Changes between Version 239 and Version 240 of doc/TorBOX


Ignore:
Timestamp:
Mar 3, 2012, 8:59:11 AM (7 years ago)
Author:
proper
Comment:

Advantages of TorBOX

Legend:

Unmodified
Added
Removed
Modified
  • doc/TorBOX

    v239 v240  
    3939 * All applications, including those that do not support proxy settings will automatically be routed through Tor^1^ Only those dependent on UDP and IPv6^2^ will still not function. Services that need to listen on publicly reachable ports (open/forwarded ports) are also not supported. However you may run [https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/OptionalConfigurations#hostinghiddenservicesOPTIONAL hidden services] which are reachable via Tor or tor2web ([https://trac.torproject.org/projects/tor/wiki/doc/tor2web be careful]).
    4040 * Protection against side channel attacks, no IP leaks possible^3^ To test for leaks see [https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/LeakTests TorBOX/LeakTests]
    41  * Java / flash / browser plugins cannot leak your real external IP^4^
     41 * Java / flash / browser plugins / [https://en.wikipedia.org/wiki/Malware Malware] / misconfigured applications cannot leak your real external IP^4^
    4242 * Uses only [https://en.wikipedia.org/wiki/Free_software Free Software]
    4343 * [https://www.torproject.org Tor]+[https://www.torproject.org/projects/vidalia.html.en Vidalia]^5^ and [https://www.torproject.org/projects/torbrowser.html.en Tor Browser] are not running inside the same machine. That means that for example an exploit in the browser can't affect the integrity of the Tor process.
     
    5757^2^ ICMP, ping, VOIP calls (in theory, untested), etc. ([https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO?version=425#AboutOnionCat OnionCat is a limited workaround])[[BR]]
    5858^3^ The operating system and applications behind the transparent Tor proxy (gateway) cannot determine the real external IP. Therefore they also cannot leak it as long as the network, gateway server, virtual machine or host system are not compromised as well.[[BR]]
    59 ^4^ This is still not recommended as they may decrease anonymity (e.g. flash cookies) and often have security vulnerabilities. Most popular plugins are closed source.[[BR]]
     59^4^ This is still not recommended as they may decrease anonymity (e.g. flash cookies) and often have security vulnerabilities. Most popular plugins are closed source. Leaks like [https://tails.boum.org/security/IP_address_leak_with_icedove/index.en.html here] are not possible.[[BR]]
    6060^5^ Vidalia is [https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/OptionalConfigurations#VidaliaforTorBOX optional][[BR]]
    6161^6^ If using Ubuntu for the client look into [https://wiki.ubuntu.com/OfflineUpdateSpec Offline updates] and see [https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/Dev/ClientVM#updatesoverTorshouldnotwasteTorbandwidth Development Discussion]