I would be VERY wary of using anything but tor distributed tools.
Does tork use the tor from upstream?
They frequently release security and bug fixes which are critical for this type of network
If so, awesome! If not and tde is using an outdated tor library we should drop it On Feb 12, 2014 3:45 PM, "David C. Rankin" drankinatty@suddenlinkmail.com wrote:
All,
I had never built tork before and had no idea what it was, much less what it did -- well -- it works! Basically it is an internet anonymity extension and functions both as a proxy client and proxy server (configurable). It is basically a tool that allows you to browse/email/ssh anonymously. I still have no idea how to fully use it, but it was refreshing to see that some random app near the end of the applications build tree -- works -- without a lot of CPR. I haven't checked the code, but did see KDE4 patched tork for ipv6. We may need to do that as well.
http://www.3111skyline.com/dl/dt/trinity/ss/tork-01.jpg
-- David C. Rankin, J.D.,P.E.
To unsubscribe, e-mail: trinity-devel-unsubscribe@lists.pearsoncomputing.net For additional commands, e-mail: trinity-devel-help@lists.pearsoncomputing.net Read list messages on the web archive: http://trinity-devel.pearsoncomputing.net/ Please remember not to top-post: http://trinity.pearsoncomputing.net/mailing_lists/#top-posting