Fucking, yes, there are 80% of extensions that I designated - worth Access Your Data for All Websites
And what does it mean - that anyone can view any of my open tab (and therefore read the private key from the mixer)?
So I do not understand, I still have no more extensions - but users of their dozens and hundreds.
You only need one malicious extension to cause a problem though (idk if those are malicious or not but it does mean they can read what you're doing and ought be sending it back to themselves - pretty sure Microsoft and Google plugins do at least that).
Oh errrr. I think there's a known problem with using clearnet services over tor since the exit node, if malicious, can serve you it's own website instead of chipmixer's which might have happened in this case. I'm not sure exactly how that works though.
You really should update tor too... But the v2 service is still accessible and probably archived in many places if you need to cross reference it.
I used VPN after torus. In particular from Hotspot Shield. Especially in order for malicious weekends to do anything ... At least I once studied that it is so safe (but the output torch is unsafe). I do not remember that I have broken the connection.
If the vpn is at the end then that's fine, I didn't know you could do that did you just not enter a tor circuit?
In short, I generally confused and I'm afraid to visit anything, where there are private data on the web page ...
That sounds quite reasonable though, especially from having so many plugins enabled. Other than the translation, you should try and do a separate install of the browser for the rest.
Let's like this - I have a browser tor, I will renew it and it is the latest version.
If I want them to visit the clearing site - how can I do it safely? With the main output tor (there is 10% of the weekend infected nodes, how I heard) or after the main output tor + VPN?
Sorry, not in the topic .. But I lost money. And as in just mind, go to your mixer and on any online wallets - the same coinb.in - already without a concept ...
If you trust your vpn provider then the best case scenario is going to be using the clearet site with just the vpn and no onion routing/tor.
I don't think you can insert your vpn between the tor exit node and chipmixer either, and if you do it'll probably denonumise yourself anyway - if you're using it out of concern they're keeping logs.