Delivery-Date: Fri, 29 Aug 2014 07:30:00 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DATE_IN_PAST_03_06,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 398A81E0A6E;
	Fri, 29 Aug 2014 07:29:59 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 612A030C06;
	Fri, 29 Aug 2014 11:29:52 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 532BD30BCF
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 11:29:48 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id L2Cv3hMZXCAz for <tor-talk@lists.torproject.org>;
 Fri, 29 Aug 2014 11:29:48 +0000 (UTC)
Received: from outmail15.unseen.is (outmail15.unseen.is [82.221.107.102])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client did not present a certificate)
 by eugeni.torproject.org (Postfix) with ESMTPS id 1BABE30A61
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 11:29:47 +0000 (UTC)
Received: from mail.unseen.is (unknown [192.168.10.134])
 by outmail15.unseen.is (Postfix) with ESMTPS id B08E880087
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 04:29:43 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
 by mail.unseen.is (Postfix) with ESMTP id 93B9C40FDD
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 04:29:43 -0700 (PDT)
X-Virus-Scanned: Debian amavisd-new at mail.unseen.is
Received: from mail.unseen.is ([127.0.0.1])
 by localhost (mail.unseen.is [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id oFzntJ4VVSia for <tor-talk@lists.torproject.org>;
 Fri, 29 Aug 2014 04:29:39 -0700 (PDT)
Date: Fri, 29 Aug 2014 10:05:39 +0200
From: John Doe <wedeserveprivacy@unseen.is>
To: tor-talk@lists.torproject.org
In-Reply-To: <20140828200724.GE26132@csail.mit.edu>
Mime-Version: 1.0
Message-Id: <20140829112943.93B9C40FDD@mail.unseen.is>
Subject: [tor-talk] To run tor browser on main system or this idea instead.
 Which wins for security?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============7042412089555462911=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

--===============7042412089555462911==
Content-Type: multipart/signed; protocol="application/pgp-signature";
 micalg="PGP-SHA256";
 boundary="Signature=_Fri__29_Aug_2014_10_05_39_+0200_30GQyfO.z1A=nHKc"

--Signature=_Fri__29_Aug_2014_10_05_39_+0200_30GQyfO.z1A=nHKc
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Which is most better, to run the tor browser bundle on your real computer w=
hich has internet its self,or to run tor on your real system and use defaul=
t fire fox inside a linux virtual computer and set the proxys to your tor r=
unning on the network (your real computer)? This in my theory will make the=
 best protection because the virtual computer can be made to only network w=
ith the host real one which means the linux has no internet of its own. Doe=
s'nt this mean you can safelhy use all plugins and extensions? Do everythin=
g on this linux in safety??

Please, I would like to have a discussion relating to this idea.

thanks

--=20
John Doe <wedeserveprivacy@unseen.is>

--Signature=_Fri__29_Aug_2014_10_05_39_+0200_30GQyfO.z1A=nHKc
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iF4EAREIAAYFAlQANFMACgkQ0XAN05WnAQ5F9AD/eJNHMlzuGBxuwTnKkjqT1WRA
z99/yb1dH0O05QhXr2IA/1siDcKJXGgIX1CB9GEfGIa8KZZ9VsiUAtGDgOiXvL2W
=Y0zZ
-----END PGP SIGNATURE-----

--Signature=_Fri__29_Aug_2014_10_05_39_+0200_30GQyfO.z1A=nHKc--

--===============7042412089555462911==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============7042412089555462911==--

