Re: [tor-talk] Leave Your Cellphone at Home

2013-01-18 Thread adrelanos
Not 100% reliable either.

Ever wonder why you can remove the battery for a while, replug it and it
still remembers the (very much off) time? (or when not having any network
or having disabled network time sync)

There is a second battery. Someone somewhere tried to estimate how much
that one can do.

 Or how about just popping out the battery?




 
  From: coderman coder...@gmail.com
 To: tor-talk@lists.torproject.org
 Cc: mansourmou...@gmail.com
 Sent: Thursday, January 17, 2013 11:19 AM
 Subject: Re: [tor-talk] Leave Your Cellphone at Home

 On Wed, Jan 16, 2013 at 3:12 PM, Jago Pearce jag...@gmail.com wrote:
 How much improvement might flightmode realistically provide?..

 baseband exploits can tamper with airplane/flight mode. it is designed
 to prevent transmission, however, the radio can still receive.

 get a faraday bag/case instead...
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk



___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor relay on small and cheap devices

2013-01-18 Thread Okhin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Ohai list,

I'm currently trying to find a way to easily spread some pre-configured, 
pre-installed devices embedding a tor-relay. And I have some TP Link hardware, 
the smallest of them being the WR703N 
(http://wiki.openwrt.org/toh/tp-link/tl-wr703n). Those devices are cheap and 
handy (can actually run on battery for years,since it does not consumes that 
much power... around 1W/h).

Tor can actually fit on them (as long as you build an OpenWRT firmware 
including tor), and you even have around half a megabyte of space on the 4MB 
flash drive after that. And it runs pretty much easily (I used the notes here 
https://trac.torproject.org/projects/tor/wiki/doc/Torouter/OpenWRT_setup_notes 
for the whole process).

However, given the relatively limited capability of those devices, 4il 
wondering if they can have enough entropy to run Tor safely, and if it won't 
endanger the network.

So,before going further on the step of propagating those Tor small boxes, I 
need advices about this entropy. Is it an issue? Is there a way to work around 
it (generating keys and certificates on a different computer maybe? but then, 
how?)

With datalove,
Okhin
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.19 (GNU/Linux)
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=6IJd
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Mosh safe with tor?

2013-01-18 Thread Jerzy Łogiewa
Hello!

Does anyone know, is the Mosh shell safe for tor use? Any known leaking?

http://mosh.mit.edu/

--
Jerzy Łogiewa -- jerz...@interia.eu

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mosh safe with tor?

2013-01-18 Thread Andrew Lewman
On Fri, 18 Jan 2013 13:40:14 +0100
Jerzy Łogiewa jerz...@interia.eu wrote:

 Hello!
 
 Does anyone know, is the Mosh shell safe for tor use? Any known
 leaking?

It's UDP-based, so no. And it appears to be based upon one person's
mods to AES.

-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mosh safe with tor?

2013-01-18 Thread Nick Mathewson
On Fri, Jan 18, 2013 at 10:08 AM, Andrew Lewman and...@torproject.is wrote:
 On Fri, 18 Jan 2013 13:40:14 +0100
 Jerzy Łogiewa jerz...@interia.eu wrote:

 Hello!

 Does anyone know, is the Mosh shell safe for tor use? Any known
 leaking?

 It's UDP-based, so no. And it appears to be based upon one person's
 mods to AES.

FWIW, mosh has a decent security reputation, though I don't know how
secure they are personally.  According to their paper, they're using
AES128 in OCB mode, which is basically kosher.  (If they *are* using a
modified AES, that's pretty scary.)

But yeah, in any case: if mosh is UDP-only, then it won't run over Tor.

yrs,
-- 
Nick
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mosh safe with tor?

2013-01-18 Thread grarpamp
 the Mosh shell

Cool tool.

 But yeah, in any case: if mosh is UDP-only, then it won't run over Tor.

I don't think the obstacle is mosh... you could run it between hidden services
with onioncat, maybe even in the mode without a real client side onion. Or
over a standard VPN via an exit. And even roam your tor client behind those
three. But when your exit IP changes then the TCP flow breaks and you
have to restart session on the TCP level.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk