Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
Technically, the most effective way of avoiding TOR Exit nodes snooping in on you is not using TOR in the first place. This is a genuine answer, I'm not being sarcastic. But you open yourself up to communications sniffing, wiretaps, mass surveillance and other NSA operations vs the option of 2% of

[tor-talk] The Treat of Quantum Computing and Annealing, and a possible solution - NTRU for Tor

2013-07-01 Thread Todd Hubers
Do governments already have a 1M bit Quantum Annealer (like the DWave), capable of breaking RSA and ECC? Well, there's an open source implementation, NTRU, which is not known to be susceptible to Shor's algorithm (and by extension Quantum Computation), being lattice-based. http://sourceforge.net/

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Andreas Krey
On Mon, 01 Jul 2013 22:18:06 +, coderman wrote: ... > you should assume this number will always approach anything greater > than zero; and how do you handle a reduction? axe clients without > prejudice? Put new clients into the next instance of this service, formally operated by someone else?

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread coderman
On Mon, Jul 1, 2013 at 4:12 PM, Praedor Tempus wrote: > Sounds like for Germany and like countries/laws such servers should be > limited to no more than 10k users each to prevent that invasion. you should assume this number will always approach anything greater than zero; and how do you handle a

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread coderman
On Mon, Jul 1, 2013 at 1:04 PM, wrote: >> Thank you for raising this topic once again. Toying with the idea of >> "better" email for quite some time,... >> ... >> I'd like to see a full design for it first, and then the components, and >> the configuration for each component, so this is easy to s

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread krishna e bera
On 13-07-02 12:04 AM, Andrew F wrote: > How about we eliminate the issue by pushing a campaign for every website to > offer an ssl option. It really should be the standard. > > Anyone a marketing Guru or PR specialist? Please do support EFF in this initiative! https://www.eff.org/encrypt-the-web

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Andrew F
How about we eliminate the issue by pushing a campaign for every website to offer an ssl option. It really should be the standard. Anyone a marketing Guru or PR specialist? On Tue, Jul 2, 2013 at 3:47 AM, Jimmy Chen wrote: > I never said properly and ethically certified, did I. > On Jul 1, 20

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
I never said properly and ethically certified, did I. On Jul 1, 2013 8:25 PM, "adrelanos" wrote: > What happens if JonDo certified mixes do things forbidden by certification? > > Jimmy Chen: > > If you want your exit nodes to be certified, it's probably best at this > > time, to use JAP instead o

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread adrelanos
What happens if JonDo certified mixes do things forbidden by certification? Jimmy Chen: > If you want your exit nodes to be certified, it's probably best at this > time, to use JAP instead of TOR. Or combine both, tunnel JonDo through Tor (user -> Tor -> JonDo). (Not saying it's necessarily a goo

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
There are malicious TOR Nodes, and you can't stop that from happening. But it is up to the service providers to enable encryption on their servers, removing the possibility that such data can be intercepted. You shouldn't trust your information to be sent through a plaintext protocol to begin with,

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread grarpamp
> I have a concern regarding exit nodes in Tor. In my mind it is possible for > an attacker to run a malicious exit server that gathers information at the > exit point. Of course, this does not compromise anonymity per se, but it > still can reveal sensitive data to malicious people. I think the Jo

[tor-talk] safety of exit nodes

2013-07-01 Thread anonymous . coward
Hi there, I have a concern regarding exit nodes in Tor. In my mind it is possible for an attacker to run a malicious exit server that gathers information at the exit point. Of course, this does not compromise anonymity per se, but it still can reveal sensitive data to malicious people. I think

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Praedor Tempus
Sounds like for Germany and like countries/laws such servers should be limited to no more than 10k users each to prevent that invasion. From: Moritz Bartl To: tor-talk@lists.torproject.org Sent: Monday, July 1, 2013 10:41 AM Subject: Re: [tor-talk] Secure emai

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread alice-tor
> Thank you for raising this topic once again. Toying with the idea of > "better" email for quite some time, I think there's direct and practical > things you can offer, > > > i was thinking about pointing the mx record of the tld to a mail > > server that is shared with other individuals. the se

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Moritz Bartl
Hi, Thank you for raising this topic once again. Toying with the idea of "better" email for quite some time, I think there's direct and practical things you can offer, > i was thinking about pointing the mx record of the tld to a mail > server that is shared with other individuals. the server >

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Van Gegel
In the case of access to e-mail from untrusted computer is convenient and reliable to use one-time password authentication using e-codebook - mobile Java applet for your phone. A one-time password is generated in response to RAND, generated by the mail server. QR-code can be used. For example s

[tor-talk] Main German TV ARD reports about Tor

2013-07-01 Thread tor-admin
Yesterday evening the German TV magazine "ttt" showed a program about the darknet and Tor. Online there is a recording available: http://is.gd/eofnVF Unfortunately only in German. But the page also provides a German transcript of the TV program. Regards, Torland ___

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Mike Cardwell
* on the Sun, Jun 30, 2013 at 06:18:01PM -0600, AK wrote: > That's why I'm setting up my own mail server at home. And also plan to > access it via web interface if using someone else's machine (like at > home). I would only allow web access via SSL and password, and only > show the emails of the l