Silk Road forums
Discussion => Security => Topic started by: OuterLimits on April 06, 2012, 01:11 pm
-
I noticed that when using the android tor app Orbot that it is using my isps dns servers instead of routing dns queries through tor. This is not the case on any of my laptops or on my jailbroken iphone running tor. This was verified using dnsleaktest.com
Just a heads up!
-
i tryed this with the orweb browser and had no leak...
orbot+orweb=secure
best is to tether your mobile connection.
-
Are you looking at the results from the dns tests? Because the inital page shows your tor anonymous ip etc, but its not untl you run the test that you can verify what dns server it is using for lookups.
-
oh there you go man, ONLY USE ORWEB when connecting to SR via your droid.....
-
I use Orweb as well and have had nothing go wrong with it yet (knock on wood..)
;D
-
also now that my phone updated to ICS(I fucking hate it, I miss my gingerbread!!) I have to use firefox with the proxy add-on I just have to remember to clear private data after every use as it saves history/cookies like a normal browser...
anyone know of add-ons that would eliminate this issue?
-
also now that my phone updated to ICS(I fucking hate it, I miss my gingerbread!!) I have to use firefox with the proxy add-on I just have to remember to clear private data after every use as it saves history/cookies like a normal browser...
anyone know of add-ons that would eliminate this issue?
Depending on how paranoid you are, I'd recommend having a check list for things to do after browsing Silk Road on your phone. That includes clearing private data manually, rather than trusting some third party add-on to do it for you.
-
yeah, no I was more so hoping that were was an add-on that made the browser into 'private browsing' like chrome and firefox on the PC have...
oh well, just means I can't forget to clear it...