[tor-dev] Improving Private Browsing Mode/Tor Browser
Georg Koppen
g.koppen at jondos.de
Thu Jun 23 08:19:24 UTC 2011
> If you maintain two long sessions within the same Tor Browser Bundle
> instance, you're screwed -- not because the exit nodes might be
> watching you, but because the web sites' logs can be correlated, and
> the *sequence* of exit nodes that your Tor client chose is very likely
> to be unique.
Ah, okay, I did not know that. Thanks for that information. I was just
wondering how the proposed changes to the private browsing mode would
avoid being tracked by exit mixes (as the blog post claimed).
Georg
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20110623/dd7f359c/attachment.pgp>
More information about the tor-dev
mailing list