9 20:51
> When I use proxychains in verbose mode I can see the DNS lookup goes through Tor. So you see that SOMETHING is sending DNS requests for your local hostname THROUGH Tor, so TOR is the one leaking your info?
Feb 9 21:19
It should not be possible. Tor should immediately recognize a DNS request for any hostname that is not IANA compliant domain name and drop it. The fact it does not is troubling. All the operators of exit nodes and lookup servers are and have been noticing this all day long for YEARS, and it hasn't been patched. What a convenient coincidence.
Feb 17 23:06
BE ADVISED that many services are now placing customers in CGN pools ( another layer of NATting ) those doing so were often triggering noscript blocks in browser profiles : "Request access to LAN resources" I do not take that to be a coincidence; it started happening as soon as I was using evasion against the more clumsy DPI / tor blocklist using providers that had NOCs equipped to identify and "teleport" tor traffic IANA IP assignments to other places. Especially obfuscation plugins Countermeasures are possible with some IANA CGN ranges.
Feb 23 08:24
Try using OpenVPN with "block-outside-dns" option.
|d®úg pÛ§HëR$ ÃRë §çÛm||Feb 25 00:23||5|
|boost your credit score in 24 hours||Feb 24 23:35||5|
|Can't use Tor over Bitmessage||Feb 24 09:41||17|
|FLAT EARTH, why is there even a debate? ✞||Feb 24 09:17||1|
|JESUIT CONTROLLED PUTIN EXPOSED||Feb 24 09:15||1|
|Something About the Space X Launch Nobody's Talking About||Feb 24 09:09||1|
|Consider this problem.||Feb 24 09:06||2|
|http://33xtkivab2nthghe.onion/7uim34gdxs5z6b5l72nbji7ste||Feb 24 08:36||1|
|Mitigating exploited software with firejail||Feb 24 01:56||2|
|Tor / Proxychains is leaking my hostname||Feb 23 08:24||6|
|The Hidden Faith of The Founding Fathers||Feb 23 04:18||1|
|@S3 ... SPOOQKE ... Secure Pair Orthogonal OTP Quantum Key Exchange||Feb 22 14:04||3|
|Your Mama 1$ §çÛM||Feb 18 21:00||1|
|dRúG pú§HëR§ Ã®ë $ÇúM||Feb 18 20:27||1|
|Ð®ÛG þÛ$hÊR$ ÃRë §Çúm||Feb 18 19:29||1|
|Globewashing||Feb 18 07:42||1|
|Critical vulnerability in v0.6.2||Feb 17 14:50||2|
|Download it.||Feb 17 07:58||2|
|$ cd PyBitmessage ; git log | grep Author | sort -u | blacklist||Feb 16 02:20||1|
|lock down a computer with tor||Feb 13 10:38||3|
|privacy software / services list||Feb 11 12:32||6|
|About the political war against data security, good read||Feb 10 14:55||4|
|hacker service?||Feb 10 03:40||1|
|Using banknotes as ID tokens - sources for citation||Feb 9 15:12||2|
|bump||Feb 8 07:24||1|
|WARNING! denial of service message||Feb 8 01:55||2|
|Susimail on i2p||Feb 7 22:54||2|
|Not important human is back||Feb 7 12:08||4|
|Anonymous VCS||Feb 6 10:40||3|
|[chan] 411 BM-2cW53MzWqtod8TA6vybdUeqd2LhTuXCX3L||Feb 5 11:47||1|
|Did the NSA ‘create’ Satoshi Nakamoto?||Feb 3 07:55||1|
|second hand cpu?||Feb 2 12:00||1|
|Help needed with identying crypto paper||Feb 1 12:26||1|
|Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government||Jan 31 11:05||11|
|Public announcement||Jan 30 14:53||1|
|OMEGA user survey||Jan 30 12:57||4|
|Fwd: Re: OMEGA user survey||Jan 30 09:31||1|