Jitsi now cann't route RTP through Tor becouse not supported RTP over TCP.
Only Skype, Mumble and my forks of PGPFone and SpeekFrealy, and maybe some
other rare apps can use TCP as a transport layer for voice.
It makes no sense to use Tor to connect to the XMPP server only. All the same,
the
over 9050. The only thing that didn't happen was issuing a NEWNYM
command. But would that have stopped the connection from happening?
Maybe, sometimes Tor gets a little stuck, or the exit packetfilter's things
after Tor finds a path. Using MAPADDRESS can help with testing exits.
Also, a quick
Andrew F:
krishna,
Tor minimizes the variables that can Identify you via fingerprinting
techniques, but
a dedicated team can still track you with enough effort. I know form
personal experience
Andrew, I'm interested in any more light you can shine on this. I don't
expect full details, but:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/29, Mike Perry wrote:
David Balažic:
In that light, are there patches available to update between releases?
It might reduce load on the servers too.
We hope to support the Firefox updater in TBB soon. After some Tor
Launcher cleanup,
everyone is tooting about pgp these. pgp encryption doesnt solve the problem of
tla surveillance. pgp encryption does not touch metadata (recipent, sender).
how to secure mail communication?
i was thinking about pointing the mx record of the tld to a mail server that is
shared with other
I would think that simply finding a mail server that doesn't log
ANYTHING (like what StartMail is about to offer) and encrypting
everything should be enough. Of course, you'd need to trust that the
service really isn't logging anything but that could be solved by
accessing it via Tor.
So
This poses a really interesting question.
Another solution would be to use already existing remailers, and doubling
the encryption together with the TO: email in the inline plaintext. The
question is how to properly do a dual encryption.
My proposed solution is the following:
Plaintext message
On 06/30/2013 03:52 PM, alice-...@safe-mail.net wrote:
everyone is tooting about pgp these. pgp encryption doesnt solve the problem
of tla surveillance. pgp encryption does not touch metadata (recipent,
sender).
how to secure mail communication?
There's an easy solution. Only communicate
I would think that simply finding a mail server that doesn't log
ANYTHING (like what StartMail is about to offer) and encrypting
everything should be enough. Of course, you'd need to trust that the
service really isn't logging anything but that could be solved by
accessing it via Tor.
So
That's why I'm setting up my own mail server at home. And also plan to
access it via web interface if using someone else's machine (like at
home). I would only allow web access via SSL and password, and only
show the emails of the last week (not more). Trying postfix, dovecot,
and SquirrelMail.
edit: someone one's else machine *like at work
On Sun, Jun 30, 2013 at 6:18 PM, AK aka...@gmail.com wrote:
That's why I'm setting up my own mail server at home. And also plan to
access it via web interface if using someone else's machine (like at
home). I would only allow web access via SSL
11 matches
Mail list logo