Sorry I'm so far behind on email. Will try to catch up soon.
On Fri, 24 Sep 2010 22:05:45 +0200 Sebastian Hahn m...@sebastianhahn.net
wrote:
On Sep 11, 2010, at 3:47 AM, Sebastian Hahn wrote:
On Sep 10, 2010, at 10:40 AM, Roger Dingledine wrote:
In any case, Sebastian started a trac
On Thu, Oct 7, 2010 at 5:19 AM, John Brooks spec...@dereferenced.net wrote:
On Wed, Oct 6, 2010 at 9:11 PM, Load Bear loadbear...@gmail.com wrote:
I am aware of that limitation. However, I am currently less concerned
about eavesdroppers between a given VPN and the destination than I am
about
On Sun, Oct 3, 2010 at 2:05 PM, kalitnik...@privatdemail.net wrote:
Hello everyone.
I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it in web,
though it has opened source placed in sf.net.
Have you people discussed
On Thu, Oct 7, 2010 at 4:32 AM, Anon Mus
my.green.lant...@googlemail.com wrote:
On Sun, Oct 3, 2010 at 2:05 PM, kalitnik...@privatdemail.net wrote:
Hello everyone.
I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it
Nick Mathewson wrote:
On Thu, Oct 7, 2010 at 4:32 AM, Anon Mus
my.green.lant...@googlemail.com wrote:
On Sun, Oct 3, 2010 at 2:05 PM, kalitnik...@privatdemail.net wrote:
Hello everyone.
I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features,
On Thu, Oct 07, 2010 at 05:20:08PM +0100, my.green.lant...@googlemail.com wrote
2.3K bytes in 55 lines about:
: Well, well, well suddenly the problem fixes itself... after
: 20+ disconnects and 10+ You are using a proxy which is changing
: your data... refusing connection.. over the past 3
The title says it all:
Several people recommend running a hidden service from within a VM,
to prevent attackers from doing side channel attacks and reading off your
hardware components and serial numbers.
Then I heard that attackers can actually break out of VM's if they get root
access on it
Hikki,
From a defense in depth point of view it can help to use a VM. It is
not impossible for an adversary to break out of a VM, but if you are
using a good VM it will at least require a pretty sophisticated
attacker. I would say that using a VM would increase the security of
your hidden
Hi!
If there is no back-door or bug in your VM software, how you wanna break out
of the VM?
Even with root privileges you will be a prisoner within the VM.
Proof me wrong.
Michael
2010/10/7 hi...@safe-mail.net
The title says it all:
Several people recommend running a hidden service from
On Thu, 7 Oct 2010 18:12:45 -0400
hi...@safe-mail.net wrote:
Several people recommend running a hidden service from within a VM,
to prevent attackers from doing side channel attacks and reading off your
hardware components and serial numbers.
Using a VM doesn't prevent most side-channel
On Thu, Oct 07, 2010 at 08:31:14PM -0400, michael.gom...@gmail.com wrote 2.8K
bytes in 78 lines about:
: If there is no back-door or bug in your VM software, how you wanna break out
: of the VM?
That's a perfect world that doesn't exist. The VM software will have
bugs, someone will exploit it.
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers that offer one or more
of these two services. Thanks.
***
To
On Thu, 7 Oct 2010 23:58:28 -0400
grarpamp grarp...@gmail.com wrote:
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers that offer one or more
of these two services. Thanks.
No --
13 matches
Mail list logo