Quote:
Originariamente inviato da riazzituoi
Per mantenere un anonimato sicuro bisogna assolutamente disabilitare i java script, i vari Activex, Adobe Flash Player (meglio usare un browser come firefox).
Comunque per fare un controllo puoi provare questo:
http://gemal.dk/browserspy/
Inoltre ti suggerisco anche di utilizzare delle regole appropriate per il firewall, e devi assolutamente leggere queste discussioni:
Can Java/Javascripts/Cookies reveal real ip behind VPN?
De-anonymizing Tor and Detecting Proxies
PS
naturalmente per una corretta navigaziona anonima tutti i file temporanei, i cookie, e i flash cookie devono essere eliminati, altrimenti si rischia di comprometere l'anonimato.
|
Dal dito segnalato da
riazzituoi http://www.wilderssecurity.com/showthread.php?p=994629 :
Quote:
Quote:
Originally Posted by hikuela
Proxy = My PC still has the same IP addy (1.2.3.4), but some internet traffic will be forwarded to a proxy (5.6.7.8 ), which fetches the page from the server (www.google.com), and the proxy returns the page to me. In this example all google knows is that someone at 5.6.7.8 requested a page.
|
This is correct.
Quote:
Quote:
Originally Posted by hikuela
However, if google decides to put ActiveX/Java/JavaScript on it's site it can request my real IP address.
|
ActiveX and Java applets can be used to bypass a proxy by attempting to connect directly to the site concerned.
This can be blocked using a personal firewall (specifically one configured to allow your browser Internet access via the proxy only) as well as by filtering web pages, only allowing Java/ActiveX from sites that you really trusted (ActiveX can and really should be blocked completely).
I have not been able to find any way to do this with Javascript alone so this can be allowed if your only concern is with breaking anonymity - Javascript has plenty of other scope for abuse though, and is best blocked by default.
Correggimi se sbaglio, ma se imposto la macchina per dialogare solo via Privoxy, e dunque solo con quelle porte indicate dal sito Tor, dovrei essere immune da un tentativi di collegamento diretto da parte del sito che sto visitando o con cui interagisco? Aggiungo se c’è la possibilità che il router possa mandare indietro una richiesta di echo o icm o simili senza che io lo veda mandando nuovamente il mio ip originale al sito in questione?
Ho capito bene?
Quote:
Quote:
Originally Posted by hikuela
...(no idea, but I'd guess some P2P would contain your real IP address as a return address).
|
"Real IP" addresses can only be leaked if the software is actually aware of them - since many users are on broadband with NAT (Network Address Translation - used for sharing a connection between multiple PCs) routers, their computers will not have a "Real" IP address but a private one (typically in the 192.168.x.x range) instead. Programs do not have to include a return IP address themselves since it is included in every packet sent and due to the use of private IP addresses (that then get modified on-the-fly by NAT routers), most won't be aware of the "real" IP address.
Quote:
Quote:
Originally Posted by hikuela
VPN = your computer forgets it's original IP addy (1.2.3.4), assumes the new IP (5.6.7. and forwards *all* traffic through it, not just proxy aware software. Anything leaking info should leak the new IP, not the original IP. At least that's how I'd hope it would work.
|
It doesn't in most cases - all that a VPN offers is an encrypted connection to a proxy. The encryption means that the connection itself should be safe from eavesdropping, hence the "virtual private" title. Some VPN software handle this by creating a "virtual network interface" in Windows (one way to ensure that all traffic goes through it) but there is no "forgetting an IP address" involved here - the computer will still have an internal IP and an external one.
Non ho capito una mazza...