Delivery-Date: Mon, 06 Jun 2016 14:55:21 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [138.201.14.202])
	(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id C269B1E085E;
	Mon,  6 Jun 2016 14:55:19 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 84A25E09AA;
	Mon,  6 Jun 2016 18:55:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id A0574E092B
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 18:55:10 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id viZpv3ZDIQFd for <tor-talk@lists.torproject.org>;
 Mon,  6 Jun 2016 18:55:10 +0000 (UTC)
Received: from mx1.sigaint.org (mx2.sigaint.org [62.113.238.120])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "mx1.sigaint.org", Issuer "mx1.sigaint.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id ACE18E08BC
 for <tor-talk@lists.torproject.org>; Mon,  6 Jun 2016 18:55:04 +0000 (UTC)
Received: from sigaintevyh2rzvw.onion (localhost [127.0.0.1])
 by localhost (OpenSMTPD) with ESMTP id 11717fdf
 for <tor-talk@lists.torproject.org>;
 Mon, 6 Jun 2016 18:54:51 +0000 (UTC)
Received: from 127.0.0.1 (HTTP authenticated user katerimmel)
 by localhost with HTTP; Mon, 6 Jun 2016 18:54:51 -0000
Message-ID: <2f98fde968912a960feed647c78f9a24.webmail@localhost>
In-Reply-To: <e7ac9d56ad47ff3032af1d6ae3108599@riseup.net>
References: <1ff91eed47f14628f1e77bc3270169a0.webmail@localhost>
 <e7ac9d56ad47ff3032af1d6ae3108599@riseup.net>
Date: Mon, 6 Jun 2016 18:54:51 -0000
From: katerimmel@sigaint.org
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
X-Priority: 3 (Normal)
Importance: Normal
Subject: Re: [tor-talk] Tor doesn't connect over a proxy
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


>Your setup isn't safe. The proper setup is to have tor running in the
> "Proxy VM" and then then have the "App VM" tunnel all traffic over
> through the Proxy VM. I'm not sure why you are using JonDo. Since they
> first charge for their services and because of it have billing records
> and they are also proven to keep logs on the amount of bandwidth you
> use.
>
> Keep in mind they state:
> "Only the following non-individual-related information sent by your
> browser is stored:
>
> the visited webpage (URL)
> browser type=E2=80=89/=E2=80=89browser version
> operating system
> referrer URL (the site visited before)
> time of the server request"
>
> in their privacy policy.
>
> You are by no means anonymous while using JonDo nor safe as since they
> store the information they could be forced to hand it over. It puts you
> at risk. Just setup a traditional who-nix setup.

About this, isn't enough to buy service over tor and use bitcoin that come
from another source?

-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

