Separate from the Tor traffic, Apple and any routers along the path to Apple (e.g. However, only on the paths used to the Tor exit node. Of course anyone eavesdropping nearby can detect the Tor traffic itself. Because the request is sent when you open the application, as a side effect it reveals your approximate location (to anyone third-party eavesdroppers not just Apple) and an accurate timestamp, of the moment when you opened Tor. The stuff about street address etc is wrong, but not completely wrong. That will show up each time you run it after updating to a new version. ![]() ![]() Gatekeeper does tell Apple the hash of the application. ![]() Gatekeeper also runs, though only the first time each new executable is run. That's certainly enough to tell Apple you are running Tor Browser, Tor itself, or something else from the Tor project!Īlso that's only OCSP which runs often. The OCSP request still tells Apple the developer ID, which for some software is just as revealing.įor the Tor Browser, the developer ID used with OCSP is: It's not false except in some insignificant details.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |