Re: [tor-talk] Tragedy of the commons.

2013-05-24 Thread Joe Btfsplk

On 5/24/2013 12:39 PM, Chris Patti wrote:

I just had to shut my relay down because someone was using it to hijack
someone else's Gmail account :\

Dunno how I could get around this other than by blocking port 80, which is
kind of the point :)

How exactly does their hijacking attempt implicate your relay?  At 
least, to shut it down entirely?  I'm just asking.


If they used any other anonymous proxy, the hijacker's activities are 
his own - yes / no ?  I'm sure people hijack gmail accts all the time 
w/o using Tor.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] DNS provider that does not hijack failures

2013-05-30 Thread Joe Btfsplk

On 5/30/2013 6:07 PM, Sean Alexandre wrote:

On Thu, May 30, 2013 at 11:42:48PM +0200, Robin Kipp wrote:

We use OpenDNS on our network, and I know they provide an info page if someone 
attempts
to browse to a non-existant address. This isn't a big issue normally, but I can 
see how
it's a problem with Tor. Thus, I'd like to use a different DNS service for my 
node and
just put this in my resolv.conf to fix this. However, I'm not sure about which 
DNS provider
would be best here, so any help with that would be greatly appreciated!

Google Public DNS is one option:
https://developers.google.com/speed/public-dns/docs/using

OpenNIC has a list of some too, although I haven't tried any of these:
http://wiki.opennicproject.org/Tier2


Google? Oh, my.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] DNS provider that does not hijack failures

2013-05-30 Thread Joe Btfsplk

On 5/30/2013 8:11 PM, Sean Alexandre wrote:

On Thu, May 30, 2013 at 07:15:36PM -0500, Joe Btfsplk wrote:


Google? Oh, my.

Not ideal, I agree. What would you use, if your ISP's resolvers weren't an 
option? Also,
let's say you don't want to run your own DNS resolver. (Running your own 
resolver would
seem ideal, but extra overhead.)

I don't know.  I'm just not sure about Google.  No idea about their DNS 
resolver, but nothing they've done in years suggests that privacy / 
anonymity is anywhere near a top priority.  Mostly, just the opposite.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] DNS provider that does not hijack failures

2013-05-31 Thread Joe Btfsplk

On 5/31/2013 8:54 AM, Robin Kipp wrote:

Hi Joe and Sean,
thanks a lot for your suggestions and discussion!
I have to say Google DNS really isn't an option for me, because I simply don't 
trust Google. Even if they do have a decent privacy policy for their DNS 
service, they do store geographic information which I think is unacceptable for 
a DNS provider. I've considered running my own DNS resolver, however the 
problem is that I use a Soekris Net6501 embedded PC as my home server which is 
also running the Tor node, and I think a DNS resolver would simply cause too 
much overheat on this box.
Thanks a lot though, might have to consider other options if there aren't any 
other suggestions!
Robin

Again, I know nothing about Google's DNS service.  I do know they've 
been sued over or have been the target of serious outcries from privacy 
advocates  users, over their policies AND violating their own policies.


Axiom:  Google don't do nothin' for free.  There's something in it for 
them.  What - I've no idea.  Any contract or policy is only as good as 
the word of the company behind it - unless one wants to take them to court.


If one trusts Google to ensure privacy  / or anonymity, in spite of 
their long track record, well...


Why would they store geo info -  ONLY geo info?  Maybe to help 
understand where they need more / less capacity for DNS resolvers? Or 
something else?



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Questions about IT security - can TOR help? Are theyre other systems out there?

2013-06-02 Thread Joe Btfsplk

On 6/2/2013 7:22 AM, Randolph William Scott wrote:

Does Tor browser support a java plugin?

No

And if you download TOR, are there any insecure parts of the process?
No, don't think so.  It's a secure site.  Any insecurity would likely be 
in your browser; presence of  *possibly* insecure plugins (you mention 
java) and / or extensions (addons); or lack of some security enhancing 
addons (NoScript  others).
  
any ideas or validation would be nice. I have two weeks to get my

business up and running as its cost me years of work - and a month of
unbelievability at the obviousness of specific interference in the open.
I unfortunately, by reacting to secure my and my daughters and my
friends and business info, almost cover up any evidence someone doesn't
pilfer before hand i realised.

Don't know what this means.

Like the gmail account - libertybluebe...@gmail.com - attacked
immediately with DNS, spam, and delayed emails - and accessed by
google and had account information added not associated with me.
1st, if looking for privacy  a provider not data mining; using mined 
data or sharing, selling it, etc., Google / Gmail  many other large 
providers aren't the places for you.
Some details possibly missing.  Were you running a business email acct 
w/ lots of traffic under a free, individual user acct?
Though I don't really care for Gmail (I have a junk acct), their spam 
filters are generally pretty good (in my *free* acct).

It is deleted now - after google got sensitive info without actually
doing anything - so denying and pass on the info to others maybe.
Spotify, Elance, Peopleperhour, Australia Post, ASIC, ANZ - all -
gathered identifiable info, delayed, cross referenced,
Did you read Google's TOS?   It's straight forward that they'll take / 
use almost everything except your 1st born child.  Most businesses don't 
use Gmail, Yahoo, etc., email accts - for the reasons you mention.

im not one to watch my back all the time and
constantly redoing the same checks on my info is tiring
But you have to, if you want your data, transactions  business to be 
reasonably safe.  Every technology requires some knowledge  expertise 
to use it properly  safely.  Internet's no different.
If you're setting up business accts- on websites, email -  you don't 
have the knowledge  expertise to put proper safeguards  security in 
place, *you may need to hire professionals.*
Don't have the money?  What if your car breaks down  you don't have the 
knowledge to fix it?

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [liberationtech] NSA, FBI, Verizon caught red handed spying on US citizens in the US

2013-06-07 Thread Joe Btfsplk

On 6/7/2013 9:34 AM, Eugen Leitl wrote:

- Forwarded message from Richard Brooks r...@acm.org -

Date: Fri, 07 Jun 2013 10:20:26 -0400
From: Richard Brooks r...@acm.org
To: liberationt...@lists.stanford.edu
Subject: Re: [liberationtech] *NSA, FBI, Verizon caught red handed spying on US 
citizens in the US*

Not directed at Eugene.  This isn't new news, to anyone that's paid even 
passing attention, over last several yrs.

Further, it'd be ridiculous to think they're only monitoring Verizon.

Even when they're warned specifically about HUGE red flags, or 
individuals are ON WATCH LISTS, they STILL don't catch them in time 
(latest - Boston).


I'm sure they stop actions that we don't hear about (however, they DO 
like to toot their own horn)...


One respected commentator I heard posed the question, Are we safer? How 
many plots have been stopped or arrests been made in U.S., as result of 
all the Billions spent BY THE U.S., on monitoring?


We stopped the shoe bomber as result of tip from ? U.K.? (iirc)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] stop page image_thumb from appearing in tabs

2013-06-17 Thread Joe Btfsplk
Must have missed a memo about actual thumbnails (tiny) of pages 
appearing in each tab, in TBB 2.3.25-8.  Not icons - actual thumbs of 
pages.  I don't see that in regular fox, but maybe other addons block 
that behavior.


Do you have to edit an about:config entry to stop them from showing in 
the tabs?  Images are generally too small to be of much use  take up 
room for text.


Thanks.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] pages time out very fast_no network.http.proxy.keep-alive

2013-08-19 Thread Joe Btfsplk
Often sites I try to access w/ TBB time out almost instantly, where in 
Fx (23) same page, at same time - loads OK.
The pages aren't Tor aphobics - as they will sometimes load in TBB.  
Part could be THE IP address being used in TBB, to access a page, at 
specific time.  Some IPs could be on a / their black lists.


I'm not sure when using Tor proxy, the about:config 
*network.http.proxy.keep-alive* applies in TBB, but it's not present 
in TBB, by default.


But it's in Fx.  1st, in Fx for the similar 
*network.http.keep-alive.timeout* to work, *network.http.keep-alive*  
must be true.


In TBB, there's no *network.http.keep-alive* entry (or 
...proxy.keep-alive, if it exists) and no 
*network.http.proxy.keep-alive.*


I'm guessing? this results in sometimes almost instantaneous timeouts?  
In some cases, could be the sites timing out Tor Network connections or 
specific IPs from Tor?


May be coincidence - not tested it extensively, but when I add 
network.http.proxy.keep-alive entry  set True - in TBB, same few 
pages I have problems loading in TBB, seem to load more consistently and 
/ or faster.  This is w/ limited testing.


Anyone have insight on this topic?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Startpage, Ixquick not accessible

2013-09-30 Thread Joe Btfsplk
Has anyone else had problems accessing startpage, Ixquick  DuckDuckGo 
search engines w/ TBB recently?


For several days  several restarts of Windows TBB 2.3.25-12, their 
pages time out almost immediately on accessing them.


Restarted TBB, changed identities  closed current relays several times 
w/ same result.
I CAN still access google, Bing, Yahoo (sometimes)  any other searches 
like Amazon, Wikipedia, etc.  The ones still accessible load quickly.


I have NO trouble accessing Startpage / Ixquick or DDG via regular Fx 
23, which leads to believe the problem is tied to Tor relay addresses.


Haven't been on Tor-Talk for quite a while, so sorry if this has been 
discussed.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Startpage, Ixquick not accessible

2013-09-30 Thread Joe Btfsplk

On 9/30/2013 10:01 AM, Joe Btfsplk wrote:
Has anyone else had problems accessing startpage, Ixquick  DuckDuckGo 
search engines w/ TBB recently?


For several days  several restarts of Windows TBB 2.3.25-12, their 
pages time out almost immediately on accessing them.


Restarted TBB, changed identities  closed current relays several 
times w/ same result.
I CAN still access google, Bing, Yahoo (sometimes)  any other 
searches like Amazon, Wikipedia, etc.  The ones still accessible load 
quickly.


I have NO trouble accessing Startpage / Ixquick or DDG via regular Fx 
23, which leads to believe the problem is tied to Tor relay addresses.


Haven't been on Tor-Talk for quite a while, so sorry if this has been 
discussed.

Re:  log entries when access Ixquick, Startpage.

Immediately on trying to access these search engines that are 
unavailable, the ONLY entries appearing in Tor log after the failed 
connections are:


[Info] connection_edge_process_relay_cell(): data cell dropped, unknown 
stream (streamid 21351).


This same message also appears for other *successful* connections, so 
don't know it's particularly useful.  I don't have debug option 
checked in logging.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] panopticlick data

2013-09-30 Thread Joe Btfsplk
Info given on panopticlick.eff.org is a bit confusing in that some of it 
seems incorrect.  If that makes a browser more common, I guess it's a 
good thing.
But some of the info it shows as incorrect is very uncommon.  That 
doesn't mean someone trying to finger print a browser would get the same 
info that Panopticlick shows - or does it?


It showed an incorrect screen size and color depth.  Claiming in 1 in 
430370 browsers (systems?) have that specific characteristic - fairly 
uncommon.  Except monitor info is incorrect.
All that resulted in a claim that only *one in 1,721,479 browsers have 
the same fingerprint*.

https://panopticlick.eff.org

I don't know where / how it gets the screen size, but mine definitely 
isn't 947 wide.  It's actually a very common size.


I assume the color depth is bit value.  Panopticlick shows 24 (bit?), 
but there's not even a CHOICE of 24 bit in my display settings, for my 
monitor / graphics card combination.  Maybe I misunderstand how 
Panopticlick arrives at that value.


It surprised me that it estimated 1 in 76 browsers had the USERAGENT 
data given by TBB, of Windows 7 w/ Fx 17.  Other than possibly mostly 
TBB users going to Panopticlick (skewing the data) to check browser 
uniqueness, I doubt 1 in every 76 users in the U.S. or world wide, truly 
have Fx 17 in Windows 7.  Maybe I'm wrong.


I just wondered if others have checked their regular Firefox  TBB 
uniqueness on eff's site, to see if the data shown seems accurate for 
their system?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] panopticlick data

2013-10-01 Thread Joe Btfsplk

On 10/1/2013 12:48 AM, Andreas Krey wrote:

On Mon, 30 Sep 2013 21:08:58 +, Joe Btfsplk wrote:
...

No cookies are set, so that doesn't affect outcome.  In fact, the bits
of identifying information shown in results chart largely remain
identical (except screen size sometimes changes), but their estimate of
One in X browsers have the  same fingerprint as yours, keeps going
down dramatically - each time I re run the test.

How do you expect them to identify repeat visitors as opposed to
counting them as separate incarnations, thus lowering the uniqueness?

Not sure I understand the question in this context.  Without cookies, I 
don't expect them to identify repeat visitors.  I read their full paper 
on how they use the data collected 
https://panopticlick.eff.org/browser-uniqueness.pdf


Me visiting 2 - 4 more times, or even the other site visitors - *in the 
same 2 - 4 min. span*, wouldn't (actually) affect the statistics  lower 
their reported uniqueness estimate by factors of 2, 3 or more.


Repeating the test 4 times, almost immediately (clearing cache between), 
out of an existing data base of millions of other site visitors, 
wouldn't lower my uniqueness from 1 in 1.7 million, then to 1 in 
700,000, to 1 in 500,000.


I checked regular Fx again today  my uniqueness just keeps dropping w/ 
each test.  If I'd kept going, it may have gotten to, One in 100 
browsers have the same fingerprint.


Nothing changed about my browser between tests, so those huge 
decreases in my uniqueness would be statistically impossible, unless 
they had MANY millions of other visitors in the same few minutes I was 
testing - which they didn't.


Just now (10/1/2013), I checked both TBB 2.3.25-12 ( Firefox 23 - 
showing it's true useragent info).  Panopticlick showed TBB was over 3 
times LESS unique than regular Fx.  TBB:  1 in 689,000 vs Fx 23:  1 in 
203,000, at least in one test.  That may not be statistically 
meaningful, but it's a concern.
Most of the difference came from TBB reported screen size (which showed 
the correct screen width of my monitor), where Panopticlick shows 
regular Fx 23 screen width as 256 px LESS than TBB.  Not sure how that's 
possible for width.


The bigger point is, uniqueness values for either browser keep dropping 
*dramatically*, repeating the test a few times in just 2 - 3 minutes, 
when  browser characteristics didn't change.  Making the value of their 
estimates questionable.  I may contact them to see if they have an 
explanation for this.


Possible solution to make fingerprinting more difficult:  An extension 
or TBB design that regularly or randomly changes / spoofs values for 
some of the data used to calculate uniqueness.  There are extensions 
that change some (like useragent), but don't change it repeatedly.  To 
avoid tracking Tor users from entry to exit, some browser 
characteristics would have to change rapidly  often.


I have no idea if the current consensus is that trackers could identify 
a user from ONE request or a SINGLE entry / exit in the Tor network 
(making it hard, but not impossible to intentionally change browser 
characteristics during that short time).  Or... if they'd need to 
observe several entries / exits (or several requests  receipts 
involving same relays)  to conclude with high confidence that it is the 
same browser.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] panopticlick data

2013-10-01 Thread Joe Btfsplk

On 10/1/2013 12:06 PM, Nicolas Vigier wrote:

On Tue, 01 Oct 2013, Joe Btfsplk wrote:


Not sure I understand the question in this context.  Without
cookies, I don't expect them to identify repeat visitors.  I read
their full paper on how they use the data collected
https://panopticlick.eff.org/browser-uniqueness.pdf

Me visiting 2 - 4 more times, or even the other site visitors - *in
the same 2 - 4 min. span*, wouldn't (actually) affect the statistics
 lower their reported uniqueness estimate by factors of 2, 3 or
more.

Repeating the test 4 times, almost immediately (clearing cache
between), out of an existing data base of millions of other site
visitors, wouldn't lower my uniqueness from 1 in 1.7 million, then
to 1 in 700,000, to 1 in 500,000.

1st visit: 3 444 000
2nd visit: 3 444 000 / 2 = 1 722 000
3rd visit: 3 444 000 / 3 = 1 148 000
4th visit: 3 444 000 / 4 = 861 000
5th visit: 3 444 000 / 5 = 688 800
6th visit: 3 444 000 / 6 = 574 000
etc ...

Thanks.  I'm not a statistics major, so you may have to explain, but are 
you saying that the 1st time I visit w/ a given set of browser 
characteristics, and they've only seen 1:3,444,000 browsers w/ exactly 
the same traits, then on my 2nd visit, they've now seen 2 identical 
browsers in 3,444,001  = 1: 1,722,000.5?


All that seems to mean is, they've not seen many browsers like mine 
(poor distribution), IF... it started out as 1 in 3.44 mil, or anything 
close - as mine would be a VERY common setup.


All the individual characteristics tested were very common, per their 
results.  Most are  1:10  none  1:100, except the screen size (which 
seems incorrect).  Seems unlikely my 1920 width monitor only has 1664 
usable browser pane width (what they show). When they show *1920* 
width for TBB, but the 2 browser panes are the same in width.  Only 
thing taking up horizontal space on either browser is the vertical 
scroll bar, which are pretty much identical.


*NOTE:*  The *bits of identifying information* for individual browser 
characteristics (useragent, cookies enabled, etc.)  uniqueness (1 in X 
have this) of the INDIVIDUAL characteristics do NOT change, as you run 
the test repeatedly.
Those values must be calculated from a set data base  don't seem to be 
affected by your current visit.


Assuming trackers had a large enough sample space to have a high 
confidence level, for fingerprinting purposes, would it matter if only 1 
in 10,953, or 1 in 10,953,000 browsers were like yours?  As long as they 
could identify A browser w/ the same uniqueness (EXACT same 
characteristics - entering  exiting).  Even w/o Flash or Java enabled  
revealing system fonts, etc.


Only way I see that's not true is if 100's of users w/ EXACT same 
browser characteristics (right down to same screen characteristics), 
used the same entry / exit relays at the SAME time.  That's unlikely, 
unless TBB starts spoofing screen size, the same for everyone.


I believe in same TBB version (maybe the same in many versions) they 
spoof the useragent  time zone, but wouldn't differences in screen 
sizes  color bit ALONE, among a few users on one entry / exit 
combination, at a given moment be enough to fingerprint one user?



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] panopticlick data

2013-10-02 Thread Joe Btfsplk


On 10/2/2013 12:08 AM, Andreas Krey wrote:

On Tue, 01 Oct 2013 13:43:10 +, Joe Btfsplk wrote:
...

I believe in same TBB version (maybe the same in many versions) they
spoof the useragent  time zone, but wouldn't differences in screen
sizes  color bit ALONE, among a few users on one entry / exit
combination, at a given moment be enough to fingerprint one user?

Fingerprinting isn't about identifying the same session (there are
cookies for that), but about recognizing you on your next visit when
you come from a different IP/exit (or even the same)
I can't say if that is / isn't true.  If it is, goes back to my question 
/ pondering, if regularly changing some browser trait(s) (maybe w/ an 
extension, Tor Button) would make it much more difficult to conclusively 
say, This is the same person / browser.


Seems unlikely that all TBB users having the exact same browser 
characteristics is going to happen.  It's good in theory, but may be 
unrealistic.  Perhaps approaching the issue from a more realistic 
standpoint is worth looking into?


Chaos is easier to achieve than perfection.  Wondering:  in practice, 
which would be easier to achieve and / or be more successful at 
preventing fingerprinting:


Trying to make all TBB users look identical or constantly changing 
(spoofing) some browser characteristics (ones that DON'T break 
functionality), so that every TBB browser is constantly changing it's 
profile?
Perhaps call it SSTBB - shape shifter TBB.  There may be drawbacks to 
*regularly* changing ANY characteristics used for fingerprinting.  Just 
a thought.  Definitely problems w/ the current method of trying to make 
everyone look identical.

Screen/Window size spoofing is pointless as there are many ways of finding
out the actual window size. And colors are pretty much always 24bit anyway.

Does the issue of other ways to  find the actual screen size value, 
apply to other browser traits as well (some / many)?  If so, possibly 
ONLY turning of java script would prevent much of that. Unfortunately, 
that breaks at least part of many sites.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 2nd, 2013

2013-10-02 Thread Joe Btfsplk

On 10/2/2013 7:00 AM, harmony wrote:


Tor Weekly NewsOctober 2nd, 2013


On September 28th, Mike Perry released the fourth alpha of the new Tor
Browser Bundle 3.0 series [1] It also fixes a fingerprinting issue
by randomizing the TIMESTAMP sent when establishing an HTTPS connection.

Why limit the randomization of browser characteristics or other data to 
just the timestamp?


Why not randomize certain other data or browser characteristics (that 
wouldn't break functionality)?  This goes back to my post containing the 
concept of it being easier to achieve chaos than perfection.


I'm not sure what would / wouldn't surely break some functionality; but 
things like user agent (or parts of it); time zone; randomly spoofing 
system fonts, even w/ Flash  Java disabled, etc.  Or other things that 
are easy to randomize  aren't likely to break functionality.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Adblock for everyone

2013-10-06 Thread Joe Btfsplk

Thanks for your insight.

On 10/6/2013 10:18 AM, Andrew Lewman wrote:


Adblock whitelists certain advertising companies and ads themselves:
These white lists can easily be disabled, but then that conflicts w/ 
Tor's concept of damaging sites' acceptance of Tor (interesting point).
However, fingerprinting NOT with standing, millions? of Firefox  other 
browser users, having Adblock Plus, Ghostery, etc., enabled, are never 
turned away from websites, AFAIK.


Just curious - by that analogy, should Fx, Chrome  others maybe 
disallow using extensions that block ads or other things, as it may 
cause some sites' non acceptance of browsers that allow such extensions?
Could be wrong, but I'd bet if sites reject TBB, it might be because 
of several other reasons that come before blocking ads. But...

Users are free to install these addons if they wish, but doing so is
not recommended, as it will alter the browser request fingerprint. 

That brings up a good question.  I assume that TBB freely gives up info 
to sites that use the query:  navigator.plugins - where sites can 
query whether specific plugins are installed:
|var isSupported = navigator.plugins['Shockwave Flash'];|... if users 
install any plugins.


Since TBB doesn't ship with plugins, why does TBB honor requests for 
plugin info, at all?
Would TBB ignoring requests for navigator.plugins from sites break too 
many browser functions or ?


As I understand, in Fx there's no equivalent method to find out all 
installed EXTENSIONS (distinguished from plugins; collectively called 
addons).  But presence of SOME extensions are detectable by their 
effect on a web site's function, such as ads or trackers being blocked.  
Correct?  But, not all extensions in Fx (TBB) are detectable - correct?


Thanks.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Adblock for everyone

2013-10-07 Thread Joe Btfsplk

On 10/6/2013 3:14 PM, Joe Btfsplk wrote:

Thanks for your insight.

On 10/6/2013 10:18 AM, Andrew Lewman wrote:


Adblock whitelists certain advertising companies and ads themselves:
These white lists can easily be disabled, but then that conflicts w/ 
Tor's concept of damaging sites' acceptance of Tor (interesting point).
However, fingerprinting NOT with standing, millions? of Firefox  
other browser users, having Adblock Plus, Ghostery, etc., enabled, are 
never turned away from websites, AFAIK.


Just curious - by that analogy, should Fx, Chrome  others maybe 
disallow using extensions that block ads or other things, as it may 
cause some sites' non acceptance of browsers that allow such extensions?
Could be wrong, but I'd bet if sites reject TBB, it might be because 
of several other reasons that come before blocking ads. But...

Users are free to install these addons if they wish, but doing so is
not recommended, as it will alter the browser request fingerprint. 

That brings up a good question.  I assume that TBB freely gives up 
info to sites that use the query:  navigator.plugins - where sites 
can query whether specific plugins are installed:
|var isSupported = navigator.plugins['Shockwave Flash'];|... if users 
install any plugins.


Since TBB doesn't ship with plugins, why does TBB honor requests for 
plugin info, at all?
Would TBB ignoring requests for navigator.plugins from sites break 
too many browser functions or ?


As I understand, in Fx there's no equivalent method to find out all 
installed EXTENSIONS (distinguished from plugins; collectively called 
addons).  But presence of SOME extensions are detectable by their 
effect on a web site's function, such as ads or trackers being 
blocked.  Correct?  But, not all extensions in Fx (TBB) are detectable 
- correct?


Thanks.


No comments from more experienced users about the possibility of TBB 
ignoring sites' requests for *most* plugins?


On 10/6/2013 10:18 AM, Andrew Lewman wrote:

Users are free to install these addons if they wish, but doing so is
not recommended, as it will alter the browser request fingerprint.
The word will means no exceptions.  Is it true that for extensions 
(not plugins), how they change TBB's fingerprint (if at all) may depend 
on their function?  Specifically, their effect, if any, on the web page 
and if that effect could be detected by the web page (or an adversary)?  
And then, only if the extension's (not plugins') specific effect on a 
web page is actually being monitored?


What site or adversary would or could monitor if an extension was 
installed, that only shows the download status / progress of a page, etc.?
If an extension doesn't alter sites' functions - at all (not talking 
about AdBlock here), doesn't send / receive data, no pinging, etc., how 
would its presence be detected, thus changing TBB's fingerprint?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] still unable to reach StartPage or Ixquick

2013-10-07 Thread Joe Btfsplk
Haven't been able to reach StartPage or Ixquick sites or do search for a 
week or more, in TBB 2.3.25-12.  Can't even reach their home pages 
through another search engine, like Google or Yahoo.


** Are others able to access these 2 search engines in the *same TBB 
version* as I'm using?  If so, maybe I need to re-extract the TBB files 
 start over.


TBB has been closed / restarted many times since problem began.

Thanks.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] still unable to reach StartPage or Ixquick

2013-10-07 Thread Joe Btfsplk

On 10/7/2013 5:27 PM, Roger Dingledine wrote:

On Mon, Oct 07, 2013 at 05:18:17PM -0500, Joe Btfsplk wrote:

Haven't been able to reach StartPage or Ixquick sites or do search
for a week or more, in TBB 2.3.25-12.  Can't even reach their home
pages through another search engine, like Google or Yahoo.

** Are others able to access these 2 search engines in the *same TBB
version* as I'm using?  If so, maybe I need to re-extract the TBB
files  start over.

TBB has been closed / restarted many times since problem began.

Tor 0.2.3.x is not so fun to use these days:
https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients

I recommend trying the TBB 3.0a4 (assuming you're not on Win XP and you
don't need pluggable transports):
https://blog.torproject.org/category/tags/tbb-30

We'll hopefully declare Tor 0.2.4.x stable real soon now. We keep getting
distracted though. Soon I hope! :)

Thanks, but - Whoa!  Tor 0.2.4.x isn't declared stable, so skip it - go 
straight to 3.0a?  I know it's got a lot of ? unproven as rock solid? 
features, but what about my secret double naught spying duties?

But, no XP here.

Anyway, what about others reaching Startpage  Ixquick using 2.3.25-12?  
If they're largely unreachable for others, no point in worrying about 
that - plenty of other stuff to occupy myself.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] still unable to reach StartPage or Ixquick

2013-10-07 Thread Joe Btfsplk

On 10/7/2013 9:34 PM, Matthew Finkel wrote:

Thanks, but - Whoa!  Tor 0.2.4.x isn't declared stable, so skip it - go
straight to 3.0a?  I know it's got a lot of ? unproven as rock solid?
features, but what about my secret double naught spying duties?

So these are actually two versions number for two different
programs. 0.2.4.x referred to the tor version which is packaged in TBB.
3.0a referred to the TBB version. Your current version of TBB just
happens to have a very similar version number to tor's. TBB will be
jumping to 3.x soon, though, as Roger said, tor will remain on the
0.2.x.y path.
Thanks.  I understood that, but Roger suggested skipping past 0.2.4.x-b, 
straight to 3.0a.  Maybe things have progressed so fast, that 0.2.4.x 
versions are already outdated, before they were released as stable.

Either way, they're both still alpha or beta.

I actually experienced this yesterday. I was too busy to troubleshoot
the connection issue, but it appeared that the request timed out. This
happened for both startpage and DDG, but not the other websites I
loaded. T'was strange, but probably just circuit dependent. In short,
if this is what you saw then it isn't only you, but I don't know why
it's happening.
Yes, the pages are timing out - immediately, repeatedly, spread out 
dozenS of times over a week.  Also happening on DDG.  I would've used 
dozens of circuits  new identities.  Some were U.S. exit relays.   The 
only way I know of that could happen, is if the site's down (They aren't 
for regular Fx), or if they're blocking Tor traffic.  Or something's 
interfering w/ TBB getting to them.   DDG has also been unreachable w/ 
TBB.  The newer 0.2.3.25-13 has the same issue.


Either it's not happening to that many TBB users, or;
Not that many actually use Startpage / Ixquick;
Other than you, list users are too busy to reply a works for me, or 
same problem here.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] which 3.0a4 package is for Windows

2013-10-08 Thread Joe Btfsplk

Is the only set of installers that doesn't list an OS, the one for Windows?
https://archive.torproject.org/tor-package-archive/torbrowser/3.0a4/

Is there a reason even stable Win versions never reference the OS in 
file names?


Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] which 3.0a4 package is for Windows

2013-10-08 Thread Joe Btfsplk

On 10/8/2013 6:13 PM, Moritz Bartl wrote:

Is there a reason even stable Win versions never reference the OS in
file names?

.exe is a Windows(-only) extension. I agree that the OS could be added
to the file name to avoid confusion.


Thanks, but a question / comment.
Except in this case, the file / package isn't an executable - it's a 
compressed archive.  The exe may be used here to indicate a Windows 
build, but it's just a zipped (.7z) file.  I'm sure lots of new users 
are confused by the .exe, in spite of instructions.


Technically, shouldn't the Windows packages have a compressed archive 
extension, like the other platforms?
Besides, emailing a Windows TBB package w/ .exe extension can create 
problems.  Why not call it what it is?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-09 Thread Joe Btfsplk

On 10/9/2013 10:27 AM, Lunar wrote:


Tor Weekly NewsOctober 9th, 2013


Welcome to the fifteenth issue of Tor Weekly News, the weekly newsletter
that covers what's happening in the world of Tor — “king of high-secure,
low-latency anonymity” [1].

[1] 
http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity

New tranche of NSA/GCHQ Tor documents released
--

... a series of stories were published
in the Guardian and the Washington Post that detailed alleged attempts
by NSA, GCHQ, and their allies to defeat or circumvent the protection
that Tor offers its users. ...

The documents in question [3] offer,... a summary of
attacks against Tor users and the network as a whole that they have
considered or carried out.

I'm sure Tor developers have considered the real possibility that some 
or all of what different agencies release, about their capabilities  
successes (or lack of) against Tor - or anything else, is 
misinformation, designed to make the Tor Project AND  users more 
comfortable in continuing to use TBB.


Logically, if any agency or adversary divulged they can somewhat 
successfully track users or infiltrate the system, then most would 
stop using it and a valuable method to gather information or catch 
criminals would cease to exist.  Good poker players and gov'ts NEVER 
reveal their hands.


I wouldn't take seriously anything that ANY gov't publicly reveals about 
their technology or intelligence capability (or lack there or).  Over a 
long history, it's been repeatedly shown that advanced gov'ts always 
know more  have more technology capability, than is revealed.  That is, 
often until decades later, when the real truth comes out.  It's no 
different now.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-09 Thread Joe Btfsplk

On 10/9/2013 5:32 PM, Juan Garofalo wrote:



Why hasn't Snowden published all the stuff he got from the NSA 
nazis? Why hasn't he uploaded it to wikileaks for instance? Or 
torrented it?




Top 10 Reasons Snowden hasn't published his documents:

10. Wiki what?

9. Unaware of statute of limitations on publishing stolen government 
documents.


8. Can't find a ghost writer.

7. Been too busy traveling.

6. Worried it might hurt his chances for public office.

5. Waiting for The Presidential Medal of Freedom, for exposing violation 
of the Constitution.


4.  Has grown fond of eating  breathing.

3. Hoping for Ambassadorship of Syria.

2. Holding them as Get Out of Jail card.

1.  Waiting for ABC to offer movie of the week deal.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-09 Thread Joe Btfsplk

On 10/9/2013 6:52 PM, Crypto wrote:

Excellent! I [love] it!


Joe Btfsplk joebtfs...@gmx.com wrote:

On 10/9/2013 5:32 PM, Juan Garofalo wrote:


 Why hasn't Snowden published all the stuff he got from the NSA
nazis? Why hasn't he uploaded it to wikileaks for instance? Or
torrented it?



Top 10 Reasons Snowden hasn't published his documents:

10. Wiki what?

9. Unaware of statute of limitations on publishing stolen government
documents.

8. Can't find a ghost writer.

7. Been too busy traveling.

6. Worried it might hurt his chances for public office.

5. Waiting for The Presidential Medal of Freedom, for exposing
violation
of the Constitution.

4.  Has grown fond of eating  breathing.

3. Hoping for Ambassadorship of Syria.

2. Holding them as Get Out of Jail card.

1.  Waiting for ABC to offer movie of the week deal.
Thank youuu!  I'll be at the Holiday Inn lounge all week, on the 
interstate outside of Cleveland.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] still unable to reach StartPage or Ixquick

2013-10-09 Thread Joe Btfsplk

On 10/9/2013 8:00 PM, krishna e bera wrote:

On 13-10-09 07:14 PM, Joe Btfsplk wrote:

After manually adding prefs.js entries in 3.0a4, that were suggested on
Tor project Trac to make it work, there's no change in being unable to
connect to Startpage, Ixquick, DDG; often even Wikipedia -SSL  Google.

Could it be (for Startpage  Ixquick), they've suddenly become very
popular, due to lots of recent news about various people watching
everything?  Maybe they're limiting Tor or other anonymous traffic to
keep servers open for regular users.

No explanation for DDG, Wikipedia.  Just that in regular Fx, can connect
to all of them instantly.


When you reinstalled or upgraded your TBB, did you remove the directory
first?  Sometimes a clean install gets rid of strange glitches leftover
from in place upgrades.


I never install TBB over the top of old versions or use an old profile.

Since it's done the same thing (starting  a wk ago in 2.3.25-12), now 
same exact thing in 2.3.25-13  3.0a4.

I can connect to Bing  Yahoo - in any TBB version I'm now trying.

I even have tabs open w/ the URLs already entered for Startpage, 
Ixquick, Google  say Bing, Yahoo AND any usual site. Google doesn't 
fail as much, but never had a problem w/ any of them before.
So when Startpage, et al. fail, I instantly load another site 
(Mozilla.org, etc.) - which succeeds - using the same relay circuit.  I 
checked w/ the network map open to make sure circuits weren't changing 
between the failures  successes.


One or 2x wouldn't mean anything, but I've repeated it dozens of times 
over many days w/ very consistent results.
I also have Firefox open w/ the same site as TBB - say Startpage. When 
they fail in TBB, I instantly load it in regular Fx  loads every time.  
So the search sites' servers aren't overloaded - at least for normal 
internet traffic.


For a bit, I wondered if my ISP was slowing connections to Tor relays, 
but I don't  have the TBB connection problem w/ most other sites, so 
that can't be it.  I'm just brain storming.
Thinking outside the box - what if I look at the problem from opposite 
direction.  Instead of thinking as a problem of Startpage, et al. not 
accepting Tor / TBB, look at it from a Tor / TBB having problems with 
these sites stance (Startpage, et al.).


There's obviously SOME reason, but not typical - given all the methods  
versions I've used to rule out possibilities.  Yahoo, Bing, Amazon, Ebay 
searches - together w/ the nsa, *must* be blocking me from other 
searches engines, forcing me to use them. Yeah, that must be it.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] still unable to reach StartPage or Ixquick

2013-10-10 Thread Joe Btfsplk

On 10/10/2013 5:11 AM, Alex wrote:
Orbot/orweb combination (android devices) does not seem to have any 
issues.

Thanks.  Good to know.  I'm using Windows desktop  laptop.




Am 10. Oktober 2013 05:59:15 schrieb Joe Btfsplk joebtfs...@gmx.com:

On 10/9/2013 8:00 PM, krishna e bera wrote:
 On 13-10-09 07:14 PM, Joe Btfsplk wrote:
 After manually adding prefs.js entries in 3.0a4, that were 
suggested on
 Tor project Trac to make it work, there's no change in being 
unable to
 connect to Startpage, Ixquick, DDG; often even Wikipedia -SSL  
Google.


 Could it be (for Startpage  Ixquick), they've suddenly become very
 popular, due to lots of recent news about various people watching
 everything?  Maybe they're limiting Tor or other anonymous traffic to
 keep servers open for regular users.

 No explanation for DDG, Wikipedia.  Just that in regular Fx, can 
connect

 to all of them instantly.

 When you reinstalled or upgraded your TBB, did you remove the 
directory
 first?  Sometimes a clean install gets rid of strange glitches 
leftover

 from in place upgrades.

I never install TBB over the top of old versions or use an old profile.

Since it's done the same thing (starting  a wk ago in 2.3.25-12), 
now same exact thing in 2.3.25-13  3.0a4.

I can connect to Bing  Yahoo - in any TBB version I'm now trying.

I even have tabs open w/ the URLs already entered for Startpage, 
Ixquick, Google  say Bing, Yahoo AND any usual site. Google doesn't 
fail as much, but never had a problem w/ any of them before.
So when Startpage, et al. fail, I instantly load another site 
(Mozilla.org, etc.) - which succeeds - using the same relay circuit.  
I checked w/ the network map open to make sure circuits weren't 
changing between the failures  successes.


One or 2x wouldn't mean anything, but I've repeated it dozens of 
times over many days w/ very consistent results.
I also have Firefox open w/ the same site as TBB - say Startpage. 
When they fail in TBB, I instantly load it in regular Fx  loads 
every time. So the search sites' servers aren't overloaded - at least 
for normal internet traffic.


For a bit, I wondered if my ISP was slowing connections to Tor 
relays, but I don't  have the TBB connection problem w/ most other 
sites, so that can't be it.  I'm just brain storming.
Thinking outside the box - what if I look at the problem from 
opposite direction.  Instead of thinking as a problem of Startpage, 
et al. not accepting Tor / TBB, look at it from a Tor / TBB having 
problems with these sites stance (Startpage, et al.).


There's obviously SOME reason, but not typical - given all the 
methods  versions I've used to rule out possibilities. Yahoo, Bing, 
Amazon, Ebay searches - together w/ the nsa, *must* be blocking me 
from other searches engines, forcing me to use them. Yeah, that must 
be it.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk






--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Troubleshooting failed Startpage connection [Was: still unable to reach StartPage or Ixquick]

2013-10-10 Thread Joe Btfsplk

On 10/9/2013 10:59 PM, Joe Btfsplk wrote:

On 10/9/2013 8:00 PM, krishna e bera wrote:

On 13-10-09 07:14 PM, Joe Btfsplk wrote:

... in 3.0a4, ... there's no change in being unable to
connect to Startpage, Ixquick, DDG; often even Wikipedia -SSL  Google.

 in regular Fx, can connect to all of them instantly.


When you reinstalled or upgraded your TBB, did you remove the directory
first?  Sometimes a clean install gets rid of strange glitches leftover
from in place upgrades.


I never install TBB over the top of old versions or use an old profile.

Since it's done the same thing (starting  a wk ago in 2.3.25-12), now 
same exact thing in 2.3.25-13  3.0a4.

I can connect to Bing  Yahoo - in any TBB version I'm now trying.

I even have tabs open w/ the URLs already entered for Startpage, 
Ixquick, Google  say Bing, Yahoo AND any usual site. Google doesn't 
fail as much, but never had a problem w/ any of them before.
So when Startpage, et al. fail, I instantly load another site 
(Mozilla.org, etc.) - which succeeds - using the same relay circuit.  
I checked w/ the network map open to make sure circuits weren't 
changing between the failures  successes.


One or 2x wouldn't mean anything, but I've repeated it dozens of times 
over many days w/ very consistent results.
I also have Firefox open w/ the same site as TBB - say Startpage. When 
they fail in TBB, I instantly load it in regular Fx  loads every 
time.  So the search sites' servers aren't overloaded - at least for 
normal internet traffic.


For a bit, I wondered if my ISP was slowing connections to Tor relays, 
but I don't  have the TBB connection problem w/ most other sites, so 
that can't be it.  I'm just brain storming.
Thinking outside the box - what if I look at the problem from opposite 
direction.  Instead of thinking as a problem of Startpage, et al. not 
accepting Tor / TBB, look at it from a Tor / TBB having problems 
with these sites stance (Startpage, et al.).


There's obviously SOME reason, but not typical - given all the methods 
 versions I've used to rule out possibilities. Yahoo, Bing, Amazon, 
Ebay searches - together w/ the nsa, *must* be blocking me from other 
searches engines, forcing me to use them. Yeah, that must be it.


I assume? most users of WINDOWS TBB 2.3.25-12/13 that have read of my 
problem, have recently tried Startpage, Ixquick, DDG -  not really 
having any issues?


Would Tor message log posted here have anything useful that more 
experienced users may spot a problem?
I looked at logs (w/ Debug, error, warning, notice turned on) for FAILED 
connection to Startpage /  Ixquick  Check.torproject VS. good 
connection to other sites.  Nothing obvious -  others may see something.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Failed Startpage connection problem found_need solution [Was: still unable to reach StartPage or Ixquick]

2013-10-10 Thread Joe Btfsplk

On 10/10/2013 11:26 AM, Joe Btfsplk wrote:

I assume? most users of WINDOWS TBB 2.3.25-12/13 that have read of my
problem, have recently tried Startpage, Ixquick, DDG -  not really
having any issues?

Would Tor message log posted here have anything useful that more
experienced users may spot a problem?
I looked at logs (w/ Debug, error, warning, notice turned on) for FAILED
connection to Startpage /  Ixquick  Check.torproject VS. good
connection to other sites.  Nothing obvious -  others may see something.
HOLY CRAP, TOR MAN.  I discovered it's some change (update?) in 
Kaspersky Internet Security 2014, blocking access to certain sites, like 
the Tor checkpage, Ixquick, Startpage.  But it doesn't affect vast 
majority of sites in TBB.


SPECIFICALLY, it seems KIS's monitoring of HTTPS port 443 that blocks 
certain sites using HTTPS, in TBB -ONLY-, NOT in Fx.  Just because it 
monitors certain ports, (normally) it wouldn't block *EVERYTHING* using 
those ports, unless there's a setting in TBB causing a problem, that's 
NOT in Fx.  Both have HTTPS everywhere (UNchecking force HTTPS on 
Startpage made no change); both browsers have NoScript.


In regular Fx 24, KIS is still monitoring HTTPS port 443  Startpage, et 
al., load just fine.

So it's a *TBB / Tor connection*  port 443 that KIS has a problem with.

Guessing here - seems like a problem w/ TBB triggering KIS to block it 
on port 443.  Fx 24 is NOT blocked on port 443.


I can / will go on the Kaspersky forum on this, but some here may have 
good solutions.

* Tor / TBB is already in KIS's Trusted Group, so no problem there.

* Don't (think I) want to turn off ALL port 443 monitoring; causes no 
problem in Fx  probably should be monitored??


* Don't want to whitelist (not monitor) *ALL*  TBB activity in KIS - 
takes away all protection.


Must be something specific on -HOW- TBB accesses port 443 VS. regular 
Fx, that KIS sees as a problem.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Failed Startpage connection problem found_need solution [Was: still unable to reach StartPage or Ixquick]

2013-10-10 Thread Joe Btfsplk

On 10/10/2013 1:42 PM, krishna e bera wrote:


When you find yourself replying a lot in your own troubleshooting
thread, it may be time to start a ticket on https://trac.torproject.org
and followup there.
OK, thanks.   I never see troubleshooting threads go on forever on the  
list. :D
But wait - I found the problem  I'm sure lots of users here know the 
best, safest way to handle TBB  various AV prgms monitoring port 443.

Not sure need to create a ticket for that.

Perhaps just turn off monitoring encrypted connections in the AV/ soft 
FW.  Not sure about the safety aspect.

On 13-10-10 02:10 PM, Joe Btfsplk wrote:


* Don't want to whitelist (not monitor) *ALL*  TBB activity in KIS -
takes away all protection.

Au contraire, why allowing any security or other software access to
Tor communications? You are effectively sending Kaspersky corporation
your data and metadata with your IP address, which can be intercepted or
grabbed off their servers by any agency with sufficient powers.
...Unless you are using KIS and TBB in a VM with a fake IP address etc.


Any AV that does updates, already has your IP address, I'd guess.
I doubt there'd be any way for them to correlate an IP used for updates 
w/ Tor network addresses, or that it's any concern.


If there is, the whole Tor Project is remiss in not warning users about 
the threat.


KIS  others log network activity, but you can turn it off completely, 
or limit retention to a day.
If in a hostile environment, could clear the log (if turned on)  
erase free space on that partition, if worried about the MIB showing up.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-11 Thread Joe Btfsplk
The staged release may be a good idea, but have they got the timing 
right?

this article is dated June 6
http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

that was 4 months ago. How many articles have they published since then?
Actually, if the assumption is that people have a short attention span,
then they should be publishing interesting stuff as frequently as possible?
No idea where / when the documents relating to the following were 
released.  You won't see this on the evening news.
This article is about Brazil's President scheduling an international 
conference - early 2014, to discuss the revelations from documents 
leaked / released so far.

http://rt.com/news/brazil-internet-summit-fight-nsa-006/

Brazil claims part of the documents released, showed everything Brazil 
is one of many surveillance targets of the US.  Surprise!
Phone, internet, etc. - just like home, sweet home.  I'm not saying 
the claims are true / untrue - just that apparently some documents 
released to date, caused great concern in other countries as well.


In reality, it's likely they give as good as they get.  Or, the pot 
calling the kettle black.


 


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-11 Thread Joe Btfsplk

On 10/11/2013 1:41 PM, mick wrote:

On Fri, 11 Oct 2013 15:51:24 +
Matt Pagan m...@pagan.io allegedly wrote:
  


Hi Matt

No problem. However, whilst we do have the beginnings of very intrusive
network censorship in the UK (some ISPs are more pliable than others...

...you could equally say change your ISP to one with some balls. UK users 
should
stay away from the majors (BT, Virgin, talk-talk, O2, Sky, EE etc) and
use one of the multiple independents

If enough UK users vote with their wallets, ISPs may be more inclined
to grow a pair. ...

Voting w/ your feet / wallet sometimes works, when consumers have choices.
In some locales, there are very few affordable alternatives  ISPs know 
this, when that's the case.


Another unknown or forgotten fact is, these ISPs  communications co's 
get paid BIG bucks for their research  report preparation time, to 
hand over requested records (logs) of particular individuals.
This is to comply w/ general warrants, nsl's, etc.  The ISP's / mobile 
communications co's even showed how many requests they got / yr  how 
much revenue it generated.


An ordinary co. or citizen with info they were interested in, wouldn't 
get a dime for gathering  preparing the data to hand over.
In fact, they'd say, hand it over NOW or we'll throw you in jail  fine 
you.


I've seen actual invoices from several large communications providers.  
They didn't show the targets of requested info, just dates of the 
requests, how much the gov't was billed, etc.


It apparently was public info (or released, somehow).  You can find 
these in general searches.  It was astonishing what they charged for 
such little info.


That may?? be ONE reason (are probably many) that certain agencies 
claimed they needed to ignore the constitution  just listen in w/ their 
own equip.
Although, it's hard to believe they'd ever recoup the huge capital 
outlay, for the equip necessary to monitor many millions of users, by 
not having to pay ISPs' - research  report preparation fees.

But, they're not paying for it (in any country) - the taxpayers are.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Final report (maybe) on problems connecting to SSL search engines [Was: still unable to reach StartPage or Ixquick]

2013-10-11 Thread Joe Btfsplk


On 10/10/2013 1:10 PM, Joe Btfsplk wrote:

On 10/10/2013 11:26 AM, Joe Btfsplk wrote:

I assume? most users of WINDOWS TBB 2.3.25-12/13 that have read of my
problem, have recently tried Startpage, Ixquick, DDG -  not really
having any issues?

Would Tor message log posted here have anything useful that more
experienced users may spot a problem?
I looked at logs (w/ Debug, error, warning, notice turned on) for FAILED
connection to Startpage /  Ixquick  Check.torproject VS. good
connection to other sites.  Nothing obvious -  others may see something.
For the possible benefit of others, I'm reporting what I finally 
discovered.  It's a strange one.


I reported I'd finally narrowed it to some change (update?) in Kaspersky 
Internet Security 2014 (KIS), seemed to block access to certain sites in TBB, 
like the Tor checkpage, Ixquick, Startpage.
All appeared to be using HTTPS port 443.  I think it affected ANY site in TBB 
using port 443.  But didn't seem to affect regular Fx 23 / 24 on port 443.

* Seems * port 443 was treated differently in TBB VS. Fx.  Don't know whose 
fault it was.
BEFORE the KIS fix, on the Tor network map, I watched port 443 open, then 
immediately close, each time an SSL connection was initiated.

The solution involved TOGGLING settings in KIS for scanning (or not) encrypted / 
SSL ports.  Then closing KIS completely  restarting.
Then changing Scan encrypted connections settings BACK to original defaults, 
closing  restarting KIS (again).

In the end, I wound up w/ the EXACT KIS 2014 settings (for this area), as the 
original defaults.  It's just that THESE original default settings broke TBB, 
when using port 443.
Other than KIS settings actually stored were different than the GUI showed, 
have no explanation.  Hope I don't have to repeat this type process anytime 
soon.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 9th, 2013

2013-10-12 Thread Joe Btfsplk

Thanks for the input, Luther.
Phrase meanings:

just like home, sweet home. - In this context, meaning like in the U.S.  Or 
just like in most countries.

they give as good as they get. - one person (or country) may (or has the 
ability to) do the same to others, as is being done to them.

the pot calling the kettle black. - signifying ultimate hypocrisy.  One 
entity accusing another of bad behavior or traits, of which they are also guilty (or they 
are guilty of behavior as bad or worse as that of which they accuse others.  The 
(cooking) pot - being *dirty* (black - from fire), accuses the kettle of the same thing.


On 10/12/2013 10:09 AM, Luther Blissett wrote:

On Fri, 2013-10-11 at 11:43 -0500, Joe Btfsplk wrote:

The staged release may be a good idea, but have they got the timing
right?
this article is dated June 6
http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

that was 4 months ago. How many articles have they published since then?
Actually, if the assumption is that people have a short attention span,
then they should be publishing interesting stuff as frequently as possible?

No idea where / when the documents relating to the following were
released.  You won't see this on the evening news.
This article is about Brazil's President scheduling an international
conference - early 2014, to discuss the revelations from documents
leaked / released so far.
http://rt.com/news/brazil-internet-summit-fight-nsa-006/

Brazil claims part of the documents released, showed everything Brazil
is one of many surveillance targets of the US.  Surprise!
Phone, internet, etc. - just like home, sweet home.  I'm not saying
the claims are true / untrue - just that apparently some documents
released to date, caused great concern in other countries as well.

In reality, it's likely they give as good as they get.  Or, the pot
calling the kettle black.

   


I'm not sure I understand the meaning of those expressions, but
Brazilian govt is most likely trying to bargain access to the data
systems, trying hard to be part of the inner circle of international
politics rather than caring much for privacy/openness.

People here bow to kapitol, leak it's shoes and dream of deep T it.
There was some political momentum - during which I noticed fb blocking
tor and undercover cops jamming wireless signals nearby street
protestors - and after that people are on a quiet mood. Many approached
me raising concerns, few adopted any means of protection at all and a
majority seems to think that these issues are no issues. (Subjective,
untrustworthy guess).

So fed govt does not have any means of political pressure (military,
economical, technological) and cannot count it's citizens to back up a
clearcut opposition to kapitol's peeping tom desires. That said, the
neoliberal right-wing journal Estado de São Paulo (estadao.com.br)
which has historical aliances with the elites of the homonymous State
has already started to give raise to manufactured news on some criminal
plot to kill the State Governor which was supposedly caught with the
help of hitech surveillance apparatus:

http://www.estadao.com.br/noticias/cidades,faccao-criminosa-tenta-levar-casos-do-pcc-ao-stf,1084798,0.htm

http://www.estadao.com.br/especiais/pcc-como-funciona-a-faccao-sua-cupula-e-influencia,214103.htm

More context: PCC, for those who have not heard before, is an
brotherhood of inmates (prison detainees) born inside São Paulo's
prisons with the aim of fighting the ongoing day-to-day genocide of the
black people on Brazil. During the years they supposedly took control of
drug commerce and the govt and media are constantly reinforcing the fear
around these issues as they serve the same purpose here as terror-talk
on kapitol. There are, however, various info which suggests that
military under the Governor started an unlawful taxing system for
unlawful commerce as early as 2006 at least, but it probably goes back
way before. The State Government on São Paulo has remained on the hands
of the same political party for two decades now.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] fingerprinting implications_changing TBB font or font size?

2013-10-12 Thread Joe Btfsplk
I'm not a national whistle blower or spy (for now - gov't shut down), 
but I'm interested in the implication of changing font or size in TBB, 
in Options  Fonts  Colors  Advanced.


The default in my language package is Times New Roman.  The default 
(serif) size for that font (16?), plus NO minimum font size, is too 
small on many pages to read, w/o using Ctrl + mouse scroll, or something 
similar.
One named font at size 16 can vary a lot in displayed size, from 
another font - at same stated size.


I'm not sure if named font  size used in TBB is faked, or if sites 
can query the browser for it?  If they can, changing them would likely 
make me more unique than those using default font settings.


There are extensions that change browser font size, but those may be 
detectable as well??


A quick test on Panopticlick showed when I used Ctrl + scroll to zoom 
the screen, it DID change their perceived screen size (a lot) - to 11nn 
x 5nn. Default reported by TBB is 1920 x 970?


Changing the TBB font SIZES in Options didn't change Panopticlick's 
perceived screen size - but that's THEIR TEST.  Doesn't mean other sites 
couldn't detect the changesVS. other Tor browsers.


Anyone have knowledge of real data on this?

Thanks.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What are some free and private email providers?

2013-10-12 Thread Joe Btfsplk

On 10/12/2013 1:48 PM, Antispam 06 wrote:

On 24.05.2013 00:50, Moritz Bartl wrote:

On 23.05.2013 22:23, Nathan Suchy wrote:

I'm looking for email providers with decent support, a good amount of
storage, and that protect your privacy. Do you know any?

In the end, for plaintext email, you always have to trust the
operator. There's valid reasons for going with Google for some
activities. For others, it might be better to take a look at
https://we.riseup.net/riseuphelp+en/radical-servers .
https://trac.torproject.org/projects/tor/wiki/doc/EmailProviderComparison is
not very helpful.
http://www.thesimplecomputer.info/articles/email-for-privacy.html is
another older list.

Things are looking bad. Lavabit is out. Fastmail is paid only. Nothing
wrong with paid, only it beats the anonymity. Vmail.me has closed the
gates. And it has big problems anyway: gmail bounces all my emails.
Openmailbox has closed its gates. The system works well. The
registration is off. Tormail is shutdown and unreachable.

Even large guys changed lately. Lycos imposes a SMS ID with only a
handful of countries in its list. Gmail imposes the SMS, even if their
list is far greater. Gmx and Mail refuse account creation. They say it's
tech problems, but it looks like Tor allergy. And Mail.com is a mask for
more services. Hushmail shows only paid plans. Cyber-rights mask gave me
access, but hushmail said it's suspended and gave me a chance to pay.


If you're looking for privacy, Gmail is the wrong place.  Even if you 
could create an acct using TBB (doubtful), they scan everything -  as do 
many others.

You can encrypt your more private messages, or attach encrypted files.

Yahoo may still let you create an acct w/ TBB.  In the US, you may have 
to use a US exit relay  may have to use one each time you log in - or 
face the security questions, or complete login denial. Not the best, but...


Here's an older comparison of some more privacy conscious providers, I 
did early this yrs.  Some data is no doubt outdated by now.

http://bayfiles.net/file/XYO1/iKZYCo/Email_provider_comparison.pdf
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What are some free and private email providers?

2013-10-12 Thread Joe Btfsplk

On 10/12/2013 3:52 PM, Edgar S wrote:

I was also left hanging when tormail shut down. I've found one that
meets my needs. Based in Switzerland. It is Tor-friendly for both
signups and webmail.  Has both an onion hidden address,
http://bitmailendavkbec.onion, and an open address, bitmessage.ch. Free.
The only drawback is that you have to accept an assigned username that
is a long string of random characters.

Another possibility is URSSMail  http://urssmail.org/
http://f3ljvgyyujmnfhvi.onion.  Based in Russia and Brazil. Neither are
very friendly to the NSA. It seems to have some problems currently. I
thought I had created an account, but then I couldn't log into it. But
it lets you assign your own username, and is free, although BTC
donations are requested. As I write, the hidden service is down.
I guess you went thru part of the signup process to see it assigns a 
random string as your acct username / email address?
It told me the registration was having problems.  How long was the 
random assigned name?


That'd be a bit tough sending mail to general people.  But, if you want 
privacy...
I wonder if there's an option to enter a name that goes in front of the 
email user name, like most clients or even ISPs allow?


I guess it'd be fine for typical mail, but the entire size per message 
limit is 2 MB.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What are some free and private email providers?

2013-10-13 Thread Joe Btfsplk


On 10/12/2013 8:30 PM, Johnny Carson wrote:

Joe Btfsplk:

I guess you went thru part of the signup process to see it assigns a
random string as your acct username / email address?
It told me the registration was having problems.  How long was the
random assigned name?

That'd be a bit tough sending mail to general people.  But, if you want
privacy...
I wonder if there's an option to enter a name that goes in front of the
email user name, like most clients or even ISPs allow?

I guess it'd be fine for typical mail, but the entire size per message
limit is 2 MB.

I too use Bitmessage.ch by their hidden service address (SSL). I use
Torbirdy with Thunderbird.

When I send emails to people I just enter a name into Thunderbird and
that's the name a recipient sees. The email address of course is long,
but I haven't found anyone that seemed to care.

I dont send big files though, the 2 mb limit is low.

A trace of an email sent through Tor and then Bitmessage and then to the
recipient shows Tor exit node IP address, without usable metadata AFAIU
what Bitmessage.ch does for metadata.


There's a new Tor Mail Gateway coming online and it sounds bad ass:

https://www.whonix.org/wiki/Special:AWCforum/sp/id429

https://lists.torproject.org/pipermail/tor-talk/2013-August/thread.html#29464

https://github.com/moba/tor2mail

Thanks for the info.  As always ( as Bitmessage site points out), if 
you send unencrypted email outside to regular email servers, sensitive 
or personal info faces exposure  scanning by the receiving server.

You can encrypt messages, but that's still not accepted by average users.

I'm guessing that using Bitmessage w/ Tor, that perhaps the receiving 
server or the recipient, can't determine the sender's actual IP address?
Has there been much of a problem w/ other email providers rejecting 
messages from Bitmessage servers?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What are some free and private email providers?

2013-10-13 Thread Joe Btfsplk


On 10/13/2013 3:35 PM, Johnny Carson wrote:


I was thinking about this to get around IP blocks on Tor exit nodes:

My computer (SSL)  Thunderbird + Torbridy  Tor (not using hidden
service to bitmessage.ch)  Internet  VPN  Internet  Bitmessage.ch 
Internet  Recipient

Not sure if that's possible or easy with VPN and Bitmessage Mail Gateway??


You lost me after Torbirdy  Tor...
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New paper : Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

2013-10-16 Thread Joe Btfsplk

On 10/16/2013 4:50 PM, Roger Dingledine wrote:

On Sun, Sep 01, 2013 at 10:10:56PM -0400, Roger Dingledine wrote:


Yep. They're part of the Tor research community. I have plans for writing
a blog post about the paper, to explain what it means, what it doesn't
mean, what we should do about it, and what research questions remain
open.

Here it is:

https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters

--Roger
I read the paper - good job. Some of it will be over the heads of some, 
but that's unavoidable unless make it 10+ pages, in newbie language, 
then few would read it all, so...
I'm not bashing Tor here, so leave your pitchforks in the barn. Just 
asking questions, making observations that may / may not have an answer 
or even be useful.


One thing jumps out, Tor doesn't know for sure who's running Guard or 
exit nodes -  can't unless they start doing (regular, repeated) 
extensive personal interviews, background checks, giving polygraph 
tests, injecting sodium pentathol  to those wanting to run nodes.  I 
guess more so for Guards.


Since apparently now LEAs from (some) countries are teaming up, sharing 
info, etc., seems possible the problem of LEAs (or any adversaries) 
running a higher % of nodes could get worse, not better.  If adversary 
nodes as a % of all nodes doesn't increase (new good guy nodes keeps up 
w/ increase of adversarial ones), then overall risk hasn't changed.  But 
how can Tor (or any group) determine the risk if they have no reasonably 
reliable way to determine the REAL intention / identity of node 
operators (spies infiltrating Tor Network)?


Governments, crooks have proven themselves VERY resourceful over 
decades, or 100's of yrs.  The U.S., let alone other industrialized 
nations partnering together, has a lot more manpower, resources  money 
than Tor Project.  I don't think we can out spend them, for setting up 
nodes.  How many full / part time programmers or idea people does Tor 
have (as good as they are) VS. one agency of one industrialized nation?


Is there any way - in the future, that Tor could run a much larger % of 
nodes or at least, instead of constantly trying to figure how to beat / 
drastically improve the odds that an adversary won't accidentally 
control the entry / exit nodes on circuits?  Perhaps a noble, but losing 
game, if gov'ts band together  decide Tor, or the entire internet, IS 
worth serious monitoring.  Perhaps reasonable anonymity on a world wide 
party line is too ambitious? (Those that don't know what a telephone 
party line was, can Startpage it.  [stop saying Google it] :)


What about somehow getting a better handle on who actually runs the 
nodes?  With its current policies  design, Tor is in a very tough 
position to ensure quality (anonymity).  Tor isn't supposed to see any 
real data on the network - for one, so they can't be forced to give 
anything up (again, noble), but that prevents some (a lot of?) 
capability for quality control.  No company would / could handle its own 
security that way.  It's a Catch 22 situation for Tor, because of legal 
threats that many gov'ts impose, that many corporations don't face.  And 
if they had some REALLY secret stuff to send abroad, they'd fly it in 
their own jet.


What about a COMPLETELY different approach, rather than trying to 
develop methods to beat the odds, *ad infinitum,* against what COULD 
become an ever increasingly larger PERCENTAGE of gov't / adversary run 
nodes?  Surely, it'd be worthwhile to look way down the road  see where 
Gov'ts / LEAs may be going w/ this  whether they can be bested, by 
following the same course that Tor is on (even with improvements along 
the way)?  I have no idea - I'm just saying, sometimes the only way 
businesses, technologies, gov'ts survive  thrive is to completely 
change course.   For all of history, gov'ts have gone to GREAT lengths 
to spy on citizens  adversaries  have often done pretty well at it.


Well liked corporations can often be as secretive as they want - they're 
protecting corporate data  assets.  Tor is looked at in part (*by 
gov'ts  LEAs*), as a tool for terrorists, criminals - of all sorts.  
They couldn't care less if honest people, whistle blowers swim near 
schools of criminals  terrorists, whether some will get caught in the 
same net.  Maybe, like Corporations that get away w/ figurative murder, 
Tor Project should start contributing heavily to key political figures, 
to ensure they'll be left alone?  :D


You laugh, but that's exactly why big business, who by current STATUTES, 
break JUST AS MANY OR MORE laws, as Gov'ts / LEAs *ASSUME* that Tor 
users do?   Big Business is left alone  entities like Tor are on the 
hit list.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The NSA's problem? Too much data?

2013-10-20 Thread Joe Btfsplk

On 10/20/2013 2:19 PM, Antispam 06 wrote:

On 20.10.2013 20:41, Anonymous wrote:

I'm using an Finland provider 'cuz their law does not allow any other
agentcy or anything like that to gain access to your files so
easilly.

That's so cute! Can you point out some time a spy agency was brought in
front of a judge for not respecting the law. The same law written in
stone in some countries as «nobody is above the law». Do you know of a
time when they were found guilty and punished or ever issued an appology?
I'm not knocking Finland.  I know nothing of their privacy / citizens' 
rights laws.  Even if A / The / Another Country has the BEST internet 
user, or any other privacy, citizens' rights laws in the WORLD, it 
doesn't mean all (or any) OTHER countries respect their laws.  It 
doesn't mean other countries' LEAs aren't sniffing all the 
communications they can, that passes through those great countries 
(possibly even their allies).


It doesn't mean some advanced countries don't have the ability to sniff 
/ capture *SOME* of those great countries' internet, email, voice 
communications.  Maybe none, a little or a lot - who knows? Maybe 
someone will leak some documents that sheds light on those activities.


IIRC, there are a number of countries upset right now, by indications 
of LEAs from another country(ies) doing communications data gathering in 
their country.  Brazil - one that is upset.  And others.


If you're a citizen of Finland or a super privacy conscious land, that's 
great.  If you live in a country w/ not so good privacy laws (or ones 
that aren't enforced),  are just using internet / email service in 
those great lands, your info might not be a private / protected as you 
(anyone) thought.  From a privacy standpoint, it may? be somewhat better 
to use email servers somewhere like Finland, but it now seems apparent 
that it doesn't put you completely out of the long arm of the law of 
your own country.  Depending on where you live.


AFAIK, it's not illegal in most countries for its OWN agencies to spy on 
(in), gather data in other countries, in any manner they can possibly 
dream up.  Quite the opposite.  Which is what many countries do to each 
other - now, 365 days / yr.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB prefs_prompt to sanitize on shutdown?

2013-10-22 Thread Joe Btfsplk
May be mistaken, but I thought the 1st pref below (included in TBB by 
default) was to bring back the old Fx 3.x, clear private data prefs, 
much like using the extension, AskForSanitize does.


These are default values in TBB (I think):

user_pref(privacy.sanitize.migrateFx3Prefs, true);
user_pref(privacy.sanitize.sanitizeOnShutdown, true);

I believe the 2nd pref automatically clears any private data.

Thought the pref BELOW was so Fx / TBB would SHOW the prompt, to clear 
private data when close TBB / Fx?  No?  If so, adding it to TBB prefs 
doesn't cause it to show the prompt to show on closing TBB.


user_pref(privacy.sanitize.promptOnSanitize, true);

If allow some site an exception to make it work ( trust the site), I'd 
still like to SEE the prompt to clear data.
MOST times in TBB, there will be no private data to clear.Maybe this 
is a non issue for most  maybe it's by TBB design not to show the 
prompt.  Or maybe TBB doesn't show it because modern Fx doesn't show it?


Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 23th, 2013

2013-10-24 Thread Joe Btfsplk

On 10/23/2013 8:04 AM, Lunar wrote:

Tor Weekly News   October 23th, 2013

“some circuits are going to be compromised, but it’s better to increase your
probability of having no compromised circuits at the expense of also
_INCREASING THE PROPORTION_ of your circuits that will be compromised if
any of them are.”

I read the paper -  slept since then.

Would someone please clarify this general statement  that part of the 
design concept?


The statement in https://www.torproject.org/docs/faq#EntryGuards is a 
bit confusing.
/But profiling is, for most users, as bad as being traced all the time: 
they want to do something often without an attacker noticing, and the 
attacker noticing once is as bad as the attacker noticing more often./


How is being noticed once, perhaps for 15 seconds,  visiting one 
website - that yields very little info, better than being noticed many 
times, over a long period?


Is it that once an adversary correlates your machine (fingerprint) w/ an 
originating IP  a Tor entry / exit, they could theoretically ID you?


If so, doesn't that beg the question of why does TBB keep the same 
browser fingerprint from entry to exit?
Why (have or allow TBB to) keep the same fingerprint over long periods, 
even if some of that data is spoofed, rather than TBB randomly change 
(spoof) the fingerprint, from end to end on one circuit and / or over time?


One big problem as I understand, is a Tor user (specific browser on 
specific machine) is potentially identifiable from entry to exit, by 
having the same fingerprint.
Why not change the fingerprint?  Put on a hat  glasses or different 
colored coat part way through the circuit?  TBB already spoofs SOME 
browser data - it just remains constant.  Maybe other tracking issues 
completely over shadow this.


Even if having TBB change fingerprints along a circuit and / or at other 
times doesn't solve all problems, could it be a *part* of reducing 
fingerprinting and / or tracking?


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 23th, 2013

2013-10-24 Thread Joe Btfsplk

On 2013-10-24 10:26, Joe Btfsplk wrote:

On 10/23/2013 8:04 AM, Lunar wrote:

Tor Weekly News   October 23th,
2013

“some circuits are going to be compromised, but it’s better to
increase your
probability of having no compromised circuits at the expense of also
_INCREASING THE PROPORTION_ of your circuits that will be compromised
if
any of them are.”

I read the paper -  slept since then.

Would someone please clarify this general statement  that part of
the design concept?

The statement in https://www.torproject.org/docs/faq#EntryGuards is a
bit confusing.
/But profiling is, for most users, as bad as being traced all the
time: they want to do something often without an attacker noticing,
and the attacker noticing once is as bad as the attacker noticing more
often./

How is being noticed once, perhaps for 15 seconds,  visiting one
website - that yields very little info, better than being noticed many
times, over a long period?

Is it that once an adversary correlates your machine (fingerprint) w/
an originating IP  a Tor entry / exit, they could theoretically ID
you?

If so, doesn't that beg the question of why does TBB keep the same
browser fingerprint from entry to exit?
Why (have or allow TBB to) keep the same fingerprint over long
periods, even if some of that data is spoofed, rather than TBB
randomly change (spoof) the fingerprint, from end to end on one
circuit and / or over time?

One big problem as I understand, is a Tor user (specific browser on
specific machine) is potentially identifiable from entry to exit, by
having the same fingerprint.
Why not change the fingerprint?  Put on a hat  glasses or
different colored coat part way through the circuit?  TBB already
spoofs SOME browser data - it just remains constant.  Maybe other
tracking issues completely over shadow this.

Even if having TBB change fingerprints along a circuit and / or at
other times doesn't solve all problems, could it be a *part* of
reducing fingerprinting and / or tracking?

On 10/24/2013 1:21 PM, aut...@anonymousbitcoinbook.com wrote:

By changing the browser fingerprint, do you mean altering the HTTP
request headers, such as the User-agent? You'd need to decrypt SSL/TLS
traffic in order to modify the headers of any request sent over SSL/TLS,
so that limits you to plaintext HTTP traffic.

You COULD alter HTTP request headers at each hop, but let me raise a
potential objection: A considerable number of websites return different
HTTP responses based on the contents of HTTP request headers, so you'd
be potentially mucking up the deterministic output of web applications.
A common example is returning a different version of a website when the
User-Agent indicates a mobile device. One obvious part of the browser
fingerprint is unique cookie values, such as those set by third-party ad
domains. Cookies would be one of the trickiest to modify, because they
are integral to the function of the vast majority of websites, and it
would be difficult when to mutate a cookie value without negatively
impacting the function of the web application.

-Kristov

Thanks.  I moved your top post to underneath my post.

Request header is only one of many things that would (may?) make up 
browser fingerprints (IIRC).  Many other data could be changed. Whether 
they could be changed in transit on one circuit  if it would be *any* 
benefit, is the question.  I'm not talking about changing browser 
fingerprint data that would mess up the returned content (for mobile 
device, etc.).  Maybe this isn't possible, but worth asking.


IF... the request header can NOT be changed, or requested  returned 
data won't work AND if the request header *alone* is enough for very 
sophisticated adversaries to track users end to end, then all bets may 
be off.


If request header is all adversaries need, then the constant talk of 
/don't change [this] in TBB, or your browser fingerprint will make you 
(more) unique,/ is pointless.  So, I assume that request headers aren't 
everything, for tracking / fingerprinting.


If TBB users allow 3rd party cookies ( some other actions), they 
probably have other concerns  fingerprinting may be a moot point for 
them.  One assumes there's a certain point that preventing TBB users 
from shooting themselves in the foot is impossible.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Weekly News — October 23th, 2013

2013-10-24 Thread Joe Btfsplk

On 10/24/2013 2:57 PM, Michael Wolf wrote:

It looks like you grossly misunderstand how Tor works.  The only node
that can see your browser fingerprint is the exit node.  The problem
that Entry Guards are meant to solve is laid out in the very first
paragraph of the FAQ you linked:


Tor (like all current practical low-latency anonymity designs) fails
when the attacker can see both ends of the communications channel. For
example, suppose the attacker controls or watches the Tor relay you
choose to enter the network, and also controls or watches the website
you visit. In this case, the research community knows no practical
low-latency design that can reliably stop the attacker from
correlating volume and timing information on the two sides.

In other words, if I can observe the pattern of traffic coming from your
IP address at a particular time, and simultaneously observe that pattern
at an exit node or website, then I can assume the traffic at the exit
belongs to you.  It doesn't matter that there are multiple layers of
encryption along the way -- the attack doesn't look at the contents of
the traffic, just the volume and timing of it.  Having Entry Guards
helps, but does not completely solve this problem.

In regards to being noticed once -- if the site you are visiting is
being watched by your government, then being noticed just once may be
cause for them to watch you more closely.  If you're posting data to
wikileaks, having your government notice this could constitute a very
bad thing.  That is just one example.


Thanks for the details.  Of course you're correct about being noticed 
once, posting or d/l _certain data_ from certain sites (being watched).  
Question - for average users in free societies, if you're noticed 
once visiting a  site like wikileaks (legal in most countries) by a 
formidable adversary (just visit - not post, download, etc.),  they 
reasonably confirmed the entry traffic  exit traffic are the same  
(volume  timing), the assumption is they put all visitors on a watch list?


I'm asking - for everyone that mistypes, is curious about a news story 
or chooses the wrong URL address (Tor  non Tor users), they'll then 
gather all data for all accounts, of any type, of those people from then 
forward?


If they saw the IP address you came from to the entry node  you did 
something they were *really* interested in AND had the authority, I 
guess they could request from your ISP, who used that address on that 
date  time.
That is of utmost concern if you're Assange or Snowden; such use is the 
primary concern of Tor Project.
For avg users, is it a huge concern (unless things change a lot -  they 
could)?


Probably 99+ % of Tor users don't post on wikileaks or release stolen, 
classified documents.  For those that do, I'd guess they really should 
use something with / in addition to TBB (or instead of;  their own 
strong encryption, carrier pigeon).
I hope if you're in life or freedom threatening use of Tor (with its 
current limitations / weaknesses), that you *don't* access the network 
straight from your main, commercial ISP.


Even for a one time whistle blower of a small co., is it likely someone 
would 1) be watching the exact entry / exits you used, AND 2) have the 
authority to track you down and care enough to do so?
Do most gov'ts care about reporting sexual harassment at Bob's Broom 
Factory or who wishes to remain anonymous when data searching on male 
impotence?


I don't grossly :) misunderstand how Tor network works, though I'm no 
expert, like most users.  Certainly unsure how fingerprinting figured 
into adversaries controlling / watching entry  exit nodes, etc.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Kaspersky still interferes with SSL port 443 sites

2013-11-01 Thread Joe Btfsplk
Weeks ago I reported problems accessing https Ixquick / Startpage search 
sites in TBB 2.3.25-12, then *-13 and 2.4.x; then saw it was most (or 
all) sites using port 443.
Traced it to some issue with Kaspersky Internet Security 2014 (KIS)  
its scan encrypted connections feature, though never found exact problem.


My KIS settings do NOT cause problems in *Fx 24.x,*  or any versions on 
secure URLs.  It used to not cause problems in TBB.
Now I've narrowed it to EVERY time TBB is opened, if KIS is closed then 
immediately reopened, the blocking port 443 problem *disappears*.
Blocking is in quotes, cause I really don't know why port 443 is 
immediately closed, just that KIS is involved.


No special messages from TBB (now 2.4.17b2) when SSL pages won't load, 
other than generic xyz.com has timed out...may be busy...
In the Tor Network map, I can see port 443 try to open, then immediately 
close when accessing sites using that port.  Until I close / reopen KIS 
- then problem solved.


The issue seemingly has something to do w/ *differences* between TBB or 
processes  *regular Fx,* as the KIS factory default settings for scan 
encrypted connections work fine in Fx  port 443 - or any others.
Besides, I temporarily disabled all KIS port monitoring for 443. Didn't 
change the TBB problem.


AFAIK, the *default* KIS settings are that it's NOT scanning encrypted 
connections, unless you have KIS *parental control* enabled (I don't).
For some reason, it affects TBB, but seems unlikely the real KIS 
default settings are the problem, as just closing / reopening KIS solves 
the TBB issue.


If... TBB had a problem w/ the Kaspersky certificate, closing / 
reopening KIS wouldn't fix that.


I could add TBB, vidalia and Tor.exe to KIS's do not monitor 
application's activity and / or do not scan (this application's) 
network activity  list, but that defeats purpose of having the protection.


Could be a weird KIS bug affecting TBB, that stopping / restarting KIS 
somehow fixes it temporarily (consistently).  That'd be fairly unusual.


Any thoughts on differences in TBB  Fx that may contribute to this, or 
other suggestions?  Thanks.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites

2013-11-02 Thread Joe Btfsplk

On 11/2/2013 6:08 AM, Moritz Bartl wrote:
What kind of protection do you expect from this, anyway? 

Wow, I don't know.  Having a rough night / day?

Could be a weird KIS bug affecting TBB, *that stopping / restarting KIS* 
somehow fixes it temporarily (consistently). That'd be fairly unusual.
Unusual? 
Yes, unusual that stopping  starting KIS, while some app (TBB) is 
already running, immediately stops a KIS problem w/ TBB, or vice versa.


 Don't expect too much help here [from Moritz]. 

Well, not from some, anyway. LOL :)


only very few people are interested in closed source software...


Right.  Thanks.





--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites

2013-11-05 Thread Joe Btfsplk

On 11/2/2013 9:15 AM, freek2...@yahoo.de wrote:
Do you use the manual mode if KIS? I also tried that feature, but 
intransparently catching server certificates definitely messed with my 
system. This function is imho snakeoil of the highest quality. (Except 
you use an insecure browser and have no idea how ssl/tls and the x.509 
certs work.) I want to be able to check certs myself and it's possible 
that the cert/ssl-design in tor, which uses (afaik randomly 
generated,) self signed certs, doesn't work with the validation KIS 
conducts.
No - least, don't think so.  Not sure what you mean - manual - in this 
context.  *Could* be some screw up w/ certificate, but as said, w/ 
current settings, KIS doesn't (shouldn't) scan ANY encrypted 
connections.  But KIS could have a problem, that it's not correctly 
using settings that are shown in GUI.  It happens.

In the Tor Network map, I can see port 443 try to open, then
immediately
close when accessing sites using that port.  Until I close / reopen KIS

- then problem solved.

It's just a guess, buy maybe that way you get the proper certificate to your pc.

Thanks, but no idea.  Normally, stopping / starting KIS - or anything 
like it, wouldn't load or reload a new certificate.
If it's doing that, I'd guess it's a bug.  I posted on Kaspersky forum  
even long time mods have no idea on this one.


Haven't filed support req w/ Kaspersky - yet, because doubt they support 
KIS  TBB issues; but I'll try.
I'll uncheck all KIS settings for scanning encrypted connections, so it 
*shouldn't* scan any - then see.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites

2013-11-05 Thread Joe Btfsplk

On 11/2/2013 11:16 AM, Moritz Bartl wrote:

On 11/02/2013 02:27 PM, Joe Btfsplk wrote:

Don't expect too much help here [from Moritz].

Well, not from some, anyway. LOL :)

Hey hey, no reason to become hostile. I wrote the mail, which I consider
help. Help in making you understand why nobody really interacted with
you over this issue the last time you brought it up.

Sounds like you would rather not have me comment on this at all. I was
trying to be helpful, as in: it is a KIS bug, *especially* if it goes
away when you restart it, and also, if it messes with SOCKS in this way,
they should get this fixed. If you want to help them fix it, run a local
network sniffer and find out what they do exactly with the requests in
question.

Moritz

Thanks Moritz,
the phrase Well, not from some, anyway. LOL :) w/  LOL  a smilie is 
pretty far from hostile, from my understanding.
That's why they're sometimes used in email / postings - to indicate 
tone, that's often lost in email.


Thought I was taking the high road; trying to defuse what seemed like 
a pretty flippant, looking down your nose reply.
If not your intent, I apologize.  If it was, may want to dial back a 
notch.  I'm sure lots of Tor users have closed source AV software.

But, see here - I'm still smiling:  :D, :), ;)

Why no one responded...?  Kinda amusing.  Could well be same reason 
KIS gurus / long time mods are stumped.
Or same reason hundreds of software devs have been stumped by my 
questions / observations, over decades.
Millions of users post intelligent questions on forums / lists *ALL* the 
time  no one has an answer.  Means nothing.


It'd be very hard for me  many to *entirely* avoid closed source 
software.  I try to use open source if at all possible.


I'll try the sniffer - if don't discover something else (soon), or if 
KIS support doesn't have a solution.  I'm not sure Kaspersky cares about 
KIS /  TBB issues.
Yes, it seems like a (possible) bug.  Stopping / restarting KIS 
*shouldn't* have an effect on certificates, whether it is / isn't 
scanning encrypted connections, etc.
No (visible) settings are changed, by stopping / restarting it. That's 
why I said it was unusual.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Kaspersky still interferes with SSL port 443 sites

2013-11-05 Thread Joe Btfsplk

On 11/2/2013 2:04 PM, Sukhoi wrote:

I am experimenting problems with TorBrowser on the last months.
On most of the web sites I have to reload it 2 to 8 times until it
loads, receiving most of the times messages like this:


Unable to connect
Firefox can't establish a connection to the server at blog.torproject.org.


Sukhoi - a bit off topic, but I'm not sure your problem is w/ Kaspersky 
or any AV / FW.
If you haven't upgraded to TBB 2.4.x (still beta), may try that.  I 
think what you're seeing (if using TBB 2.3.x) is pretty common.


Was for me until I upgraded.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB 2.3 sometimes doesn't open pages 1st try (was: Kaspersky still interferes with SSL port 443 sites)

2013-11-06 Thread Joe Btfsplk

On 11/6/2013 5:51 PM, Sukhoi wrote:

On 05/11/2013 15:32, Joe Btfsplk wrote:

On 11/2/2013 2:04 PM, Sukhoi wrote:

I am experimenting problems with TorBrowser on the last months.
On most of the web sites I have to reload it 2 to 8 times until it
loads, receiving most of the times messages like this:


Unable to connect
Firefox can't establish a connection to the server at
blog.torproject.org.



Sukhoi - a bit off topic, but I'm not sure your problem is w/
Kaspersky or any AV / FW.
If you haven't upgraded to TBB 2.4.x (still beta), may try that. I
think what you're seeing (if using TBB 2.3.x) is pretty common.

Was for me until I upgraded.

Joe,
Thanks for the comments.
I did additional tests and possibly you are right about the Kaspersky
and AV.

I just installed the latest Tor 2.4.x beta version, on Win 8 x64. The
problem seems to be a bit smaller, but stands, having to load and reload
the pages many times to get the content.

Tried also Tor 2.3 stable release on Linux, were the problem did not
happened.

Interesting.  Each OS  each TBB version may act a bit differently.  I'm 
using Vista x64 - could be differences vs. W8. Others using W8 will have 
to weigh in.  However, I've read many reporting same issues of TBB not 
loading pages, that improved or disappeared when moved to 2.4.x.  Maybe 
new series 3.x is worth trying, but it's still alpha, so maybe ? not 
suitable for serious anonymity requirements (freedom, life  death 
situations).


I didn't see a speed change using TBB 3, but speed isn't Tor's purpose.  
I saw no diff in pages loading (or not) on 1st try, in 2.4.x vs. 3.0, 
using Vista.


I tried 3.0a4  had same issue some others did - the browser opened 
empty.  No menus, etc.  Trac bug report said adding lines below, to 
userPerf.js in the TBB profile would fix it  it did, for me.

May now be a later version w/ this fix in it.

TBB 3.0a4 - Pref.js (or userPref.js) entries - must be added before it 
will work.  Otherwise, browser opens empty.


user_pref(gfx.direct2d.disabled, true);
user_pref(layers.acceleration.disabled, true);
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] More and more websites block Tor, which will eventually become useless!

2013-11-10 Thread Joe Btfsplk

On 11/10/2013 2:12 PM, Akater wrote:

Actually I wonder why tor users seem to be convinced it's a bad idea Am I 
missing something?
Yes, from what I've seen reported several times on this list, you're 
missing that even being approached or brought in for questioning by 
LEAs, threatened by lawyers -  can be extremely stressful  potentially 
expensive.
A good many don't want to risk something like that.  Most people I know 
have quite enough problems w/o taking the *chance* that something like 
that happens.


If... it happens to you, can be all consuming for a time.  Go back  
read some tales of that were dragged to the police station, had their 
computers seized, threatened w/ serious charges - on  on.
They were genuinely scared  probably rightly so - even if in the end, 
there is no jail time or large loss of monies.  I would be.


Some spouses couldn't / wouldn't stand for that kind of stress, more 
than once.
Some employers might find a way to dismiss workers, if they found out 
an employee is being investigated.  People are fired everyday for far 
less.  Yes, the employers often cite other reasons.  In lots of places  
lot of states (in U.S.), they don't NEED a reason to fire (let go; lay 
off) workers.


If thousands ran exit nodes - could LEAs / lawyers get them all or 
make all their lives miserable, for a time?  Probably not.
But the crocodile doesn't have to catch all the antelope to strike fear 
into the rest of them.  That's how terrorists operate - making an 
example of a few  striking fear into thousands, millions.
Why use that analogy to describe actions of the powers that be - in many 
situations?  If the reason has to be spelled out...

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] More and more websites block Tor, which will eventually become useless!

2013-11-10 Thread Joe Btfsplk

On 11/10/2013 3:14 PM, Akater wrote:

The German guy was released, right? A couple more precendents, and
police will stop raids like this one due to inefficiency. Because,
ultimately, they /are/ inefficient, and all Tor community needs to do is
to make it as clear to general public as possible.
German guy was only one of several.  I your theory is true, but it 
depends on the goal(s) of the LEAs.  If their only purpose is to catch 
REAL criminals, they may stop going after exit operators, if most 
attempts are unsuccessful / unfruitful.
But, in those cases, they're looking for ANY info.  They want DATA from 
exit nodes, even if they don't think the operator is complicit.  Just as 
they wanted data from ALL Lavabit customer accts.


If intent is simply to intimidate (as is sometimes the case in other 
endeavors), then being inefficient matter at all.
When that's the purpose, educating them won't help, either.  That's not 
ALWAYS their purpose, but LONG history  has shown that it can be.


Some gov'ts, LEAs just don't want Tor  the bad element they perceive 
it brings, operating in their jurisdiction.
And, criminals do use Tor, at times.   That said, I don't know that LEAs 
will stop turning over exit node rocks, to see what's underneath.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] More and more websites block Tor, which will eventually become useless!

2013-11-10 Thread Joe Btfsplk

On 11/10/2013 4:53 PM, Akater wrote:

And, criminals do use Tor, at times.

Criminals do use guns at times. Does it mean gov't can harrass you if
you own one, too?
They can  do harass anyone, for anything, that they want to. They know 
how far they can take it (sometimes, that's PRETTY far).
Unless it was ongoing and / or EXTREME, I've never heard of an LEA 
suffering any consequence for harassing people.  Yes, maybe an 
individual agent /officer that crossed some line get reprimanded, but 
not an agency pursuing leads  hunches.


 If they suspect  a gun's connected to a crime (sometimes, even a gut 
feeling) , in ANY shape, form or fashion - you'd better  BET your sweet 
A** they'll harass you.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Are project change logs online?

2013-11-11 Thread Joe Btfsplk

On 11/10/2013 9:05 PM, Roger Dingledine wrote:

On Sun, Nov 10, 2013 at 07:58:09PM -0500, gq wrote:

I know change logs are included in packages but are they viewable
online anywhere? Or do you have to download and extract/install the
full package to see them?

Go to https://www.torproject.org/download/download
and click Source code

https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ReleaseNotes

https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog

Further question about that.  On 
https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog 
(or any page), change logs for some releases seem omitted?
One example:  For a good while - 2.4.17b2 was the latest of 2.4 series.  
But changes for it or *b1  aren't there (I assume was a b1).  That's 
just one.


Is it just oversight or lack of time to list changes for some releases, 
or am I still looking in the wrong spot?


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Are project change logs online?

2013-11-11 Thread Joe Btfsplk


On 11/11/2013 9:53 AM, Nick Mathewson wrote:

On Mon, Nov 11, 2013 at 10:32 AM, Joe Btfsplk joebtfs...@gmx.com wrote:

On 11/10/2013 9:05 PM, Roger Dingledine wrote:

On Sun, Nov 10, 2013 at 07:58:09PM -0500, gq wrote:

I know change logs are included in packages but are they viewable
online anywhere? Or do you have to download and extract/install the
full package to see them?

Go to https://www.torproject.org/download/download
and click Source code

https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ReleaseNotes

https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog


Further question about that.  On
https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog (or
any page), change logs for some releases seem omitted?
One example:  For a good while - 2.4.17b2 was the latest of 2.4 series.  But
changes for it or *b1  aren't there (I assume was a b1).  That's just one.

Is it just oversight or lack of time to list changes for some releases, or
am I still looking in the wrong spot?

Wrong spot; you're looking at changelogs for the Tor program itself,
but there has never been a Tor release called 2.4.17b2 -- that looks
like a TBB version number.


Thanks.  Correct.  Knew I should've waited till more awake.
BUT... same general principle.  Seems harder to find links / directions, 
STRAIGHT to TBB changes.


This page gets you there - if you know what to click. 
https://gitweb.torproject.org/torbrowser.git/
The line at top of that page, description Scripts to build the Tor 
Browser Bundles - confusing for users?


Don't remember a link to TBB changes page, on any main Tor / TBB info 
pages.  May be wrong (happens).
On that page, under Tags have to click the TBB version, then 
shortlog or log.


Info there is useful, but not same format as for Tor, on 
https://gitweb.torproject.org/tor.git?a=blob_plain;hb=HEAD;f=ChangeLog
- - if that's what users are looking for.  Some will have trouble 
finding concise change logs for TBB.


Shouldn't there be quite visible link(s) for all TBB versions changes / 
change logs, right on several MAIN pages - main download, main Help, etc?
Here:  https://www.torproject.org/download/download - has link to 
source code, but none for changes.
Wouldn't that be most logical place for link(s) *directly* to TBB change 
logs, like most software sites?


Lot of info available, but some is scattered.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] SimpleMail

2013-11-14 Thread Joe Btfsplk


On 11/14/2013 5:27 PM, Missouri Anglers wrote:

Has the security of Simple Mail been discussed yet?
If so, can someone tell me where I can find the past discussions?

If not,   Simple Mail is a mail client add on for Firefox. It allows you to get notified, 
read and write messages for multiple email accounts inside Firefox. Does it 
maintain the privacy associated with the TOR Firefox browser?
Maybe others have direct experience w/ it.  The general problem w/ many 
extensions, plugins, even clients - is they don't follow the rules of 
staying w/in the Tor network AND not revealing data that may leak your 
identity / location.
It's a case by case basis, but for Tor, most don't use extensions / 
plugins - for email - like you're talking.  They're not developed w/ 
extreme anonymity in mind.  Not that they don't work for general, non 
anonymous use.


You want what everyone does - ultimate convenience  high anonymity.  
They rarely exist together.


You can search the archives of Tor-talk for previous discussions.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] New to TOR

2013-11-17 Thread Joe Btfsplk
Unless you have *permanently* static IP address, you can force a new 
address, by:


rebooting your modem / gateway; or
accessing modem's EWS (GUI)  there's almost always an option to 
disconnect / reconnect to the ISP, causing a new IP to be assigned.


I'd wait just a bit, to sign up w/ a new IP.  The site could have 
100's / 1000's of members using same ISP as you, or could have very few.


On 11/17/2013 7:01 AM, simb...@aol.com wrote:
  
I received an account-ban from a web-site. I stood accused of violating

challenge rules and was cut off from a community I had grown to love  dearly.
I can no longer post messages and/or send private messages.
I would like to re-enter this web-site under a new identity, but I am
afraid it checks IP addresses.
I was wondering if a program such as TOR could help me out.
  
Would TOR affect my existing accounts with other web-sites? I do most  of

my shopping and banking over the Internet.
  
I have not downloaded TOR yet. How will I know it works if I do?
  
Thank you.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB 2.4.x Windows using more CPU than normal

2013-11-18 Thread Joe Btfsplk
Anyone noticed since starting to use Windows - TBB 2.4.x series, it 
using more CPU when loading pages than it used to?
Even more than regular Fx.  I've noticed this across 2 of the 2.4.x 
series versions.  Haven't updated to latest - released couple days ago, yet.


TBB 2.4 also seems to load pages considerably slower (over weeks of 
trial), than earlier versions - WHEN they worked correctly.  I mean, 
before 2.3.x versions started having so many problems.


It seems to use 25 - 30% CPU, on an Intel quad 2.66 MHz,  uses that 
much for a long period.  Maybe the length is because it generally takes 
all pages longer to load in TBB vs. Fx.
Doesn't explain why it'd use so much MORE than regular FX.  It's 
actually quite a bit more than Fx, percent wise.


On my box, Fx (v 23 - 25) generally only uses in 8 -  12% (sometimes up 
to 17%) of CPU.  Although, I have no shortage of CPU resources, so that 
may not be the reason for the significant slowness of 2.4.x versions vs. 
earlier ones, when they worked correctly.




--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Gmail account without phone number

2013-11-19 Thread Joe Btfsplk

On 11/19/2013 3:39 PM, Yo Mamma wrote:

Hi,
I have been reading on this mailing list that it is not possible to create
a Gmail account without a phone number.
I have just created such an account (this one).
I was curious if this is a change on Gmail's part or if the conditions of
my sign up were not the same as those having problems.
I created this account without using Tor, so perhaps that is the critical
difference.

Please share w/ the rest of the kids.  How'd you do it?  Personally, if 
it's ANY sort of anonymity / privacy I'm concerned about, Gmail's the 
last one I'd want.  Others will want to know.


Was it thru Tor, or regular browser / ISP?
Which country are you in (don't say, if in one where someone ID'g you 
could be dangerous).
Any other (GENERAL) pertinent how to's - that won't compromise your 
anonymity, if any.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] StrictExitNodes deprecated?

2013-11-23 Thread Joe Btfsplk

On 11/23/2013 2:16 AM, Roger Dingledine wrote:

On Sat, Nov 23, 2013 at 07:42:23AM +0200, Sherief Alaa wrote:

I just see the options StrictExitNodes and StrictEntryNodes is deprecated?

The correct syntax is:

EntryNodes {node, node, ...}
StrictNodes 0 or 1 #0 for disabled

No, you should not use StrictNodes with EntryNodes or ExitNodes. It
won't do anything (except confuse you I guess).


Note: it's recommend to leave Tor handle your path selection
automatically rather than specifying one yourself as it can greatly harm
your anonymity.

This is likely still true.
What about when using TBB is desired, but sites (say web mail) won't 
accept addresses from countries other than used to sign up?
At least not w/o headaches - at times.  Just one example.  How can this 
be handled - or can it?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Gmail account without phone number

2013-11-24 Thread Joe Btfsplk


On 11/24/2013 8:54 PM, Yo Mamma wrote:

Hi Joe,
I'll clarify the auto-login: After sign up it logged me in with the
credentials I had just created. Why would it use cookies from a previous,
different account login, to log in to this new account? Wouldn't that be a
security hole?

Dunno.  Haven't created a gmail email acct in yrs.
Security hole?  Not sure - probably only thing you'd have access to is 
acct just created??


Maybe I misunderstood.  I thought you also had access to your other 
features, once you created the gmail acct.
And you already had a main google acct (don't know what they call it) 
 that perhaps was why it let you create the email acct w/o a phone #?


If you had another google acct  still had cookies from previous 
session, they would've recognized you that way.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] StrictExitNodes deprecated?

2013-11-25 Thread Joe Btfsplk


On 11/23/2013 3:04 PM, Joe Btfsplk wrote:

On 11/23/2013 2:16 AM, Roger Dingledine wrote:

On Sat, Nov 23, 2013 at 07:42:23AM +0200, Sherief Alaa wrote:

I just see the options StrictExitNodes and StrictEntryNodes is deprecated?

The correct syntax is:

EntryNodes {node, node, ...}
StrictNodes 0 or 1 #0 for disabled

No, you should not use StrictNodes with EntryNodes or ExitNodes. It
won't do anything (except confuse you I guess).


Note: it's recommend to leave Tor handle your path selection
automatically rather than specifying one yourself as it can greatly harm
your anonymity.

This is likely still true.

What about when using TBB is desired, but sites (say web mail) won't
accept addresses from countries other than used to sign up?
At least not w/o headaches - at times.  Just one example.  How can this
be handled - or can it?

Anyone?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] StrictExitNodes deprecated?

2013-11-25 Thread Joe Btfsplk

On 11/25/2013 7:14 AM, Leo Unglaub wrote:


the solution is simple. DONT USE THOSE FUCKED UP SERVICES. Use email
providers that allow an authentication from anywhere like every
provider is supposed to do.

Greetings
Leo



It's not only F'g email that won't allow from some *-stan or African 
country (for instance).

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Group Thinks Anonymity Should Be Baked Into the Internet Itself

2013-11-29 Thread Joe Btfsplk

On 11/29/2013 10:47 AM, Eugen Leitl wrote:

http://www.technologyreview.com/news/521856/group-thinks-anonymity-should-be-baked-into-the-internet-itself/

Group Thinks Anonymity Should Be Baked Into the Internet Itself

Good one.
Not aimed at anyone, but along same line of thought - with about as much 
chance of reality (0.0%):
Citizens think (all) gov'ts should stay out of their private lives  
personal decisions:


w.w.w.crap-in-one-hand--spit-in-other-see-which-fills-up-1st.com
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] tor mention in newle released snowden documents

2013-11-30 Thread Joe Btfsplk

On 11/30/2013 2:30 PM, Rejo Zenger wrote:

See: http://issuu.com/pimvandendool/docs/document03. New document,
(really) briefly mentioning the efforts of the Dutch intelligence
services identifying Tor-users. Attempts are made by hacking into
servers running fora, obtaining the logfiles, sql-databases, etc, then
combining and analyzing all available data (and hoping a user once
didn't use Tor while accessing the forum).


servers running fora
Is fora plural for forum in Dutch?  Or should that be servers running 
forums?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Risk of selectively enabling JavaScript

2014-01-07 Thread Joe Btfsplk
As TBB is a standard product, its fingerprint should be the same for 
everyone.


Tell that to the guy that got arrested on campus, because he was one of 
a few people using it.
People talk a good game in an armchair quarterback sort of way - if 
he'd only...  Unless they're seasoned veterans at getting arrested / 
avoiding police questioning, most people put in that situation would be 
scared senseless.


The fingerprint should be the same... statement holds some water, IFF 
(if  ONLY if), there are a bunch of people using it at the same time, 
from the same server / ISP, etc.


I imagine there are plenty of situations, locations, even countries 
where at times, TBB users stick out like a sore thumb.  How would most 
users know how many other users in their area / through same server, ISP 
are using TBB at the same time?  Probably can't.Or even, how many 
are using TBB in the same city through the same ISP at same time.
May not be nearly as many as we'd think - depending. If only a few, 
maybe shouldn't be doing anything your particular gov't frowns on.


If a guy in black clothes  black mask walks into a bank, how hard is it 
to narrow it down to the guy in black clothes  mask.
What happens if that one (anonymous) guy also has an ISP acct. number, 
that logs the exact times he uses TBB?


Don't be the only TBB user on your company's server that also files an 
anonymous complaint against your boss. :)

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Forensics on Tor

2014-01-23 Thread Joe Btfsplk

On 1/23/2014 5:12 PM, Mirimir wrote:
I wouldn't run VMs on Windows with any expectation of privacy. Only a 
year or so ago, shellbags were not common knowledge. Only the forensic 
community and hard-core black hat types knew about them. It's arguable 
that many similar features in Windows remain undocumented.[1]


[1] I'd like to hear more.  Arguable mean there is some evidence?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia has been replaced with Tor Launcher

2014-01-25 Thread Joe Btfsplk

On 1/25/2014 7:33 AM, Katya Titov wrote:

TT Security:

1. So Network Map and New Identity are absent now. When these
functions will be add to the TBB?

Vidalia is now a stand-alone package. Details:

https://www.torproject.org/docs/faq#WhereDidVidaliaGo
If TBB is leaving Vidalia for a better ? Tor launcher extension,  
some have mentioned using Vidalia as stand alone, to still see circuits, 
IP addresses - what are the implications?
Was Vidalia ditched for reasons that *might* make it undesirable  to use 
with later TBB versions - in any circumstance?  I missed the memo on all 
reasons why Vidalia - bad, Tor Launcher - good.


Whether bugs, poor / slow connections, anonymity issues?  Assuming we're 
talking about possibly using Vidala   TBB 3.5?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB 3.5 starts w/ size buttons hidden

2014-01-25 Thread Joe Btfsplk
TBB 3.5 for Win is starting in half screen  the UI sizing buttons are 
hidden because the TBB UI is shifted where the size buttons are off the 
monitor.
So is most of the title bar, making it hard to drag the UI down to reach 
buttons.  Once maximized, it fits fine on the monitor.


Finally got it pulled down so could maximize TBB, then closed it. 
Thinking it'd reopen maximized.  On reopening, same thing - the UI size 
buttons are hidden off top of monitor.
This is the 1st TBB version I've seen this problem.  Not a problem w/ 
any other apps.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB 3.5 starts w/ size buttons hidden

2014-01-25 Thread Joe Btfsplk

2014-01-26 Joe Btfsplk joebtfs...@gmx.com

TBB 3.5 for Win is starting in half screen  the UI sizing buttons are
hidden because the TBB UI is shifted where the size buttons are off the
monitor.
So is most of the title bar, making it hard to drag the UI down to reach
buttons.  Once maximized, it fits fine on the monitor.

Finally got it pulled down so could maximize TBB, then closed it. Thinking
it'd reopen maximized.  On reopening, same thing - the UI size buttons are
hidden off top of monitor.
This is the 1st TBB version I've seen this problem.  Not a problem w/ any
other apps.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


On 1/25/2014 9:22 PM, Nils Kunze wrote:

You can use the windows key + an arrow key to resize and move windows. So
for example win + left arrow to make the window take over the left half of
the screen. With that you should be able to put it in the position you like
anytime.
Thank you.  However, is anyone else having that problem?  This is 
something I haven't seen in any apps for a long time.


Firefox remembers the last window size when it was closed.  TBB 3.5 
doesn't seem to, nor where it was positioned.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia has been replaced with Tor Launcher

2014-01-25 Thread Joe Btfsplk

On 1/25/2014 5:07 PM, Lunar wrote:

Joe Btfsplk:

I missed the memo on all reasons why Vidalia - bad, Tor Launcher -
good.

At least:
http://users.encs.concordia.ca/~clark/papers/2007_soups.pdf
http://petsymposium.org/2012/papers/hotpets12-1-usability.pdf
and Vidalia has no maintainers for a while now.

Thanks Lunar.  I perused those papers at my convenience (sounds fancy).  
It was lost on me if they in fact pointed out (important) flaws in 
Vidalia that Tor launcher doesn't have.

Other than Vidalia not being maintained.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB 3.5 starts w/ size buttons hidden

2014-01-26 Thread Joe Btfsplk

Nils wrote:
You can use the windows key + an arrow key to resize and move windows.

DOESN'T work on my machine in Vista x64 (for any app).  No effect. Maybe 
some Windows option turned off?


On 1/26/2014 12:56 AM, Lars Luthman wrote:

On Sat, 2014-01-25 at 21:37 -0600, Joe Btfsplk wrote:

Re:  TBB 3.5 doesn't seem to remember its window position between sessions.

The size of your window can leak information that reduces your
anonymity, at least if Javascript is enabled (maybe even if it's
disabled?). I suspect that TBB has been intentionally modified to start
with the same window size every time.

It sounds odd that it starts with the title bar off-screen though.

Thanks.  Good point.  Starting in reduced size isn't the issue - hidden 
title bar is.  Starting w/ the title bar  buttons hidden on a common 
1920x1080 native (21.5 in.) monitor is odd.  Nothing unusual about the 
monitor  no issue w/ other apps.  I'd think many would complain about 
TBB 3.5 if it's widespread.  This began *ONLY* in TBB 3.5 - 1st launch  
has persisted (erratically). Checked this again in TBB 2.4.17  no issue 
w/ opening size or position.


Further testing - TBB 3.5 opening UI alignment is erratic. Sometimes 
after maximizing, then closing - it reopens w/ title bar aligned - but 
often NOT.
* Title bar being hidden on TBB start happens most often when I maximize 
its UI, then minimize, then close.  That seems the MOST common scenario, 
when title bar's completely hidden on restart.  But NOT ONLY time.


Not using any extensions, plugins - except default.  Tried it enough to 
see, even w/ no other changes between restarts, proper title bar 
alignment is erratic.
* If title bar IS aligned, TBB sometimes starts w/ bottom border hidden 
well below the Windows task bar (I've only 1 task bar row  small 
icons).  Not a huge issue, as I can then maximize UI - but still odd.

Tested a bunch of apps  Firefox - none have these issues.

Further, I've (always) had checked -  keep *task bar* on top, but NOT 
locked or auto hide.  No changes on task bar properties in ages.


* With TBB 3.5 started in part-screen mode  with (if) its bottom border 
hidden (that actually aligns w/ monitor's bottom IF... I hide task bar), 
when I hide, then UNhide task bar, TBB instantly adjusts its bottom 
border to just touch the task bar  - for that session.  But doesn't 
always remember ANY positions / alignment on next restart.  When I think 
I've figured out sequence, it surprises me again.


* Sometimes, if click maximize UI button, then reduce, it'll immediately 
change UI position, so all but ~ the LOWER 1/4 of resizing buttons are 
hidden off the monitor.  Sometimes NOT.  But doing that, buttons *may* 
display OK.


* Still common for TBB 3.5 to start w/ title bar completely off 
monitor.  If so, only way I've found to maximize TBB UI is IF... the 
bottom border is showing above task bar, drag it UP a bit, then PART of 
title bar instantly displays (showing small part of buttons). Then click 
maximize button.
(Why would dragging TBB's bottom border make the title bar SUDDENLY jump 
/ partially appear?  Dunno - never seen it before.)


Whatever my Windows / display settings are, haven't changed  work OK 
w/ other apps  previous TBB versions.


That's why I asked -  so not to file a bug if I'm the only one. Other 
than bug / Vista incompatibility, can't imagine why ONLY TBB 3.5 would 
do this.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Thunderbird leak

2014-01-26 Thread Joe Btfsplk

On 1/26/2014 11:33 AM, Andrew F wrote:

YIKES... Are you sure, how did this slip by?



On Sun, Jan 26, 2014 at 3:06 PM, Mike Cardwell t...@lists.grepular.comwrote:


I just blogged about a general security issue in Thunderbird which may
also affect people who are using Tor:

https://grepular.com/Security_Bug_Thunderbird_Websites_Tabs

Basically, an email can be crafted such that when you click a link in
that email it is opened within a Thunderbird tab instead of in your
usual (potentially torified) web browser. Bypassing any other defenses
you might also have, including NoScript etc.

--
Mike Cardwell  https://grepular.com/ http://cardwellit.com/
OpenPGP Key35BC AF1D 3AA2 1F84 3DC3  B0CF 70A5 F512 0018 461F
XMPP OTR Key   8924 B06A 7917 AAF3 DBB1  BF1B 295C 3C78 3EF1 46B4

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

I've seen a few links in emails  open in new Tbird tabs, instead of 
Firefox (email from persons I know, or think I know it's from them) .
I usually just copy links  paste in Fx.  Safer.  If it's from someone I 
know AND was expecting a msg, I rarely forget  just click links.  
Rarely, those WILL open in a new Tbird tab, but usually in default 
browser (Fx).


Don't know if has (anything) to do w/ Tbird options setting, under 
Advanced  Reading  Display:  Open Messages In:  New tab; New msg 
window; Existing msg window.

Never seen a Tbird setting about open links in
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Thunderbird leak

2014-01-26 Thread Joe Btfsplk

On 1/26/2014 1:15 PM, Al Billings wrote:

Assuming we’re talking about people opening web pages in TB tabs, that normally 
can only happen if someone installs Thunderbrowse or a similar extension. By 
default, TB doesn’t render web pages.
I thought the same thing.  I'm pretty sure I've had links in email open 
IN Tbird tabs.  It happened so rarely, took me by surprise. For safety, 
I never really clicked links in email.  After that, I never do.
I'm guessing it may've been a confirmation email for website forum, tech 
support w/ a link, etc.  Something I expected, or likely wouldn't just 
have clicked it, regardless of what Tbird's supposed / not supposed to do.


Of course, NSA could've intercepted the real confirmation  sent a link 
that downloaded malware.


If R click  copy link location was missing, I'd not click it at all, 
or erase msg or at bare minimum (if it was important), look at the msg 
source to see the real link.
When you're tired, may not realize you're in email  absent mindedly 
click a link.  Rather than a browser - where it's common to click links.

Something to be said for using email text only mode.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Thunderbird leak

2014-01-27 Thread Joe Btfsplk

On 1/26/2014 10:03 PM, Moritz Bartl wrote:

On 01/26/2014 08:42 PM, Al Billings wrote:

What is the bug number?

https://grepular.com/Security_Bug_Thunderbird_Websites_Tabs

The bugzilla report is currently locked from being viewed, but for when
it becomes unlocked, here it is: bug 700979

https://bugzilla.mozilla.org/show_bug.cgi?id=700979

That's odd.  Once logged into bugzilla, I've never seen you are not 
authorized to view this bug.  But maybe it happens.
Why would they lock it so others can't add to comments, unless they know 
it's a problem  want to keep a lid on it, till find a fix?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB 3.5 starts w/ size buttons hidden

2014-01-27 Thread Joe Btfsplk

On 1/27/2014 3:41 AM, Georg Koppen wrote:

Joe Btfsplk:

TBB 3.5 for Win is starting in half screen  the UI sizing buttons are
hidden because the TBB UI is shifted where the size buttons are off the
monitor.
So is most of the title bar, making it hard to drag the UI down to reach
buttons.  Once maximized, it fits fine on the monitor.

Are you seeing https://trac.torproject.org/projects/tor/ticket/10441 ?

If so, then it might be interesting to understand why it is happening in
your case (see comment 2 for an explanation for the failure on my
testing machine). If there is a different explanation we need to add
that one to https://trac.torproject.org/projects/tor/ticket/9268 to take
it into account for the Final Algorithm.

Georg

Read the bug  comments.  On mine, the title bar isn't missing - it's 
hidden (menu bar isn't checked to be displayed, by default) .
Hard to tell from the bug report attached screen, if their title and / 
or menu bar is missing or just hidden.  On mine, UI display - sometimes 
- stops in middle of tabs, showing it's not hidden or cut off JUST at 
their border.


As I said, if / when it's hidden AND if TBB bottom border is visible / 
draggable, moving bottom border up an inch or so, causes UI to change 
size and / or re-position, so title bar  sizing buttons are at least 
partially visible.
So, doesn't seem truly missing.  Neither does part of the bottom of UI 
(border) seem missing - on start up, when bottom border *sometimes* 
appears cut off.


When bottom border is NOT visible, if I hide task bar, the bottom UI 
border seems aligned w/ monitor's bottom.  Seems aligned - because 
don't know if it was ALREADY aligned (w/ monitor bottom, but hidden by 
task bar), or if hiding task bar causes TBB UI to *then change size / 
position,* just as  when title bar is hidden  dragging the bottom 
border UP, causes the UI to *re-position* - revealing *part* of title 
bar  buttons.


Just tested again w/ *menu bar displayed.*  Still started w/ title bar  
sizing buttons *ALMOST* hidden (title bar - just above menu bar).  In 
that scenario, almost hidden because can see only the *bottom, black 
border* of the sizing buttons.  BARELY enough to click  re-size UI 
(sometimes).  Again, if drag the bottom border UP ~ an inch, more of the 
sizing buttons (but not all) become visible.


With menu bar turned off, AND if / when it starts w/ title bar hidden, 
*(often) none* of sizing buttons is initially visible. Until I drag 
bottom border up, then the top of UI shifts down about 1/4 inch.
Other times, just enough of buttons are visible to click.  Erratic. I've 
identified at least 3 - 4 sequences / steps, when title bar (and / or 
menu) MAY be partially or totally hidden.  But not 100% for any 
scenario, AFAIK.


Title bar  size buttons being hidden on startup is ERRATIC, but happens 
*probably 50% of startups.*  Most often happens if I maximize UI, then 
reduce again, close TBB  restart (reduce UI, not minimize to task bar).
But, not 100% reproducible.  Sometimes, UI opens (in partial screen) w/ 
title bar  buttons fully displayed.  Next restart (immediately, w/o 
accessing any pages), title bar  buttons may be hidden again - *w/ OR 
W/O touching anything except close button.*


Since this doesn't happen w/ any other TBB versions before 3.5, AND 
doesn't happen w/ any apps, seems the problem began w/ some v3.5 change.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Thunderbird leak

2014-01-27 Thread Joe Btfsplk


On 1/26/2014 7:14 PM, Al Jigong Billings wrote:

Like I said, Thunderbird doesn't allow for pages to open in tabs without an
extension. So., if you have reliable repro steps,  it is a bug that should
be fixed and I can push on it to get it addressed.
Unless I can get one of the specially crafted emails to do tests, 
doubt I'll be able to reproduce it.
Preferably, acquire a special email w/ links, determined safe or one 
created just for testing.
Obviously, not going to click every link in all msgs from known / 
unknown sources.


Happened only couple times IIRC - months ago  spaced apart. But, I 
don't normally click ANY links in email.

Impossible to tell how many may've shown this behavior.
If I'm not imagining it, Mozilla could've fixed it by now.  Or not.

Someone mentioned (perhaps?) for some of the special msgs, they're 
missing the copy link location option?

If so, could just R click links to check.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia has been replaced with Tor Launcher

2014-01-27 Thread Joe Btfsplk

On 1/27/2014 9:02 PM, Michael Wolf wrote:
At this time, using Vidalia is the only way to change exit nodes 
without losing all your tabs, or to see which exit node is 
misbehaving. It would be really useful to be able to change exit nodes 
without Vidalia, even if this function is hidden somewhat.
We don' need to see no stink-eng exit nodes.  ...we walk by faith, not 
by sight.  :D




--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia has been replaced with Tor Launcher

2014-01-28 Thread Joe Btfsplk


On 1/28/2014 4:34 AM, Rick wrote:

On 01/27/2014 10:49 PM, Joe Btfsplk wrote:

On 1/27/2014 9:02 PM, Michael Wolf wrote:

At this time, using Vidalia is the only way to change exit nodes
without losing all your tabs, or to see which exit node is
misbehaving. It would be really useful to be able to change exit
nodes without Vidalia, even if this function is hidden somewhat.

We don' need to see no stink-eng exit nodes.  ...we walk by faith,
not by sight.  :D




U. Pink Floyd?

You mean The Wall?  (we don't need no education)?
No, I'm sorry.  The answer we wanted was, who were the banditos in 
Treasure of Sierra Madre, impersonating police - when asked to show 
their badges.  Badges?!  We don need no stink-ing badges.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TBB font size concern for many users

2014-01-29 Thread Joe Btfsplk
People having excellent sight naturally don't think about reading small 
print books or web pages.

But a lot of the general population has a problem with this.

Because of possible browser fingerprinting issues  / or anonymity 
leaks, TBB users are discouraged from
- changing default settings in TBB (like font name or the Default Font 
size / minimum size).
- using addons / extensions - (here, to enlarge fonts) that might 
compromise anonymity.


Points taken.  Where does that leave users NEEDING larger than default  
/ minimum  font size?
My guess - people w/ these problems just change fonts / sizes by various 
means, unaware of implications, or just no other choice.


For instance, using default font settings - TBB 3.5 - English, Windows - 
apparent font size on 
https://www.torproject.org/docs/faq.html.en#WhatIsTor is approx. 
equivalent to 9 pt (I think).
Even w/ Windows DPI increased to 110 vs. default 96.  For many, the 
equivalent of 9 pt is pretty small - even for a book.
Some pages use *very* small or hard to read font, if users keep the 
default TBB setting, allow pages to use their own fonts


For some, the default font STYLE - Times New Roman - (in TBB - English), 
may be less readable than others.


Fonts other than Times New Roman are often recommended for better 
general readability  for sight or other reading problems.
Other reading problems exist besides eyesight / small font; I don't have 
them, but they exist.


This general issue is problematic for many non-Tor users  overcoming it 
is a *technical* issue; in TBB, it involves anonymity - even security / 
freedom (get caught using Tor in the wrong place, for instance).


What are the *recommended* options for users w/ these issues, that won't 
increase browser uniqueness or possibly compromise anonymity?


For web sites (or others) looking at font style / sizes in TBB, what 
effect does using the keyboard  mouse to increase font size (e.g., Ctrl 
+ scroll)  have on fingerprinting?
Using THAT or similar method, can they still see the font size is 
different than default?


Just a question - I don't have a perfect answer:  what if default font 
size was increased (some) - or *possibly* other changes - would it put 
hardship on normally sighted users?  Would it cause them equivalent 
problems that small or harder to read font causes users w/ sight or 
reading problems?


If changing default font or size, by ANY known method may still cause 
concern, then developing an extension that plays nice w/ TBB isn't the 
answer.

Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Vidalia has been replaced with Tor Launcher

2014-01-29 Thread Joe Btfsplk

On 1/29/2014 7:05 AM, Kristov Atlas wrote:

Then the button should read change exit node and not new identity, no?


On Jan 27, 2014, at 22:02, Michael Wolf mikewol...@gmail.com wrote:


On 1/26/2014 5:57 AM, Lunar wrote:
Katya Titov:

New Identity works from both TBB and Vidalia. The difference is that
from TBB the entire browser closes and restarts and you lose open tabs.
When choosing a new identity from Vidalia the browser remains open.

I need to point this out one more time: In the case of the latter,
the browser content stays the same. All the browser content. Including
cookies, history, and many other things that are used to fingerprint a
browser session. This means that from the websites point of view,
nothing changes except the IP address. You keep the same identity there.

Sometimes you don't actually want your identity to change, but you
want to move to a different exit node because there is a connection
issue between the exit node and the destination.  You're browsing, and
then your exit node changes after so many minutes... but the new exit
node could be overloaded so it drops half of the requests coming
through, or the exit node is banned (HTTP 403) on the site being
requested, or the exit node is misbehaving and modifying traffic, or...

At this time, using Vidalia is the only way to change exit nodes without
losing all your tabs, or to see which exit node is misbehaving.  It
would be really useful to be able to change exit nodes without Vidalia,
even if this function is hidden somewhat.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Playing devil's advocate - is it a good or not so good idea for users
1) not to be able to see their current (exit) node?  For Tor users in 
certain countries, would it be the best choice to use nodes located in 
their own countries or in ones suspected of being cooperative with 
their countries?  Or nodes in specific other countries, depending on 
your country  its working relationship with those other countries?


Or is using exit nodes in your own country or in countries that 
regularly trade info with your country (many countries do), not 
considered an issue - at all?


2) not to know the result of a new identity?  Given 1) - (can't see 
nodes)..., then 2) seems a moot point.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] NoScript for TOR disabled by default

2014-01-30 Thread Joe Btfsplk


On 1/30/2014 9:22 AM, Sukhoi wrote:

In fact, I am worried with the Wireless Position System developed by
google and others, and the introduction in the browsers, like firefox, a
way to track which wireless networks the computer can see in a given
moment. Based on that they identify the user physical (because google
street view mapped the wireless network physical location), fingerprint
the computer and, possibly, track other key information.

Seems that this critical issue is not currently handled by TOR.


OK - why would Mozilla want to track the location of users?  Or think 
that (eventually) users would not say No to physically being tracked?  
Who *wouldn't* want to be physically tracked?  Like certain mobile 
providers were geographically tracking some users. That way, if you get 
lost, just call your mobile provider's CS  say, Where am I?


Or, is it Google saying to Mozilla, If you want the $ we pay you (for 
making Google the default search engine), then we need to be able to 
physically track Fx users.  So, make it happen.


Or, maybe it's a 3 letter agency telling Mozilla  Google to add ability 
in their browsers / searches, to physically track users?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] NoScript for TOR disabled by default

2014-01-31 Thread Joe Btfsplk

On 1/31/2014 8:00 AM, Olivier Cornu wrote:

Le 31/01/2014 01:18, Joe Btfsplk a écrit :

On 1/30/2014 9:22 AM, Sukhoi wrote:

In fact, I am worried with the Wireless Position System developed by
google and others, and the introduction in the browsers, like firefox, a
way to track which wireless networks the computer can see in a given
moment. Based on that they identify the user physical (because google
street view mapped the wireless network physical location), fingerprint
the computer and, possibly, track other key information.

Seems that this critical issue is not currently handled by TOR.

OK - why would Mozilla want to track the location of users?

It does not have to be Mozilla, it could also be any website visited:
http://www.securityweek.com/hacker-uses-xss-and-google-streetview-data-determine-physical-location

Where Mozilla might be held responsible is because the corresponding bug
has had an open ticket for almost 8 years:
https://bugzilla.mozilla.org/show_bug.cgi?id=354493

But perhaps I misunderstood what Sukhoi meant…
I understood that it's websites (or trackers like Google) that would 
gather data.  But the ability to do it - bug or whatever - comes from 
the browser or other technology, from Mozilla, Google, others.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB font size concern for many users

2014-01-31 Thread Joe Btfsplk

Maybe someone has further ideas, comments:

Re: What effect does using Ctrl + Scroll have on web sites' ability to 
detect apparent screen size?
Can sites determine the (selected) browser font name  size  thus, 
changes from default setting?

For fingerprinting?

Using http://browserspy.dk/ - without Flash or Java enabled, they 
apparently can't see any font list or size selected, in

TBB or Fx.
Nor do they indicate an ability (at all) to detect the font styles / 
sizes selected in either browser's options.
Am I correct, that sites can't detect changes from default _TBB settings 
for font NAME, size  minimum font size_, found under Options  Content?


browserspy.dk DOES reflect a change in *screen width  height* 
(Resolution) *when screen is enlarged (zoomed) using Ctrl + mouse scroll.*

That may / may not be very useful for fingerprinting?

For me, their reported screen width  height is incorrect - both @ 100% 
zoom AND w/ zoom increased.
That could be because the detected DPI is *also incorrect.*  They show: 
DPI detected via JavaScript = 96x96, when it's actually 110 DPI.


Is it known that sites CAN detect selected TBB *browser* font names  
sizes?  And perhaps other browser test sites would show that.
If not, it appears that changing font name  size under Options  
Content to increase small text, provides LESS browser characteristics 
than using Ctrl + mouse scroll to zoom screen size.



On 1/29/2014 10:31 AM, Joe Btfsplk wrote:

People having excellent sight naturally don't think about reading small
print books or web pages.
But a lot of the general population has a problem with this.

Because of possible browser fingerprinting issues  / or anonymity
leaks, TBB users are discouraged from
- changing default settings in TBB (like font name or the Default Font
size / minimum size).
- using addons / extensions - (here, to enlarge fonts) that might
compromise anonymity.

Points taken.  Where does that leave users NEEDING larger than default
/ minimum  font size?
My guess - people w/ these problems just change fonts / sizes by various
means, unaware of implications, or just no other choice.

For instance, using default font settings - TBB 3.5 - English, Windows -
apparent font size on
https://www.torproject.org/docs/faq.html.en#WhatIsTor is approx.
equivalent to 9 pt (I think).
Even w/ Windows DPI increased to 110 vs. default 96.  For many, the
equivalent of 9 pt is pretty small - even for a book.
Some pages use *very* small or hard to read font, if users keep the
default TBB setting, allow pages to use their own fonts

For some, the default font STYLE - Times New Roman - (in TBB - English),
may be less readable than others.

Fonts other than Times New Roman are often recommended for better
general readability  for sight or other reading problems.
Other reading problems exist besides eyesight / small font; I don't have
them, but they exist.

This general issue is problematic for many non-Tor users  overcoming it
is a *technical* issue; in TBB, it involves anonymity - even security /
freedom (get caught using Tor in the wrong place, for instance).

What are the *recommended* options for users w/ these issues, that won't
increase browser uniqueness or possibly compromise anonymity?

For web sites (or others) looking at font style / sizes in TBB, what
effect does using the keyboard  mouse to increase font size (e.g., Ctrl
+ scroll)  have on fingerprinting?
Using THAT or similar method, can they still see the font size is
different than default?

Just a question - I don't have a perfect answer:  what if default font
size was increased (some) - or *possibly* other changes - would it put
hardship on normally sighted users?  Would it cause them equivalent
problems that small or harder to read font causes users w/ sight or
reading problems?

If changing default font or size, by ANY known method may still cause
concern, then developing an extension that plays nice w/ TBB isn't the
answer.
Thanks.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB font size concern for many users

2014-01-31 Thread Joe Btfsplk

On 1/31/2014 11:24 AM, Moritz Bartl wrote:

On 01/31/2014 04:32 PM, Joe Btfsplk wrote:

Is it known that sites CAN detect selected TBB *browser* font names 
sizes?

See 4.6.4 in the Tor Browser design document:
https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability

Thanks for the link.  I've read the design document before, but good to 
review.  I read what little browserspy.dk had about fonts.  I've also 
read most of what EFF has on Panopticlick site, about everything.  
Several times. Didn't see the topic / statement on Panopticlick's site, 
referenced in Tor's design document  fingerprinting-linkability - about 
enumerable list in filesystem order... :
From 
https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability 

Fonts According to the Panopticlick study, fonts provide the most 
linkability when they are provided as an enumerable list in filesystem 
order, via either the Flash or Java plugins. However, it is still 
possible to use CSS and/or Javascript to query for the *existence* of 
specific fonts.
My question is NOT about sites querying which fonts are installed on my 
system (their existence).
The design document talks about measures taken  to limit font info that 
sites might get (quote below).  But, either I don't understand some 
details in the document (likely), or it doesn't address my actual 
question...
Which is, _can sites can detect the actual fonts  font sizes, 
*currently used by* the browser._


If they CAN,  I *change TBB's default font NAME and / or SIZES * (in 
Options  Content), then I'd be different from many TBB users.
I've looked for the answer for several years.  I've never seen *that 
question* / issue discussed - anywhere.  If someone has seen it 
discussed, please point it out.


That's assuming the setting is UNchecked:  Allow pages to use their own 
fonts.  If I allow using their own fonts, some text on some pages will 
still be very small / difficult to read.
As I determined, zooming pages with Ctrl + mouse scroll, DOES change the 
reported screen size on Panopticlick  Browserspy.dk - even in TBB.


Disregarding Flash  Java (disabled or not installed), every thing I've 
seen about sites getting font info (as I understand), discusses them 
querying which fonts are on your system  - NOT the actual fonts  font 
sizes *currently used by* the browser.


Tor DESIGN:
Additionally, we limit both the number of font queries from CSS, as 
well as the total number of fonts that can be used in a document with 
a Firefox patch 
https://gitweb.torproject.org/torbrowser.git/blob/maint-2.4:/src/current-patches/firefox/0011-Limit-the-number-of-fonts-per-document.patch. 
We create two prefs, *browser.display.max_font_attempts* and 
*browser.display.max_font_count* for this purpose. Once these limits 
are reached, the browser behaves as if 
*browser.display.use_document_fonts* was set. We are still working to 
determine optimal values for these prefs. 
Again, no discussion of sites detecting TBB's currently selected fonts  
sizes.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor-Talk now a social site?

2014-02-01 Thread Joe Btfsplk

Should Tor-talk change names to something like Torbook.com or Tor-match.com?

Tor-talk possibly ? should not be used to plan dinner dates  such, that 
has NOTHING to do w/ Tor, anonymity, privacy, computer safety, internet 
news  practices nor even tongue in cheek comments specifically ABOUT 
those things.


Maybe I'm off base.  I wasn't aware Tor-talk was a chat room or social 
gathering site.  Most people already get enough spam or mail that 
doesn't interest them in the least.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB: Can not set back to Never remember history

2014-02-04 Thread Joe Btfsplk

On 2/4/2014 3:02 PM, David Balažic wrote:

I use TBB 3.5.1 (win32)
Trying to delete some specific cookies, in the preferences I selected
Remember History on the Privacy tabs, to gain access to the Show
cookies button.
Unexpectedly that required a restart of TBB.

As that wiped out all cookies anyway, I tired to set thing back as they were.
But if I select Never remember history, after confirming it (click
OK), it changes to Use custom settings for history. I tried several
times.

In the TorButton extension security tab settings, are all 4 boxes 
checked?  By default, they're all checked.
It does say when you change the history setting in Options, that a 
restart is necessary.  Are you restarting it when it prompts, after 
changing back to Never Remember History?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB: Can not set back to Never remember history

2014-02-05 Thread Joe Btfsplk

On 2/5/2014 4:36 PM, David Balažic wrote:

On 5 February 2014 06:44, Joe Btfsplk joebtfs...@gmx.com wrote:

On 2/4/2014 3:02 PM, David Balažic wrote:

I use TBB 3.5.1 (win32)
Trying to delete some specific cookies, in the preferences I selected
Remember History on the Privacy tabs, to gain access to the Show
cookies button.
Unexpectedly that required a restart of TBB.

As that wiped out all cookies anyway, I tired to set thing back as they
were.
But if I select Never remember history, after confirming it (click
OK), it changes to Use custom settings for history. I tried several
times.


In the TorButton extension security tab settings, are all 4 boxes checked?
By default, they're all checked.
It does say when you change the history setting in Options, that a restart
is necessary.  Are you restarting it when it prompts, after changing back to
Never Remember History?

The third one is not checked.

When I select Never remember history, it does not prompt for restart.
If I restart manually, the setting is reverted to Use custom settings
for history.

if I set the mentioned third option in TorButton Security prefs, then
set Never remember history, restart (it does not prompt), the
TorButton Security change is preserved, but the History setting again
reverts to Use custom settings for history.

You don't have any (non-default) extensions or plugins?  Sometimes they 
mess w/ things.

Other than that one change, did you make any others?
Wondering if a file got corrupted?

One easy thing is just reinstall TBB.  Erase old files  start fresh.  
If something got corrupted, it'll be replaced.  Assuming you have a good 
d/l copy.
I've changed those settings before  they don't refuse to go back.  But, 
you may've found the newest bug.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB: Can not set back to Never remember history

2014-02-06 Thread Joe Btfsplk

On 6 February 2014 04:03, Joe Btfsplk joebtfs...@gmx.com wrote:

You don't have any (non-default) extensions or plugins?  Sometimes they mess
w/ things.
Other than that one change, did you make any others?
Wondering if a file got corrupted?

One easy thing is just reinstall TBB.  Erase old files  start fresh.  If
something got corrupted, it'll be replaced.  Assuming you have a good d/l
copy.
I've changed those settings before  they don't refuse to go back.  But, you
may've found the newest bug.



On 2/6/2014 3:20 PM, David Balažic wrote:

I now tried a clean installation of TBB 3.5.1 win32

I change the option from Never remember history to Remember History.
It requested a restart.
Then I checked and it was Use custom settings for history.
I looked at the TorButton extension security tab settings and it had
the first and third option UNchecked.
I changed it to Never remember history, it requested a restart again.
I looked at the TorButton extension security tab settings and it had
the third option UNchecked.
Then I checked the FF prefs and it was again Use custom settings for history.

So it is easily reproducible.
It doesn't sound right to me, but I'm no expert on newer TBB versions.  
I'm (sort of) seeing same thing as you.


In my v3.5.1, if I change from default never remember history to use 
custom history then check something else - like remember my browsing  
download history,

it prompts for restart - like you said.
After it restarts  I change back to never remember history  check 
always use private browsing, it retains those settings until I close 
Options, then reopen it (no messages, doesn't complain).


After reopening Options again, it's set on use custom settings for 
history.  But always use private browsing is still checked  NOTHING 
else on that screen.
After that, in Torbutton  Security tab, the 3rd option -restrict 3rd 
party cookies  other tracking data, is NOT checked.
It probably should be.  AND when then look in about:config (while 
Options still show always use private browsing - checked,  accept 
cookies - UNchecked),


then about:config shows:   extensions.torbutton.restrict_thirdparty = 
false.  Obviously, it should be True.


Other than checking some sites  looking at the cookies file (using an 
editor) to see if it is / isn't allowing any cookies - of any type, we 
have no way of knowing if this is just a UI bug, or if settings really 
get messed up internally.

Can others confirm this behavior?

Did you check https://trac.torproject.org/projects/tor for a similar 
problem, or file a report yourself?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TBB: Can not set back to Never remember history

2014-02-06 Thread Joe Btfsplk

On 2/6/2014 6:21 PM, Joe Btfsplk wrote:
Other than checking some sites  looking at the cookies file (using an 
editor) to see if it is / isn't allowing any cookies - of any type, we 
have no way of knowing if this is just a UI bug, or if settings really 
get messed up internally. Can others confirm this behavior? Did you 
check https://trac.torproject.org/projects/tor for a similar problem, 
or file a report yourself? 
Best I can tell, when Options has setting of  use custom settings for 
history  always use private browsing is checked,
then TBB 3.5.1 for Windows isn't allowing 1st or 3rd party cookies. In 
spite of Torbutton's restrict 3rd party cookies  other tracking data, 
NOT being checked under that scenario.


To check, I installed a cookie addon, so could access any stored cookies 
w/o the allow cookies box being checked.
Others can verify what I see.  If correct, the problem David sees may 
mostly affect the UI.

Still needs fixing - kind of disconcerting.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Pissed off about Blacklists, and what to do?

2014-02-07 Thread Joe Btfsplk

On 2/7/2014 12:42 PM, Matthew Finkel wrote:

This is in re: Hulu (whis is presumably authenticated)... but really,
it applies to any service which we, the legitimate users of Tor,
are denied access to.

It has simply gone too far and we should be putting effort into
reversing this trend by interacting with these deniers to become
permitters.

What do we do?

Basically what Lunar said.

A more active and vocal community may help. Passively accepting the
current situation doesn't seem to be working. If the services don't
know that legitimate Tor users exist in a significant quantity and
that they are worthwhile to support, then there's no incentive to try.

As someone mentioned, seems in order to convince some sites to stop 
denying Tor, some TBB users and / or Tor Project personnel need at least 
*some* supporting data.  Hopefully showing that the number of abusers on 
given sites aren't disproportionately coming through Tor.  Might be a 
1st step?


If data doesn't back that up (where would typical users *get* such 
data?), then the sites blocking Tor could have a point (regarding their 
OWN site).
How do we know if the blocking sites are / aren't getting lots of abuse 
via Tor (or at least think they are), OR... if that's *just an excuse.*
An excuse because TBB users can't be fingerprinted the same nor have the 
same amt of data extracted, as normal browsers.


After all, some sites (what % ?) are reportedly selling their users' 
email addresses, other data - to companies building user profiles; which 
in turn sell the profiles for advertising or possibly other purposes 
(NS*, etc.).
Even combining *real names  addresses w/ email addresses,* along w/ 
profiled personal interests, buying habits; interests in politics, 
religion -  so on.


So it wouldn't be surprising for some sites to use we get abuse through 
Tor as an excuse to block it.  Theoretically, they'd be losing money by 
not having as much data to sell.


TWO of many detailed article on this practice, that seems to be gaining 
popularity:
Race Is On to 'Fingerprint' Phones, PCs - 
http://online.wsj.com/news/articles/SB10001424052702304410504575560243259416072 

RapLeaf Inc. Profiles Users by Name - 
http://online.wsj.com/news/articles/SB10001424052748704679204575646704100959546?


I also remember a time when a fairly large # of sites refused access, 
unless you accepted cookies.  That practice was eventually relaxed.
Maybe? in part, because other ways were developed to gather data from 
visitors (beacons, etc.) and /or get money from 3rd parties, without 
needing cookies?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] My solution to Tor Browser remember password bug

2014-02-28 Thread Joe Btfsplk

On 2/28/2014 11:25 AM, Edgar S wrote:

I've complained here before that the remember password feature in some
long previous versions of Tor Browser no longer works. I've accepted it
will likely never come back. So I've found the following solution. Maybe
it will also work for others, discussion welcome.

In summary, I've installed a password manager, which I've gotten to work
with the latest TBB, and also not compromise security.

The password manager I chose was RoboForm.
You could just try open source, well tested password managers that have 
excellent reps.

I'm not sure Robo (full, uncrippled) can be had for free.  But...

Keepass Password mgr  Password Safe are both open source, maintained, 
excellent reps.

Keepass may be a bit more secure, but not by much.  Both are on Sourceforge.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Unseen.is login page blocked in TBB

2014-03-02 Thread Joe Btfsplk
On https://Unseen.is, the page(s) that would normally come after 
entering user name  PW is blocked.
Instead, submitting login data  page refreshes,  I just see a blank 
web page w/ a throbber in middle of page.
Same thing happens when creating a free acct - at top of page at address 
in above link.


After submitting data for new acct, browser refreshes, new page loads  
the blank page w/ throbber just sits.  But (for me), the acct was 
actually created.

I found that out from their support.
FYI:  to create an acct, don't actually need a *valid* Primary Email 
Acct.*  You have to enter an address in the form, but I don't think it 
has to be working, or it can be a disposable address.


After submit login data, even though the page is now blank, the URL in 
address bar has changed (from orig. Unseen.is), to reflect (I believe) 
the next page that's normally displayed after login.
*Login works* - using a standard Fx profile (even w/ NoScript  some 
other addons).  In a regular profile, after submitting the login data, 
the SAME blank page w/ a throbber appears for a few seconds, then 
disappears.


Difference being, in a regular profile, the blank page w/ throbber 
disappears after a few sec  brings up next page.  In TBB, the blank 
page never disappears.
Even after the URL in address bar has changed, I also can't just delete 
the node for the blank page (overlay), to reveal the 1st page inside 
my account.
I was unable to tell from Fx web console, what causes the blank page to 
permanently hang.  Someone else might be able to see it.


I've noticed the exact same problem in regular Fx... IF... I use the 
JonDoFox profile -  created by the extension of same name.
The profile that JonDoFox creates, makes many of the same changes to 
prevent browser fingerprinting that TBB and / or Torbutton make.


Javascript is enabled for Unseen.is domain in all cases.  In NoScript, I 
tried both whitelisting it  allowing scripts globally - no difference.


Login on this siteSince in a regular Fx profile works, but not in TBB or 
a JonDoFox profile.
The regular Fx profile can contain NoScript, Ghostery, Adblock Plus, 
CookieMonster, HTTPS Everywhere, etc.,  still allow login.  So, 
guessing? it's not those extensions causing the problem.


I even disabled and / or uninstalled potential problem extensions 
(NoScript, etc.) in both TBB  the JonDoFox profile - no change.
I conclude the issue is a change made by *both* TBB (or Torbutton) and 
JonDoFox extension.


Either it's some - other - change made (assuming in about:config) by 
both TBB  JonDoFox, that is NOT directly related to their included 
addons...;
OR... the problem is some change(s) that *IS associated* w/ their 
included addons (NoScript, etc.) but *disabling or uninstalling* the 
extensions installed by TBB  JonDoFox, doesn't correctly reset all 
about:config changes they made.


Unseen's support dept was clueless.   They definitely don't block TBB / Tor.
If anyone has an Unseen acct or wants to look / try creating a free 
acct, be aware they're upgrading part of their system for couple hrs 
as of Sun. 3/2 @ approx. 2 PM, Pacific Std. Time.

So it may not be available for a while.

Thanks.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] TorBrowser spoofed screen size?

2014-03-05 Thread Joe Btfsplk
I'm sure I recently checked what screen size TBB (Windows) was giving 
out.  Which ever version I checked it in, test sites did NOT show my 
actual monitor size.


Now, in TBB 3.5.2, my actual screen size seems to show on several 
browser test sites.
Even extracted TBB again, into clean folder  re-checked.  Still shows 
my *actual* screen size on test sites.


I thought decision was made / implemented to report same screen size for 
everyone?

This is a problem - for couple reasons, for me.

IF... I set Windows system DPI slightly  default of 96 (else it's too 
damn small), then w/o TBB properly spoofing screen size, sites will 
detect a size that's NEITHER the same as other TBB users, nor a 
standard size.
Changing Windows' DPI setting will make my detected screen size an 
oddball size - that almost no one has.


Anyone else notice TBB isn't spoofing a default screen size anymore, 
or have ideas why it isn't spoofing mine correctly?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBrowser spoofed screen size?

2014-03-05 Thread Joe Btfsplk

On 3/5/2014 7:52 PM, Soul Plane wrote:

I tried TBB 3.5.2 in Windows XP at 120 dpi and browserspy says I'm at 96.
Yes, that's screen resolution, or just resolution.  It's of some 
significance, but it's not the same as screen (or monitor) size.
Screen size is what I meant (like 1280 x 720, etc.).  That's the value 
I'm asking what TBB is now supposed to spoof (what IS that value).


Note:  it may? be working correctly for me (dunno)... except, since 
neither I nor millions, keep their system DPI set at default (in 
Windows, often 96), then the TBB spoofed screen size, modified by the 
DPI adjustment, gives a VERY weird number (sort of like:  1657 x 841, 
1920 x 892 etc.).  So weird, it's probably FAR more noticeable / unique, 
than just showing my real screen size, or somehow? spoofing my own 
(believable) value.


But, EVEN WHEN  I reset my system to 96 DPI, reboot - TBB still shows a 
weird value - like 1920 x *933* (just an example).

NO one has a screen size w/ those odd numbers.  That's the issue.

Try checking your screen size at these sites (they do thorough jobs, in 
varying degrees).
They're quite well known.   At BrowserSpy.dk, must click each test 
separately.  There, the test is screen.
You may have to enable javascript (if turned off) in NoScript, for some 
sites to detect certain browser or system values (a lesson unto itself 
about JS giving up info).


But, at least *parts* of many sites won't work w/o java script - a 
double edged sword.


Browser check sites:
From JonDoFox group: IP check http://ip-check.info/?lang=en
Panopticlick-EFF.org_Browser.Uniqueness https://panopticlick.eff.org/
BrowserSpy.dk_Browser Privacy Tests http://browserspy.dk/resolution.php

I've never checked the resolution before so I don't know how it compares to 
earlier versions.
I can't remember what TBB was reporting, the last time I checked on one 
of those sites.
For those using system default DPI values, TBB may be correctly spoofing 
a fairly common is size (or not).


If others would, please check to see if it's spoofing a common screen 
size, or a weird one.
If you report a sort of size back here, please state if you use 
default OS DPI value, or higher / lower.


I read a bunch on Trac, but *never found* the final draft for what 
size(s) they'd show.  I'm pretty sure none of the choices were 1920 x 869.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBrowser spoofed screen size?

2014-03-06 Thread Joe Btfsplk

On 3/6/2014 1:59 AM, Georg Koppen wrote:

Joe Btfsplk:

But, EVEN WHEN  I reset my system to 96 DPI, reboot - TBB still shows a
weird value - like 1920 x *933* (just an example).
NO one has a screen size w/ those odd numbers.  That's the issue.

Yes, they should be a multiple of 200 x 100. Resizing the browser window
does currently not take DPI and the size of taskbars into account (this
is #9268). See my comment 7 there as well that was probably for you.

Thanks Georg, but I think? we're talking about different things.

The bug #9268 is about the size of TBB window when it's launched 
(whether it fits on monitor, etc.).


The issue in THIS post, is the screen size (monitor size), that can be 
detected by sites for fingerprinting purposes as opposed to how well the 
TBB UI fits on the monitor when it's 1st launched.  Not the same things 
- though possibly ? related.


On the browser test sites mentioned, I'm not running the tests w/ TBB 
window partially enlarged (as when 1st launches).
But to clarify / add to your comment here, IF... one DOES run the 
browser tests w/ TBB UI in non-full screen mode, the test sites will 
show *different* detected screen size than when it's maximized.


And, if you zoom the TBB screen (Ctrl + scroll), the test sites detect a 
different screen size, as well.

Different issues than my original question on this post, but worth noting.



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBrowser spoofed screen size?

2014-03-06 Thread Joe Btfsplk
Following up on inconsistency of spoofed TBB screen sizes, shown on test 
sites:
I did more testing / checking.  Then posted comments on Trac 
https://trac.torproject.org/projects/tor/ticket/7256#comment:10  
comment #11.


For me, with each browser fully maximized, there's a *fundamental 
difference* in what the test sites see for screen size of regular 
Firefox (27), VS. TBB 3.5.2.
Same monitor, same displayed toolbars (of nearly identical heights) in 
both browsers - but vastly different screen size detected.


This would SEEM to make TBB users stick out like a sore thumb!?  It 
seems to be a large problem, *regardless* of the system DPI setting 
(default, or custom value).


Additional comment: note that at the same moment Panopticlick, etc., 
is showing an odd screen size for TBB 3.5.2 (like 1920 x **966** OR, 
if refresh page once, perhaps 1920 x **967**), a full screen capture 
of the same maximized browser screen (taking up full monitor), shows 
1920 x **1080*.*


The 966 or 967 TBB screen height (or whatever odd number),**turns 
out to be** the height for the part of browser window, beginning just 
below the browser navigation bar, down to the top of Addon Bar.


However, in regular Fx with exact same, similarly sized toolbars 
displayed (as in TBB), the test sites show screen size of the **full** 
monitor: 1920 x **1080**, not just the usable display area of the 
browser pane (the part of browser window where websites actually 
display).
I see odd (unique) screen sizes reported / detected on browser test 
sites, in TWO scenarios.

1) When Windows system DPI is set = default 96 DPI.
2) When system DPI is NOT the default value (many users must set it 
larger, to be able to read screens. Ex.: both Windows'  apps' Help 
screens, or text in browser screens (TBB).


On browserspy.dk or others, with **Windows' DPI = 96**, AND the TBB UI 
maximized (full screen), test sites don't show common screen 
(monitor) size. They show something like 1920 x 927 - a very odd value.


At same exact time, regular Fx shows screen size = **1920 x 1080** x 
24.








On 3/6/2014 8:21 AM, Joe Btfsplk wrote:

On 3/6/2014 1:59 AM, Georg Koppen wrote:

Joe Btfsplk:

But, EVEN WHEN  I reset my system to 96 DPI, reboot - TBB still shows a
weird value - like 1920 x *933* (just an example).
NO one has a screen size w/ those odd numbers.  That's the issue.

Yes, they should be a multiple of 200 x 100. Resizing the browser window
does currently not take DPI and the size of taskbars into account (this
is #9268). See my comment 7 there as well that was probably for you.

Thanks Georg, but I think? we're talking about different things.

The bug #9268 is about the size of TBB window when it's launched
(whether it fits on monitor, etc.).

The issue in THIS post, is the screen size (monitor size), that can be
detected by sites for fingerprinting purposes as opposed to how well the
TBB UI fits on the monitor when it's 1st launched.  Not the same things
- though possibly ? related.

On the browser test sites mentioned, I'm not running the tests w/ TBB
window partially enlarged (as when 1st launches).
But to clarify / add to your comment here, IF... one DOES run the
browser tests w/ TBB UI in non-full screen mode, the test sites will
show *different* detected screen size than when it's maximized.

And, if you zoom the TBB screen (Ctrl + scroll), the test sites detect a
different screen size, as well.
Different issues than my original question on this post, but worth noting.





--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] configure Vidalia stand alone

2014-03-09 Thread Joe Btfsplk
The only comments I've seen about using Vidalia 0.2.21 - Win (the stand 
alone package) w/ TBB 3.5.x, to see the map  connections, is just 
install / extract it to its own folder  start it after TBB is already 
running.
Like falling off a log?  That doesn't work for me.  Perhaps because I 
don't let TBB extract to the default location (I use another HDD than 
where C:\ is located)?  Or, the devil's in the details.


I need to control the country for exit relays - temporarily, while set 
up an email acct w/ TBB - then remove the restriction. Vidalia's not 
required to force exit relays in Tor, but makes it easier to see 
counties actually used.


Anyway, I've not found many details on how to edit Vidalia settings now 
so it will detect that Tor is already running (it is). Especially when 
TBB is not on C:\.
As opposed to what the Vidalia settings file still shows as a check box 
(the *old* way of how Vidalia / Tor worked):  Start Tor software when 
Vidalia starts;


instead of... how the FAQ instructions 
https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ, 
seem to indicate?, just put Vidalia anywhere  start it anytime after 
TBB is running... (~ no mods needed  they'll find each other).


Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TLS/SSL SMTP MitM

2014-03-10 Thread Joe Btfsplk

On 3/10/2014 1:43 PM, Gordon Morehouse wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi there,

I have been doing some testing of sending email over Tor and today ran
into a definite BadExit (but not flagged, clearly) because there was a
blatant MitM attempt on three separate occasions when I initiated a
TLS/SSL SMTP connection to my mail provider.  Thunderbird popped up
the usual warnings, etc.  The trouble is, I don't know how to quickly
find out what exit was being used so I can tattle on it; in this case,
I'm using an old laptop with limited resources, so I just run tor at
boot and don't have the fancy Vidalia map thingy or any of that, and
I'm unfamiliar with the CLI invocations which could help me figure out
who's playing dirty tricks with their exit node.

I can't help much w/ determining if it was a bad exit, but I can offer 
one way to see the exits in use.


That's one complaint about TBB 3.5 series - took away the ability to see 
a map of relays.
Though I personally had what seemed like bugginess w/ Vidalia, you can 
still get the stand alone version to use w/ TBB 3.5.
Vidalia-standalone-bundles_Index of /~erinn/ 
https://people.torproject.org/%7Eerinn/vidalia-standalone-bundles/


Best I can tell from sparse instructions, you just extract Vidalia files 
to a separate folder - created as sub-folder of TorBrowser folder.
You must Start Vidalia AFTER TBB (Tor) is already connected.  I didn't 
need to modify anything, anywhere to make Vidalia detect Tor  display 
the network map.


But, it also tends to crash (mess up), after a few TBB restarts (exiting 
Vidalia each time, before exiting TBB).

So it may not work flawlessly, long term.

Another option is copy the IPA shown on the Tor connection screen in 
TBB, then enter it into any IPA checking site - get the location, 
perhaps server name?
Also check if that IPA is on blacklists What Is My IP Address Blacklist 
Check http://whatismyipaddress.com/blacklist-check

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


<    1   2   3   4   5   6   >