![]() Also, the applications running in any VM behind the Tor proxy are not able to determine any globally identifiable IDs, such as the user’s external IP address, the real MAC address used by real NICs, etc. This is because such applications have no way to generate traffic to the outside world without going through our Tor proxy (unless they could exploit a hypothetical vulnerability in the Tor process running in the Tor VM). ![]() Our Tor proxy would forward only the Tor traffic, so we don’t have to fear about some Tor-not-aware applications, or even intentionally malicious ones to compromise the privacy of our connection. This was written by Rutkowska on her blog touting the strength of TorVM (emphasis mine): ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |