Re: [tor-talk] Escape NSA just to enter commercial surveillance?

2016-01-14 Thread str4d
s surveillance on its own, as stated business > practice. Also, I'm pretty sure if another Manning-like case > appears, NSA would immediately command Facebook to offer the > related user identification. Not everyone's adversary is the NSA. str4d > > If there's

Re: [tor-talk] Accessing Cloudflare sites on TBB

2015-10-03 Thread str4d
quest comes in on spamalot.com and shortly after multiple requests come in on slstatic.com, it should mark those as the same session, somehow (whether by adding a query parameter or header to the static requests, or being more intelligent on the server side). str4d > > best, Griffin >

Re: [tor-talk] HORNET onion routing design

2015-07-25 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Jeffrey Burdges wrote: > I've no read much of the NORNET article, although not yet carefully > enough, very interesting. > > On Sat, Jul 25, 2015 at 12:21 AM, str4d wrote: > >> In this design, I would say the major probl

Re: [tor-talk] HORNET onion routing design

2015-07-24 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Seth David Schoen wrote: > str4d writes: > >> * No replay detection - packet replay is ignored within the >> lifetime of a session. They suggest that adversaries would be >> deterred by the risk of being detected by >>

Re: [tor-talk] HORNET onion routing design

2015-07-23 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 str4d wrote: > * Stateless data transmission (as they say on the box) - the > routing info is replicated in every data packet, removing the need > for local lookups. This increases the data packet header size (7 > hops requires 344 byte

Re: [tor-talk] HORNET onion routing design

2015-07-23 Thread str4d
t specify how a path from source to destination would be determined, but merely assumes that such a path can be found. It should therefore be possible to implement a HORNET-based routing overlay using server-side software instead of network hardware, similar to Tor and I2P. Such a scheme would however no

Re: [tor-talk] CloudFlare one site, multiple domains problem

2015-05-27 Thread str4d
ains the site uses. But this would probably need to be repeated each time the circuit changes (like the CAPTCHAs already need to be). str4d > > Unfortunately I cannot share the website as doing so could identify > me. Also, I have been unsuccessful getting th

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-18 Thread str4d
uot;solves" this by implementing the protection itself, including some general rate limiting features in server tunnels that drop connections before the webserver ever sees them. It also includes a unique local address per client feature like [0] for use with off-the-shelf applications, but th

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-05 Thread str4d
tacks that Sybil enables harder to carry out (because a Sybil on its own is not an attack), as well as general network growth to make obtaining a large enough network fraction more difficult (we estimate there are currently around 25,000 I2P routers). str4d -BEGIN PGP SIGNATURE- iQIcBA

Re: [tor-talk] SIGAINT email service targeted by 70 bad exit nodes

2015-04-26 Thread str4d
as BadExit. My point is, the MyFamily declaration is completely unauthenticated, and cannot be relied upon for anything more than providing contact information. There is a newer iteration being discussed that would prevent relays from joining families without permission, but then a malicious e

Re: [tor-talk] git: application level leaks and best practices?

2015-02-26 Thread str4d
t that's not much help > here) There is if you use bash (or a similar shell environment): alias git='TZ=UTC git' If you only want to force UTC for occasional commands then just add "TZ=UTC" in front of the command, but I personally prefer redefining the git command l

Re: [tor-talk] phantom protocol

2014-12-15 Thread str4d
atch the video. Both of > which should be linked above. It's worth looking at. > It is an interesting protocol. I am reviewing the whitepapers, and intend to publish a comparison page on the I2P website[1] once I have a good understanding of the differences. str4d [0] http:/

Re: [tor-talk] Twitter account lockouts for Tor users

2014-11-05 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I use Polly on my laptop with no lock-out yet. I do regularly get "Unable to connect to Twitter" error messages, from the exit node my circuit has switched to being blocked by Twitter (I assume). str4d Brian Kroll wrote: > I use Tw

Re: [tor-talk] Tor Weekly News — September 3rd, 2014

2014-09-04 Thread str4d
hich fixes the disclosed vulnerability. Disabling I2P by default was done to reduce the potential attack surface; I2P itself is no longer vulnerable to that attack. str4d -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUB+zVAAoJEIA97kkaNHPnMAEP/igZJW4FH51mdqxHKtjpgA5Q CugZFtfl2VgKNJHE2QklWCsLH70/KL+swIHdS+Ut

Re: [tor-talk] Can NAT traversal be Tor's killer feature?

2014-07-10 Thread str4d
The solution that I2P is considering for this is to remove the requirement for a global IPv6 <-> .b32.i2p mapping, and instead use a local ephemeral mapping on a virtual interface combined with a local DNS resolver. This would enable backwards compatibility for applications that suppor

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-05 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07/05/2014 11:13 AM, grarpamp wrote: > On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski > wrote: i2p does have 'exits' you can compare to > tor as well. Anyone can run an exit. But users have first find one > on a wiki list or somesuch, and the

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service

2014-07-03 Thread str4d
2P sphere: Syndie [0] - distributed forum system that can sync data from various sources at any desired interval. I2P-Bote [1] - distributed encrypted email. Can be configured so that emails are stored via relays which delay before passing on packets, so the "visible" store of an encry

Re: [tor-talk] Freenet and hidden services

2013-10-07 Thread str4d
ipermail/cypherpunks/2013-October/001242.html str4d On 10/07/2013 08:11 PM, Jerzy Łogiewa wrote: > Do you mean if Tor wold have distributed data store like freenet? > > Nice idea, please implement this. :~ > > -- Jerzy Łogiewa -- jerz...@interia.eu > > On Oct 6, 2013, at

Re: [tor-talk] Help with getting a good automated sign up script for an email service on TOR

2013-09-17 Thread str4d
cause postman's mail system has been running since 2004, so he could be a useful source of info for you. And I think that having the operators of two similar mail systems talking with each other would be beneficial to the development of these systems :) str4d On 09/18/2013 12:41 PM, Conrad Rocken

Re: [tor-talk] Email Clients and Tor

2013-09-03 Thread str4d
d=9 Incidentally, by postman's ratings, (Sylpheed) Claws comes out on top :) (For those without I2P I have pasted the page contents to http://pastebin.com/TDD5NzTn - postman doesn't allow access to his site via I2P inproxies) str4d -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12