How are hackers breaking Tor and trojan users?

Arrakis arrakistor at gmail.com
Tue Jun 10 18:04:24 UTC 2008


Foxyproxy+Polipo+Tor will not be immune.
xB Machine and JanusVM will be immune to the attack.

Steve

Florian Reitmeir wrote:
> On Tue, 10 Jun 2008, MadAtTorHackers wrote:
> 
>> Is there a safe Tor Virtual Machine to use?
> 
> as always.. define what is "safe".
> 
> For me, Foxyproxy+Polipo+Tor is enough.
> 
> 



More information about the tor-talk mailing list