Eva Galperin and I worked on this graphic (drawn by Hugh D'Andrade)
that tries to show the difference between the threats Tor addresses
and the threats HTTPS addresses.
https://www.eff.org/deeplinks/2012/03/https-and-tor-working-together-protect-your-privacy-and-security-online
The complete inter
Robert Ransom wrote:
>Using multiple SocksPorts from the same Tor client only helps if you
>are using Tor 0.2.3.x-alpha, which introduced 'stream isolation'. (I
>don't think 0.2.2.x supports multiple SocksPorts at all.) Read the
>man page.
Multiple socks ports are in stable, we'll make the
On Mon, Mar 5, 2012 at 6:02 PM, Julian Wissmann wrote:
>
> Awesome stuff! Love the ideas you've got, there ;-). Would you mind
> people re-using that?
In fact, I'm not entirely sure I'll get to use it this semester... so,
please, take what you like and leave the rest!
> Don't make it too complex
> > Also tails, which is listed on torproject.org, uses only one
> SocksPort [4]
> > and mixed all activity into the same SocksPort.
>
> Using
> multiple SocksPorts from the same Tor client only helps if you
> are using
> Tor 0.2.3.x-alpha, which introduced 'stream isolation'. (I
> don't think 0.
On Mon, Mar 5, 2012 at 7:20 PM, wrote:
> Thanks for your answer. It's immensely helpful.
>
[...]
>> (Note
>> that usernames and/or passwords can be used to separate streams,
>> too.)
>
> Is this documented somewhere?
If you're asking this question, you *really* want to check out all the
isolati
Thanks for your answer. It's immensely helpful.
> Everyone who suggests using BitTorrent over Tor is pointed
> to
> https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea ,
>
> which mentions that issue. It should be more visible. Perhaps you
> could
> send a patch to add it to the
Hi tor-talk!
This is a request for input. Pedagogical input, but I'm also aware of
how crazy smart you all are in general!
About six months ago, one of you described vaguely how your servers
were seized by German cops and you explained to the police how Tor
works using envelopes within envelopes.
On 2012-03-05, pro...@secure-mail.biz wrote:
> The users awareness for identity correlation through circuit sharing [0] is
> almost zero. There should be more clear warnings about it on torproject.org.
>
> People are frequently told to extensively use Google. They do so and will be
> affected. If
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
>
> However, I sat down recently and tried to sketch out how an
> in-class hands-on exercise might work that explained some of the
> core features of Tor. Here is the result:
>
> https://josephhall.org/tor/tor-exercise.html
> https://josephhal
The users awareness for identity correlation through circuit sharing [0] is
almost zero. There should be more clear warnings about it on torproject.org.
People are frequently told to extensively use Google. They do so and will be
affected. If you google the term [1] you will see that it has been
Hi,
I've noticed that TBB linux-x86_64-2.2.35-7.2 won't start the browser. After
some debugging, the reason is that it depends on gtk2 >= 2.20 which contains the
symbol gtk_widget_set_realized (RHEL-like distros have gtk2 2.18.9).
The issue popped up on Scientific Linux 6.2, but other RHEL-like d
11 matches
Mail list logo