Re: Firefox extensions and anonymity, TOR etc

2006-06-13 Thread Matej Kovacic
Hi,

I see a node in Saudia Arabia. Some nodes in China.. and even a node
in Iran! These countries strongly control the internet. How is it
possible to believe, that these nodes are not some kind of
honeypots ?! And for this, it would be great to be able to easily
decide to not use some TOR nodes.
 How is it possible to believe that those country wouldn't
 run their honeypots from someplace else where they get
 less attention.

In fact, if I would be running secret service I would set-up Tor exit
node. :-)) But what if user is using end-to-end encryption (SSL, TLS,
encrypted messaging,...)? And I still cannot know the origin of the
communication, just the destination.

bye, Matej


Re: Firefox extensions and anonymity, TOR etc

2006-06-13 Thread Thomas Sjögren

 Jan Reister [EMAIL PROTECTED]
 Hi Abacus, have you tried the Firefox extension Flashblock?
 http://flashblock.mozdev.org/

Haven't actually tried that one, but NoScript (http://www.noscript.net)
got an flash/java block option plus many other nice features.
At http://northernsecurity.net/articles/noscript.html there's a guide
how to remove the default white list.

Besides noscript (and privoxy of course) I use:
AdBlock - http://adblock.mozdev.org/
CustomizeGoogle - http://www.customizegoogle.com/
Scroogle search bar plugin - http://scroogle.org/

/Thomas



signature.asc
Description: OpenPGP digital signature


Re: Firefox extensions and anonymity, TOR etc

2006-06-13 Thread Jan Reister
On 13/06/2006 11:24, [EMAIL PROTECTED] wrote:
 Well, I just installed it, and guess what? In the config box, I read 
 Javascript must be enabled for FlashBlock to work !!!
 Uninstalled it... IMO better is to have Flash than JS enabled!

Oh well, you're right! The Flashblock faq recommends NoScript, which is
probably the way to go.

http://flashblock.mozdev.org/faq.html#fbNojavascript

Jan