Delivery-Date: Fri, 29 Aug 2014 08:40:37 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id BA27A1E0B23;
	Fri, 29 Aug 2014 08:40:34 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 0860930C50;
	Fri, 29 Aug 2014 12:40:31 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 11AB930BA6
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 12:40:28 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id uy-0jSdktjlt for <tor-talk@lists.torproject.org>;
 Fri, 29 Aug 2014 12:40:28 +0000 (UTC)
Received: from sender1.zohomail.com (sender1.zohomail.com [74.201.84.156])
 by eugeni.torproject.org (Postfix) with ESMTP id CBA91309D1
 for <tor-talk@lists.torproject.org>; Fri, 29 Aug 2014 12:40:24 +0000 (UTC)
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=zapps768; d=zoho.com; 
 h=user-agent:in-reply-to:references:mime-version:content-type:subject:from:date:to:message-id;
 b=KNtZsUQrS9KtTvnS8pAvknwSB9eRGzlSs1b8sQJ4MFHZEMYWXCHg1/mBzcONjL4uW+OB2PjYJIKN
 JjaV27rNMIUCa4JQzcLGGEPTa1hDG4W1GsG1n3VNqVZzthawVUEN  
Received: from [100.108.236.56] (80.237.226.73 [80.237.226.73]) by
 mx.zohomail.com with SMTPS id 1409316019789654.0904802875349;
 Fri, 29 Aug 2014 05:40:19 -0700 (PDT)
User-Agent: K-9 Mail for Android
In-Reply-To: <20140829112943.93B9C40FDD@mail.unseen.is>
References: <20140829112943.93B9C40FDD@mail.unseen.is>
MIME-Version: 1.0
From: The Caped Wonderwoman <caped_wonderwoman@zoho.com>
Date: Fri, 29 Aug 2014 08:02:36 -0400
To: tor-talk@lists.torproject.org
Message-ID: <6fdd763c-fecd-4639-94a1-535f13ced6be@email.android.com>
X-ZohoMailClient: External
X-Zoho-Virus-Status: 2
Subject: Re: [tor-talk] To run tor browser on main system or this idea
	instead. Which wins for security?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

https://www.whonix.org/

https://www.whonix.org/wiki/Warning may answer some of your other questions.

Using a particular set of plug-ins and extensions makes it easy to identify your browser through fingerprinting. Although it is badly outdated at this point, panopticlick.eff.org has more information on that.

On August 29, 2014 4:05:39 AM EDT, John Doe <wedeserveprivacy@unseen.is> wrote:
>Which is most better, to run the tor browser bundle on your real
>computer which has internet its self,or to run tor on your real system
>and use default fire fox inside a linux virtual computer and set the
>proxys to your tor running on the network (your real computer)? This in
>my theory will make the best protection because the virtual computer
>can be made to only network with the host real one which means the
>linux has no internet of its own. Does'nt this mean you can safelhy use
>all plugins and extensions? Do everything on this linux in safety??
>
>Please, I would like to have a discussion relating to this idea.
>
>thanks
>
>--
>John Doe <wedeserveprivacy@unseen.is>
>
>
>------------------------------------------------------------------------
>
>--
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

- --
Sent from my Android device with K-9 Mail. Please excuse my brevity. And the cape.
-----BEGIN PGP SIGNATURE-----
Version: APG v1.1.1
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=4ZyU
-----END PGP SIGNATURE-----


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

