<br><br><div class="gmail_quote">On Wed, Dec 22, 2010 at 8:39 AM, 7v5w7go9ub0o <span dir="ltr"><<a href="mailto:7v5w7go9ub0o@gmail.com">7v5w7go9ub0o@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
<div class="im">On 12/22/10 08:38, Praedor Atrebates wrote:<br>
> I have always been disturbed by the fact that javascript or flash<br>
> can sidestep tor and give away your real IP. Is there truly no way<br>
> to control one's own computer so that any and ALL traffic that goes<br>
> out to the ethernet port or wlan gets directed through tor no matter<br>
> what? Can any combination of software and hardware prevent software<br>
> on one's own computer from acting the way someone else wants rather<br>
> than as the owner wants? I would love to be able to use javascript<br>
> and flash (some site require one or the other or both to be<br>
> functional) and know that ANY traffic that exits my own system WILL<br>
> be directed through the tor network.<br>
><br>
><br>
<br>
</div>Any and ALL suggests a machine that allows only HTTP/S activity to/from<br>
a TOR process; to/from a TOR entry node; all other traffic (e.g. UDP<br>
from some sneaky plugin) is blocked.<br>
<br>
An iptables script or Windows firewall could do that. Presumably a<br>
second script would be invoked for normal operation.<br>
<br>
Alternatively, VMs dedicated to TOR applications could achieve your<br>
goal, plus protect your box if something grabs your e.g. browser and<br>
tries to sniff around.<br><br></blockquote><div>JanusVM(.com) does exactly this and works with any OS.</div><div><br></div><div>Best regards,</div><div><br></div><div>Kyle </div></div><br>