I would be VERY wary of using anything but tor distributed tools.

Does tork use the tor from upstream?

They frequently release security and bug fixes which are critical for this type of network

If so, awesome! If not and tde is using an outdated tor library we should drop it

On Feb 12, 2014 3:45 PM, "David C. Rankin" <drankinatty@suddenlinkmail.com> wrote:
All,

  I had never built tork before and had no idea what it was, much less what it
did -- well -- it works! Basically it is an internet anonymity extension and
functions both as a proxy client and proxy server (configurable). It is
basically a tool that allows you to browse/email/ssh anonymously. I still have
no idea how to fully use it, but it was refreshing to see that some random app
near the end of the applications build tree -- works -- without a lot of CPR. I
haven't checked the code, but did see KDE4 patched tork for ipv6. We may need to
do that as well.

http://www.3111skyline.com/dl/dt/trinity/ss/tork-01.jpg

--
David C. Rankin, J.D.,P.E.

---------------------------------------------------------------------
To unsubscribe, e-mail: trinity-devel-unsubscribe@lists.pearsoncomputing.net
For additional commands, e-mail: trinity-devel-help@lists.pearsoncomputing.net
Read list messages on the web archive: http://trinity-devel.pearsoncomputing.net/
Please remember not to top-post: http://trinity.pearsoncomputing.net/mailing_lists/#top-posting