d33p

Group: Members
Posts: 11
Joined: April 2007 |
 |
Posted: April 16 2007,00:24 |
 |
Was working with DSL to check its suitability for secure browsing, and discovered a disconcerting, borderline deal-breaking occurrence: Dillo leaks reverse-DNS info. With the Tor/Privoxy extension running, showmyip.com will verify that Dillo is running an onioned ip. However, at shieldsup! it very blithely reveals the true IP address via reverse-DNS. Is there any way to close this hole? I liked Dillo initially because I thought it would be more privacy friendly, but this has made me reconsider. Ideas?
D33P
|