A different solution for anonymous browsing !
Taka Khumbartha
scarreigns at gmail.com
Sun Nov 19 05:09:57 UTC 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
gabrix @ 2006/11/16 04:28:
> I invite everyone , who is trying , tryed or is actually applying a
> chain of proxies for browsing,like manies one after the other , or
> unusual proxies configurations for anonymous browsing different from
> the usual tor/privoxy duo,socat,anonweb,polipo,squid,wwwoffle, to let me
> know .... thanks !
>
i'm not sure why you are wanting to do this. but, if you are trying to be "more anonymous", then this is not the right approach. here's why:
as i have been told (and please correct me if i'm mistaken!), basically, every OS-browser-proxy(-et.al.) combination is going to leave behind a unique footprint that can be tracked by a skilled adversary. the more complicated you make your chain of proxies, the more unique footprint it will leave. in this respect it is best to stick with a configuration more people use, hence anonymity. good luck.
on the other paw, if you are doing such a thing so you can research these unique footprints and compile a database of sorts, please share your results! the more we know, the better each application can be tuned so as to minimize and converge such unique footprints.
-----BEGIN PGP SIGNATURE-----
iD8DBQFFX+cPXhfCJNu98qARCIJJAJ9uRkIwWjdzCXd4e0m0rTl9Y4epbgCgwt+a
l/eX/LuFVwjEY+FZi+uGVic=
=mTGS
-----END PGP SIGNATURE-----
More information about the tor-talk
mailing list