Focus on Microsoft
Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Jan 12 2011 06:43PM
Lee Fisher (blibbet gmail com)
> What are the security implications of running a Tor relay on a machine
> behind a firewall?
This is a MS-focused list. Tor is designed by Unix developers, and works
best (read: most securely) on Debian. Not Windows.
You should view the archives of or-talk, and try asking there if you
[ more ]
Copyright 2010, SecurityFocus