Quote:
Originally Posted by DaveOrion
|
I'm trying to find the site that checks it, but combinations of settings and extensions produce unique identifiers for almost everyone's browser that can be identified by a server on the other side of a Tor circuit. There's also the possibility of interception of data by other computers inside the Tor circuit, there's a fair amount of credible evidence that Wikileaks got a bunch of documents by running Tor exit nodes and sniffing traffic exiting the relay circuits.
Quote:
Originally Posted by Zeraph
Hmm, maybe you should define, "cleaning up".
|
Following a member around the forum deleting a constant stream of worthless posts and threads intended to be disruptive.