Set up a webproxy to TOR - tor-proxy.net

Ricky Fitz calypso at satyr.ath.cx
Sun Sep 23 23:54:01 UTC 2007


Hi Bluestar,

> First: Another single-point-of-trust service. Principally a bad idea,
> because *you* know all the sites the users are surfing to! Why should I
> (as user) trust you?

Of course, that is true, and I mention it in the FAQ. But you can ask
every anonymizer on the web the same question. Of course it is better to
use TOR by yourself, but as I said, it is not made for people who can
run their own TOR-Session.

> Your HTTP-VIA  	 1.1 v31663.1blu.de:8080 (squid/2.6.STABLE1)
> 
> Like this you are uncovering the the first onion hop (yourself).
> 
> You should fix that, at least!

Thanks a lot for that hint, should be fixed now.

Best regards,
Ricky.
-- 
"Falls Freiheit überhaupt etwas bedeutet, dann bedeutet sie das Recht
darauf, den Leuten das zu sagen, was sie nicht hören wollen." 
- George Orwell, aus dem Nachwort zu "Animal Farm", 1945 -

GPG-Fingerprint: 10D6 7B8F 1F7C 7CB1 2C4E 930E AFD2 FDF3 A10B D302
GPG-Key-ID: AFD2FDF3A10BD302
http://www.lawlita.com/pgp-schluessel/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Dies ist ein digital signierter Nachrichtenteil
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20070924/c688045a/attachment.pgp>


More information about the tor-talk mailing list