Anonymous Blogging

Fabian Keil freebsd-listen at fabiankeil.de
Wed Nov 15 18:21:37 UTC 2006


RMS <gnu.rms at gmail.com> wrote:

> > > If you don't enable hide-forwarded-for-headers you are sending your
> > > client's IP address to the web server. If you aren't using NAT,
> > > this will obviously affect your anonymity.
> >
> > If you're running Privoxy on the machine you are using to browse, and
> > you're connecting using the address "127.0.0.1," the Forwarded-For
> > header should read "127.0.0.1," so there's no real threat.
> 
> I cannot find the parameter "hide-forwarded-for-headers". Is it in one
> of the files I had cleared?

It's usually in default action.
 
> Anyway, my masked IP was tested to be a Tor node from the detector.
> Can I conclude that the 3 files can be safely cleared without
> compromising on my anonymity?

You can use:
http://config.privoxy.org/show-request
to see how Privoxy is changing the request headers.

If you are using the setup jgt described (which is the default),
Privoxy should indeed only send 127.0.0.1. While this isn't enough
to compromise your anonymity by itself, it would still make user
tracking easier.

Fabian
-- 
http://www.fabiankeil.de/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20061115/bef28f96/attachment.pgp>


More information about the tor-talk mailing list