Seth David Schoen writes:
If you read the original Tor design paper from 2004, censorship
circumvention was actually not an intended application at that time:
https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf
(Tor does not try to conceal who is connected to the network.)
U.R.Being.Watched writes:
http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/
There are some mistakes in the article -- for example the notion that
Tor was built for a specific purpose, which was the circumvention of
restrictive
http://www.deseret-tech.com/journal/psa-tor-exposes-all-traffic-by-design-do-not-use-it-for-normal-web-browsing/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Your traffic is visible to the exit node.
The exit node has to transmit your traffic in plaintext if your
destination doesn't support TLS. Same goes for your ISP, country,
company firewall and so on. This vulnerability can't be fixed without
proper end-to-end encryption.
You are much safer with
On 08/05/2013 06:53 PM, Crypto wrote:
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too
This is one of the reasons I only use tails. As tails is a live cd every
time you boot up you get a fresh system. So any viruses are wiped away.
Of course they have already done there work in the last session. But with
windows.. every time you fire up Tor, they could be watching with this
On 08/06/2013 05:20 AM, Andrew F wrote:
This is one of the reasons I only use tails. As tails is a live cd every
time you boot up you get a fresh system. So any viruses are wiped away.
Of course they have already done there work in the last session. But with
windows.. every time you fire
On Mon, Aug 5, 2013 at 11:41 PM, intrigeri intrig...@boum.org wrote:
mirimir wrote (06 Aug 2013 05:46:37 GMT) :
If this exploit had included a Linux component, Tails would not have
protected you.
I've not studied the attack code but this appears to be mostly
correct.
I believe it would have
Hi,
mirimir wrote (06 Aug 2013 05:46:37 GMT) :
If this exploit had included a Linux component, Tails would not have
protected you.
I've not studied the attack code but this appears to be mostly
correct. Our shortest-term plan to address this is to contain [1] the
web browser; this is part of
Hi,
Gregory Maxwell wrote (06 Aug 2013 06:47:03 GMT) :
This is basically the threat model that whonix's isolation is intended
to address, it would be good to see tails improve wrt this.
Sure. The Live environment and our wish to support not-so-powerful
hardware may get in the way, but I'm
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too vulnerable to trust?Watch the video below.
XKeyscore
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too vulnerable to trust?Watch the video
this may be a bit of a tangent to your firefox/TBB exploit question, but
it is an answer regarding the validity of TOR:
TOR is not designed to withstand global passive attackers. it tries to
select relays from different AS to create circuits that leave the area
of influence/surveillance of local
* krugar tor-ad...@krugar.de wrote:
cheers :S
I fully concur :-/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 08/05/2013 06:53 PM, Crypto wrote:
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too
Crypto:
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively
exploiting holes in technology anonymity tools? We know that Tor
and hidden services has issues, not to mention the whole
fingerprinting problems.
Is Tor too vulnerable to trust?Watch
Adrelanos,
Would the exploit have worked with Whonix?
On 08/05/2013 10:30 PM, adrelanos wrote:
Crypto:
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively
exploiting holes in technology anonymity tools? We know that Tor
and hidden services has
andrfew:
Adrelanos,
Would the exploit have worked with Whonix?
For a discussion of this, please have a look at our forum:
https://whonix.org/wiki/Special:AWCforum/st/id50/Latest_javascript_exploit_againshtml
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or
18 matches
Mail list logo