Qubes OS

2010-07-07 Thread Matej Kovacic
Hi,

have you seen this:

http://qubes-os.org/Home.html

Qubes is an open source operating system designed to provide strong
security for desktop computing. Qubes is based on Xen, X Window System,
and Linux, and can run most Linux applications and utilize most of the
Linux drivers. In the future it might also run Windows apps.


I think this just calls to be torrified! :-))

And they say they are looking for developers...

Regards,

Matej
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: a VPN on top of tor, here's a script

2010-05-16 Thread Matej Kovacic
Hi,

great job!

BTW, is it possible to develop NetworkManager extension for this?

And it would also be great to Tor extension for Network Manager...

Regards,

Matej
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: GeoIP database comparison

2010-05-13 Thread Matej Kovacic
Hi,

 Wasn't there a user driven opensource geoip database project

For Debian/Ubuntu:

geoip-database - IP lookup command line tools that use the GeoIP library
(country database)

tor-geoipdb - geoIP database for Tor

bye, Matej
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Data Retention Law Violates German Constitution

2010-03-02 Thread Matej Kovacic
Hi,

 Thanks for the info, it's great to read that and hope that's will help to 
 protect the our privacy .


It seems data retention is not completely banned, the problem is only
german implementation.

However, it is important thing.

bye, Matej
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


TorButton translation

2010-01-26 Thread Matej Kovacic
Hi,

a year ago or so, I was translating TorButton in slovenian language.

Now I see new features were added, but no localisation done.

I am willing to help, however, I lost instructions. Could the author
(Mike Perry) send me .po file or instructions how to finish slovenian
translation?

Thx.

Bye, M.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Ubuntu Karmic repository?

2009-11-28 Thread Matej Kovacic
Hi,

I  have noticed, there is no Ubuntu Karmic repository with Tor binary
packages.

Or am I wrong?

bye, Matej
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: SSL MITM attack by a Tor exit

2009-09-07 Thread Matej Kovacic
Hi,

 Some interesting information about the self signed certificate:
 
 CN: Finjan.com

Could be that provider of this exit point uses some network appliance.
Some special firewall with antivirus, etc. protection, so called UTM
(Unified Threat Management) device, which does traffic interception only
to check for viruses or malicious code.

Net neutrality ftw!! :-))

bye, M.


Re: Supercookies

2009-08-21 Thread Matej Kovacic

Uuuups, it seems BetterPrivacy allows remote code execution.

This plugin is currently dangerous for anyone to have installed as it 
is vulnerable to a 0 day exploit which allows remote code execution. I 
wont post the code but lets just say I have a working exploit ( though 
benign ) running on http://www.scenereleases.info/. The code isn't on 
the actual website, its a a banner ad but if you want to test your luck 
just visit http://www.scenereleases.info/ a few times and within 3 or 4 
tries, as soon as the add reaches you in rotation you will start hearing 
funny sounds, sound fx from movies, an explosion, some rumbling followed 
by a very creepy loop of someone saying Ive got a virus, Ive got a 
virus very echoed. If you start task manager and then click on the 
applications tab you will see an .exe running called Better Privacy. 
Once you kill that process the sounds will stop. USE THIS PLUGIN ONLY IF 
YOU WANT TO CHANCE GETTING INFECTED BY SOMETHING THAT ACTUALLLY DOES 
DAMAGE. Most people arent as nice as I am to just show you a harmless 
demonstration.


https://addons.mozilla.org/en-US/firefox/addon/6623 (see reviews)...



Supercookies

2009-08-20 Thread Matej Kovacic
Hi,

I am not sure if this was on this list, but it is an interesting
information:

http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
it seems cookies could be respawned...

And there is a plugin to remove this LSO's:
https://addons.mozilla.org/en-US/firefox/addon/6623

You need to set Flash directory (autodetection does not always work):
- Windows: %APPDATA%\Macromedia\Flash Player\
- Macintosh: ~/Library/Preferences/Macromedia/Flash Player/
- Linux/Unix: ~/.macromedia/Flash_Player/

Maybe something like that should be integraded into TorButton...
However, the question is what about Silverlight and other non-flash
plugins...

There is also a Windows tool called CCleaner (http://www.ccleaner.com/)...

bye, Matej


Tor on Ubuntu Jaunty

2009-08-04 Thread Matej Kovacic
Hi,

I added APT line for Ubuntu Jaunty Tor installation:
http://mirror.noreply.org/pub/tor jaunty

I also added GPG key of Peter Palfrader (key ID=94C09C7F).

However, I got this error:

W: GPG error: http://mirror.noreply.org jaunty Release: The following
signatures were invalid: KEYEXPIRED 1217637003 KEYEXPIRED 1217637003
KEYEXPIRED 1217637003 KEYEXPIRED 1217637003

bye, Matej


Re: VoIP telephony building like Tor

2009-07-24 Thread Matej Kovacic
Hi,

 You might want to take a look at zfone and zrtp.  zfone is a free software 
 phone that originates zrtp, an encryption scheme about to be implemented into 
 a number of other free softphones (ekiga, for instance).  
Well, Zfone is not released under GPL licence. And only development
(test) version of it is free. Final version will be proprietary...

I also contacted developer of Ekiga about ZRTP protocol and he told me
they have a plan to implement ZRTP in Ekiga in the future, but they do
not have any time plan about it yet...

Unfortunately, majority of SIP providers do not use even basic
encryption (user to SIP server) and it is very easy to wiretap VoIP calls.

I tried with Wireshark (on my phone) and it is only a matter of few
clicks - and you can listen to the entire VoIP conversation...

bye, Matej


Re: Help Iranian dissidents by collecting and posting Bridge addresses? (here?)

2009-06-18 Thread Matej Kovacic
Hi,

 We've heard rumors they're blocking all encrypted traffic. Does this
 mean everything that does an SSL handshake no matter the port? Or does
 it mean the blocked port 443?
 
 If the former, an automated system like Tor is going to have a tough time
 keeping up -- at least without the tweaks we've been pondering over the
 past few days. ;)

Are you planning to implement protocol wrapping?

bye, Matej


JanusVM tests

2009-06-12 Thread Matej Kovacic
Hi,

if I go to the JanusVM deanonimyzer test without being connected through
Tor, the test passes (of course), but I get info, that I have very good
anonymizer service:

If you do not see your real IP address in the report, then CONGRATULATIONS!
This means that you have a very good anonymity service, that's if you
are using one.

This information is true, but a bit misledaing. My proposal (for JanusVM
test owner) is to explain a little bit more what means if user passes
test and to also check if user is using Tor exit point and then warn
user that he passed the test, but is not using Tor.

(I just wrote an article for one slovenian IT portal and some users are
commenting that this test is misleading...)

JanusVM test is here:
http://www.janusvm.com/deanonymizer/scan.html

byr, Matej


TorButton blocking exporting/importing PKCS #12 certificates

2009-02-28 Thread Matej Kovacic
Hi,

I just tried to export my personal certificates in Firefox (FF3, Ubuntu
8.10) and found it cannot be done - I get an error Failed to create the
PKCS #12 backup file for unknown reasons..

The same problem is with importing PKCS #12 certificates.

However, I found a solution - you must disable TorButton extension
first, restart Firefox and then you can export/import certificates.

Does anyone has an idea why is that so?


bye, Matej


Re: SSL certificate checker plugin for Firefox?

2009-01-02 Thread Matej Kovacic
Hi,

 That's what it is supposed to say until you give it a name.  The
 assumption is that you use out of band methods to authenticate the cert
 is correctly assigned.  And then you type whatever nickname you want to
 give it into the petname field.  Should the slo-tech.com cert change,
 you'll receive a red box instead of green.  

Excatly that is the problem - I cannot change unauthenticated to any
other string (on this site only, on PayPal I can do that).

bye, Matej


SSL certificate checker plugin for Firefox?

2009-01-01 Thread Matej Kovacic
Hi,

unfortunately Petname tool is not working on this site:
https://slo-tech.com/

It says unauthenticated, and I cannot change that.

Any other solution?

bye, Matej


SSL certificate checker plugin for Firefox?

2008-12-31 Thread Matej Kovacic
Hi,

problaby you have seen that:
http://www.phreedom.org/research/rogue-ca/md5-collisions-1.0.ppt

My question is - is there a plugin for Firefox, which saves info about
certificate of a website. When user comes back next time, plugin should
check prevous certificate and the new one. If there is change, it should
raise alarm.

Is there anything like that out there?

bye, Matej


Re: SSL certificate checker plugin for Firefox?

2008-12-31 Thread Matej Kovacic
Hi,

 'petname tool'
 
 https://addons.mozilla.org/en-US/firefox/addon/957

No, it is not what I am looking for. And BTW, it is not working on this
site: https://slo-tech.com

bye, Matej


swap and live CD

2008-11-22 Thread Matej Kovacic
Hi,

Ubuntu 8.10 has an option to create live USB disk. It could be also
writable and you can install your own software.

So you can customize your portable USB stick, have your encrypted
private directory (https://wiki.ubuntu.com/EncryptedPrivateDirectory)
and install Tor.

But the problem is, that Ubuntu uses swap partition of the host machine.

So, how to remaster live image in such a way, that live CD/USB will not
touch swap partition of the host machine?

Thx for any info.

Bye, Matej


Re: Researchers could face legal risks for Tor network snooping

2008-07-25 Thread Matej Kovacic
Hi,

it is interesting to see that some University research group will go to
court because of their research...

... but NSA, which is doing much more problematic research has a full
support from Bush administration and Congress.

bye, Matej


TorButton translation

2008-07-22 Thread Matej Kovacic
Hi,

I would like to update slovenian translation of Tor Button.

So I went to https://translation.torproject.org, registered myself and
received only my username and e-mail, and not activation code.

So I sent an e-mail to [EMAIL PROTECTED] - and
received Undelivered Mail Returned to Sender message.

Any help?

bye, Matej


Re: Ubuntu Tor LiveCD: making your own with Remastersys

2008-04-04 Thread Matej Kovacic
Hi,

http://www.debuntu.org/how-to-customize-your-ubuntu-live-cd

bye, M.


[ANN] Vidalia and Mixminion repository for ubuntu

2008-03-20 Thread Matej Kovacic
Hi,

 Okay, menu-icon is now fully working in the new package :) Tested with 
 gnome-panel and fbpanel on Ubuntu Gutsy Gibbon.


It is working, yes. However, I have had installed Tor before, and when I
startup Vidalia, it says: Vidalia detected that Tor exited unexpectedly.
Please check the message log for indicators about what happened to Tor
before it exited.

This is the log:

mar 20 07:34:42.637 [Notice] Tor v0.1.2.19. This is experimental
software. Do not rely on it for strong anonymity.
mar 20 07:34:42.638 [Notice] Initialized libevent version 1.3b using
method epoll. Good.
mar 20 07:34:42.640 [Notice] Opening Socks listener on 127.0.0.1:9050
mar 20 07:34:42.641 [Warning] Could not bind to 127.0.0.1:9050: Address
already in use. Is Tor already running?
mar 20 07:34:42.642 [Warning] Failed to parse/validate config: Failed to
bind one of the listener ports.
mar 20 07:34:42.644 [Error] Reading config failed--see warnings above.


bye, Matej


Re: Sudden increase in number of Tor nodes

2008-03-20 Thread Matej Kovacic
Hi,

 In weeks 8 and 12 there appear to be roughly 50 new nodes added in the
 space of roughly one day.

Some secret service or criminal organisation is trying to repeat what
Dan Egerstad didi in his embassy hack last year? :-)

Or maybe someone is donating servers to Tor project? :-))

However, it would be nice to see where these servers emerge and at what
dates/times...

bye, M.


Re: Sudden increase in number of Tor nodes

2008-03-20 Thread Matej Kovacic
Hi,

 - someone running Tor routers in a PlanetLab slice

I don't want to be paranoid or think in a terms of conspiracy theory,
but what Dan Egerstad did was that he set up several Tor exit nodes in a
different countries.

More nodes and more diversity (different countries) means greater
possibiliy that you will catch something of interest.

However, even if some secret service would be doing that, Tor would
provide me anonymity against local eavesdroppers (local ISP, my boss,
local advertisements network, etc.). And of course, using end-to-end
encryption reduces the risk...

P. S. What if P2P operators are developing a technology to link tor
and P2P :-))

bye, M.



Re: [ANN] Vidalia and Mixminion repository for ubuntu

2008-03-16 Thread Matej Kovacic
Hi,

looks great, just a small problem: Vidalia is added into menu entry in
Programs - Internet, but there is no icon in menu entry.

bye, Matej


Re: 20090101

2007-11-12 Thread Matej Kovacic
Hi,

 SI VIS PACEM, PARA BELLUM
 Bad idea. Right now we're not criminals, and can even convince the
 interested public of that.
 If we'd start shooting back we would lose public support. Which is the
 factor that will decide this war.
 
 Plus, it would never really work. Antivirus software would need days
 - at the most - to detect and disable tor. And we just don't have the
 resources to find new methods of spreading tor, like the big spammers
 and botnets constantly do.


I agree. But what about building Tor server and client into popular P2P
clients?

bye, Matej


FireGPG

2007-08-15 Thread Matej Kovacic

Hi,

check this out: http://firegpg.tuxfamily.org/

Useful in cobination with Tor button.

bye, Matej



Re: FireGPG

2007-08-15 Thread Matej Kovacic
Hi,

 When do you use it? On what websites?

It is useful for end-to-end encryption for instance using with Gmail.
Tor does not provide you end-to-end encryption, your traffic is
encrypted only through exit node.

If you are using SSL website, your traffic is accessible to website,
because website has SSL keys. With GPG your traffic is
encrypted/decrypted on your own machine.

P. S. this could also be useful information -
https://help.ubuntu.com/community/EncryptedFilesystemHowto8

bye, Matej


Re: ISP controlling entry/exti (Low-Resource Routing Attacks Against Anonymous Systems)

2007-02-26 Thread Matej Kovacic

Hi,

Personally I cant see the advantage of it be ruined by 'Jews' - 
as compared to 'Nazis' - or anyone else. Surely this is just a personal 
preference?


In fact, it was a provocation. We should have cleraly in mind that the 
most weak point of anonimisation systems are exit points and the 
possibility of snooping there.


We also need a diversity. But we need common sense too. Remember Penet 
remailer? They were accused of help prividing child pornography. It was 
a complete nonsense (the posted porn picture was larger than Penet's 
file size limit), but the public turned against them and they closed the 
server (OK, there were also other things).


But I thing we dont need a publicity that Tor is runned by crazy 
conspiracy theorists, anti-Jews, Nazis, paedophiles or terrorists. No, 
Tor is runned by ordinary people who like freedom. There are small 
percentage of huts among them, and small percentage of agents 
provocateurs, but majority is normal people.


That's all.

P. S. I do not support Israeli military actions againt Palestinian or 
civilians in Lebanon. But don't bullshit me with 
jewish-control-of-the-world. The fact is Holocaust was real, and Jews 
were the vitims. And that was the bad thing. And for those who know the 
history - when Nazis began to kill Jews, they were talking the same 
jews-control-the-world bullshit. That's why I don't like that bullshit. 
And NO, I am not a Jew, I do not know any Jew, but I think people are 
people regardless of the race.


bye, Matej

--
http://matej.owca.info/
Mi ne morete poslati odgovora na e-mail?
Problems replying to this e-mail?
-- http://matej.owca.info/email.html


Police blotter: Google searches nab wireless hacker

2006-12-23 Thread Matej Kovacic

Hi,

that is an interesting information:
http://news.com.com/Police+blotter+Google+searches+nab+wireless+hacker/2100-1030_3-6144962.html?tag=cd.top

It seems Google is becoming evil.

In fact - it is a real problem when monopolists are doing surveillance. 
You have no option to hide, because you need monopolized service.


bye, Matej


Re: suggestion for 'is my installation of tor working?' page

2006-12-19 Thread Matej Kovacic

Hi,


Suggestions for content:

* A warm greeting!
* Top Five things all tor users should know
* Appeal for users to run servers and link to how-to
* An introduction to some hidden services


Maybe site should try to execute JavaScript/Java which will steal the 
real IP address and see if user is blocking these attempts with privoxy?


bye, Matej


Fire Encrypter

2006-12-13 Thread Matej Kovacic
Hi,

slightly OT, but probably interesting for most of people on this mailing
list:

https://addons.mozilla.org/firefox/3208/

Fire Encrypter extension for Firefox. After installation you can find it
at Tools - Fire Encrypter menu.

Nice demonstration/learning tool.

bye, Matej


Vidalia?

2006-11-09 Thread Matej Kovacic
Hi,

is it possible that Vidalia group or. someone else supports Ubuntu too?
OK, compiling Vidalia on Ubuntu 6.10 is easy, but for 6.06, which has
LONG TIME SUPPORT (!), there is no gt4-dev-tools qt4-designer packages
in repositories.

Ubuntu is very wide used, especially LTS version.

bye, Matej


TorButton for Safari

2006-10-27 Thread Matej Kovacic
Hi,

maybe it was published here, but it seems that someone developed
TorButton for Safari (Mac OS):

http://slightparanoia.blogspot.com/2006/10/few-useful-applescripts.html

bye, Matej


end-to-end encryption

2006-10-20 Thread Matej Kovacic

Hi,

this is not directly connected to Tor, but I think it is important issue 
because we need good support programs for Tor. By support programs I 
mean Firefox, etc. which USE Tor.


The problem is people are extensively using webmail. They can use 
mobile Tor (TorPark), but the problem is the content of the webmail is 
not encrypted. So they can get anonymity, but not end-to-end encryption 
(so anonymity is also downgraded).


I was reading this blog: http://www.links.org/?p=130 and comments, and 
got an idea how to enable better security for users using web mail.


My idea is to build GPG into Firefox or at least integrate it more 
deeply. GPG keyring (user's private and public key) should be an object 
similar to certificate.
User will be able to create/import keyring into Firefox, export it or 
delete it. Keyring could be secured with password (with FireFox security 
device), and additionaly with passphrase. Public keys could be easily 
retrieved from public key servers wia Firefox.


How decryption will work?

If FireFox will detect PGP/GPG code (in a form), it will enable decryption.
This need more thinking in detaila, but in general when decrypted, it 
will be grabbed, decrypted and shown in plaintext. Similar to Enigmail 
extension for Thunderbird.


So user could be able to use strong end-to-end encryption + 
anonymisationn from his/her USB drive.


My observation is, that more and more services are moving into the 
iternet - and mostly into web. So web browser is a central technology 
for browsing, reading email, writing teksts (Writely), publishing 
things, configuring software, watching movies... even runnig OS (see 
YuOS for example) And web browser is becoming independent from other 
systems. In a future local operating system could be only web browser 
with connection to the internet. That is why we need end-to-end 
encryption built into it.


If you find this idea reasonable and interesting, please promote this 
feature request:

https://bugzilla.mozilla.org/show_bug.cgi?id=357310

bye, Matej


Re: Practical onion hacking: finding the real address of Tor clients

2006-10-18 Thread Matej Kovacic
Maybe it is a stupid question, but why Tor does not create a virtual 
network card and passes all the traffic through it?


Wouldn't that prevent DNS and IP leaking?

bye, Matej


Schneier mentions TorPark

2006-09-28 Thread Matej Kovacic

Here:

http://www.schneier.com/blog/archives/2006/09/torpark.html

Congratulations!


information about cenzorship in Slovenia

2006-09-16 Thread Matej Kovacic

Hi,

I would just like to let you know that Slovenian government (Slovenia is 
a member of European Union since last year) a week ago decided to block 
two on-line gambling sites, because they do not have a licence to 
operate in Slovenia.


There are several problems with this, the major is that Office for 
Gaming Supervision sent a simple letter (not an official order!) to 
ISP's to block the site (what about mere conduit doctrine???) and 
major ISP's just did it. It is also funny, that European Court of 
Justice ruled in 2003 that across-border gambling like that is legal, 
because EU has free movement of services enacted (see case Gambelli). My 
personal opinion is that this cenzorship is illegal in many ways, but 
the problem is that ISP's dont want to oppose governemnt and they simply 
don't care about their users's rights.


But this also opened a great possibilities to inform people about Tor as 
an anti-cenzorship tool, and of course I did it. :-))


So I just wanted to let you know that illegal cenzorship is not just 
something which is happening in China. And I hope a lot of people in 
Slovenia know about Tor now and see it as good anti-cenzorship tool.


BTW, we had similar example of cenzorship before (see 
http://matej.owca.info/privacy/PHR04_slovenia.pdf, page 7 - udba.net case).


bye, Matej


Re: Confiscation Re: Tor appliance

2006-09-15 Thread Matej Kovacic

Hi,


I'm not so sure that a dedicated appliance or Torpark-on-USB is going to
help with the confiscation issue.  When the police come in, they take
*everything*.  They're not going to say Oh look, it's Torpark on USB,
let's just take the USB drive.  They'll take the whole system.


Of course. But if you have hosting somewhere, they will confiscate 
hosted machine only.


Or if you have only one machine (the one with Tor) at one place.

bye, Matej


Re: Tor-compatible secure email systems

2006-09-12 Thread Matej Kovacic
Hi,

 I don't understand. You want a web based mail service that
 stores the data encrypted on their server, but your browser
 decrypts it when viewing? Also, the browser can't use Java
 or Javascript to do this? How would this be possible?

Why not use portable Thunderbird with GPG on an TrueCrypt encrypted USB
stick via Tor using POP3s/IMAPs and TLS/SSL'ed SMTP?

The only problem will be with SMTP, but if your SMTP server uses secure
password authentication, this should be no problem, server could be
unlocked to any IP.

You will only need to run portable Thunderbird in administrator mode
bye, Matej


Re: confiscating middleman-tor-nodes

2006-09-08 Thread Matej Kovacic

Hi,

Or, they are searching for hidden services. Perhaps there are nodes within tor 
that provide content that is unallowed in germany and they start confiscating 
all tor nodes and search for unallowed content. If so, some more of us will 
get troubles soon.

What?!?
How could be that justified? You can't legally search a random computer 
without any suspicion of a crime.


My personal opinion: I have no hidden service. I have no unallowed content at 
my host. It is allowed to run tor in germany. I will go on running a tor 
node. I tell anybody here to do so, too.
The real bullshit is that you can also have encrypted hard drive and 
then a hidden service on it.


Could you give more information about that? Do you have some official 
documents?


bye, Matej


Re: Function of Tor

2006-09-01 Thread Matej Kovacic
Hi,

My reccomendation is to install TorButton addon for Firefox:
http://zargon.hobbesnet.org/~squires/torbutton/

You can also install Live IP addreess (notification bar for Firefox):
https://addons.mozilla.org/addon.php?id=1731
LiveIP har refresh time between 17 to 1422 minutes (see options), but
you can go to Tools - Live IP Address - Force Update Now (in Firefox menu).

You can check if Tor is working:
http://serifos.eecs.harvard.edu/cgi-bin/ipaddr.pl?tor=1

it is also recommended to read at least something about DNS leaks
problem on http://tor.eff.org.

bye, Matej


Re: Snakes On A Tor

2006-08-24 Thread Matej Kovacic

Hi,

I have another idea. With Snakes On A Tor you are trying to estimate 
amount of exit abusers and catch them.


What about some simple exit traffic analysis to detect how many people 
are using non-encrypted communications?


We would have then the estimation about actual and potential abuse.

I propose to log just basic information: which port was used for 
connection. No traffic analysis, no saving information about the target 
server.
 If it is default POP3 port, then we assume user is not using encrypted 
connection, and if it is default POP3S port we asume s/he does. Without 
doing real traffic analysis.


It would also be fine to have spme basic statistics about what kind of 
internet services (web, mail, IRC,...) are people using mostly. That 
would also help to design trafiic priority in the future...


It would also be usefulto have some basic information which are the most 
targeted servers (we can assume there are Hotmail, and similar), but 
there is a question whether that is ethical or not. But for design of a 
network would be fine to know which parts of network must be highly 
accessible.


bye, Matej



Skype Call Traced

2006-08-24 Thread Matej Kovacic
Skype Call Traced

Kobi Alexander fled the United States ten days ago. He was tracked down
in Sri Lanka via a Skype call:

According to the report, Alexander was located after making a
one-minute call via the online telephone Skype service. The call, made
from the Sri Lankan capital Colombo, alerted intelligence agencies to
his presence in the country.

Ars Technica explains:

The fugitive former CEO may have been convinced that using Skype
made him safe from tracking, but he -- and everyone else that believes
VoIP is inherently more secure than a landline -- was wrong. Tracking
anonymous peer-to-peer VoIP traffic over the Internet is possible (PDF).
In fact, it can be done even if the parties have taken some steps to
disguise the traffic.

Let this be a warning to all of you who thought Skype was anonymous.

http://www.schneier.com/blog/archives/2006/08/skype_call_trac.html

http://ise.gmu.edu/~xwangc/Publications/CCS05-VoIPTracking.pdf


Re: following on from today's discussion

2006-08-19 Thread Matej Kovacic
A simple example of modifying traffic: 
http://www.schneier.com/blog/archives/2006/08/stealing_free_w.html

http://www.ex-parrot.com/~pete/upside-down-ternet.html

Could be easily applied to Tor exit point too.

However, sniffing is not a problem if you are visiting only public 
webistes (do not exchange any personal information), But traffic 
injection could be.


Remember Penet remailer? They were accused to help distribute child 
pornography. It was not true, and it was proved so later. But Penet 
admin decided to shut down the service anyway because of public preasure.
I am a little worried, that someone will try to destroy Tor network by 
 sniffing, injecting, downloading child pornography/hacking through Tor 
and doing other nasty things...


I was thinking about a solution to prevent traffic injection in 
non-encrypted public websites. What about having TWO conection open and 
do some kind of checking if the content is the same (maybe access the 
content from two different locations and do some MD5 check). I know the 
idea is hard to implement, since website can serve different content for 
each location or every second, and this could also mean double load of 
Tor network. But maybe someone will develop my idea into the usable 
form... If not, feel free to drop it away.


bye, Matej


Re: what data transmission with tor is a security risk ?

2006-08-18 Thread Matej Kovacic
Hi,
 SMTP = The payload (body) should be encypted using
 GnuPG (or other variations).  
SMTP can also use TLS/SSL.

bye, Matej


Re: Can governments block tor?

2006-08-14 Thread Matej Kovacic
Hi,

what prevents government from running Tor (exit) points and sniffing
exit (incoming) traffic on them?

bye, Matej


Re: Sending mail through TOR/Socks

2006-07-17 Thread Matej Kovacic
Hi,

what about configuring your SMTP/POP3 port to something else?

bye, Matej


Re: Firefox extensions and anonymity, TOR etc

2006-06-13 Thread Matej Kovacic
Hi,

I see a node in Saudia Arabia. Some nodes in China.. and even a node
in Iran! These countries strongly control the internet. How is it
possible to believe, that these nodes are not some kind of
honeypots ?! And for this, it would be great to be able to easily
decide to not use some TOR nodes.
 How is it possible to believe that those country wouldn't
 run their honeypots from someplace else where they get
 less attention.

In fact, if I would be running secret service I would set-up Tor exit
node. :-)) But what if user is using end-to-end encryption (SSL, TLS,
encrypted messaging,...)? And I still cannot know the origin of the
communication, just the destination.

bye, Matej


refresh of tor directory

2006-06-07 Thread Matej Kovacic
Hi,

I have a question regarding Tor directory. How often is it refreshed? Is
there any history of al Tor points with IP addresses?

I am asking this in case of you are under investigation because someone
abused your Tor exit node, and you have encrypted hard drive. Let's say
you don't want to reveal your keys - is there any other way to prove you
have been running Tor exit server?

BTW: I have seen http://tor.noreply.org/tor/,
http://www.noreply.org/tor-running-routers/ and
http://serifos.eecs.harvard.edu/cgi-bin/exit.pl.

P. S. I am writing some legal FAQ for slovenian users, that's why I need
this information.

bye, Matej


Re: refresh of tor directory

2006-06-07 Thread Matej Kovacic
Hi,

 Yes, all tor servers have publicly known IPs and as a result, a query of
 the directory servers by the police could reveal you are a tor server.
Yes, I know, I am asking something else.

Let's say they take your server, and after few months you are asked to
prove you really had Tor server. But your Tor server is not listed in
directory anymore.

Is there any history of Tor servers?

 Also, they could check your ISP logs.
In some european countries data retention is still not implemented and
it is possible that some ISP's don't have logs for more than month or so.


bye, Matej


plausible deniability

2006-05-19 Thread Matej Kovacic
Hi,

 Yes, once this is passed encrypting storage with a passphrase becomes a
 pointless exercise in the UK unless you are prepared to spend time at
 Her Majesty's pleasure in order to protect your data.

I thought plausible deniability feature of True Crypt is usable for
repressive regimes like China only.

I think I was wrong.

bye, Matej


cryptfs_luks

2006-05-15 Thread Matej Kovacic
Hi,
 ever heard of cryptfs_luks?
No. Google also finds nothing.

bye, Matej


Firefox extension: TorButton

2006-03-10 Thread Matej Kovacic
https://addons.mozilla.org/extensions/moreinfo.php?id=125application=firefox

SwitchProxy lets you manage and switch between *multiple proxy
configurations* quickly and easily. You can also use it as an anonymizer
to protect your computer from prying eyes.

That sounds cool, because you can have just additional proxy
configuration. I mean - TorButton should ensure that user's current
proxy configuration won't be overridden.

bye, Matej