<br><div><span class="gmail_quote">On 9/27/07, <b class="gmail_sendername">Benjamin Schieder</b> <<a href="mailto:blindcoder@scavenger.homeip.net">blindcoder@scavenger.homeip.net</a>> wrote:</span><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
On 27.09.2007 10:32:51, Marco Bonetti wrote:<br>> hi all,<br>> I've just read a couple of interesting blog posts which I like to share<br>> with you. Nothing really new, but they denote a growing interest in the
<br>> deanonymizing tor field.<br>><br>> ha.ckers original post:<br>> <a href="http://ha.ckers.org/blog/20070926/de-anonymizing-tor-and-detecting-proxies/">http://ha.ckers.org/blog/20070926/de-anonymizing-tor-and-detecting-proxies/
</a><br>> Maone followup:<br>> <a href="http://hackademix.net/2007/09/26/cross-browser-proxy-unmasking/">http://hackademix.net/2007/09/26/cross-browser-proxy-unmasking/</a><br><br>And that is exactly why you use Tor's TransPort to route all traffic that
<br>is not already Tor traffic through Tor.<br>Happy guessing where I'm from :-)<br><br><br>Greetings,<br> Benjamin<br>--<br>The Nethack IdleRPG! Idle to your favorite Nethack messages!<br><a href="http://pallas.crash-override.net/nethackidle/">
http://pallas.crash-override.net/nethackidle/</a><br><br></blockquote></div><br><br>
PDFs are another example that will leak your real IP address.<br>
<br>
An example of this can be found here. <a href="http://www.janusvm.com/goldy/pdf/">http://www.janusvm.com/goldy/pdf/</a><br><br><br>