• @southerntofu
    link
    32 years ago

    The original post

    Well Tor has its limits but given the resourcefulness of this attacker, they’re probably someone who has/wants access to a lot of traffic even if it does not go through the tor network :)

    • @ZerushOP
      link
      -3
      edit-2
      2 years ago

      If you use TOR in the OpenWeb, go to browserleaks and you’ll see, that it isn’t more private as any othher privacy focused browser with some extensions, only slower. The only proposit of TOR is the capability to access the .onion, but even this don’t protect you, when you use TOR there without a VPN.

      • @southerntofu
        link
        22 years ago

        I don’t understand your point. TBB is specifically hardened against leaks (that’s why WebRTC is entirely disabled for example) and fingerprinting. What kind of leaks exactly are you suggesting?

        If you mean that using any random browser (eg. Chrome/Firefox) over Tor is insecure, we agree. That’s why we have Tor Browser in the first place, and that’s literally one of the first things taught in privacy workshops.

        • @ZerushOP
          link
          02 years ago

          Have you tested it in Browserleaks? There you will see, how private is the browser. Apart it don’t serve me if the browser blocks trackers and fingerprints, when the Browser itself do it, also Firefox, which send data to Alphabet.Inc, NEST and Google.