Re: [tor-talk] Leave Your Cellphone at Home
Not 100% reliable either. Ever wonder why you can remove the battery for a while, replug it and it still remembers the (very much off) time? (or when not having any network or having disabled network time sync) There is a second battery. Someone somewhere tried to estimate how much that one can do. Or how about just popping out the battery? From: coderman coder...@gmail.com To: tor-talk@lists.torproject.org Cc: mansourmou...@gmail.com Sent: Thursday, January 17, 2013 11:19 AM Subject: Re: [tor-talk] Leave Your Cellphone at Home On Wed, Jan 16, 2013 at 3:12 PM, Jago Pearce jag...@gmail.com wrote: How much improvement might flightmode realistically provide?.. baseband exploits can tamper with airplane/flight mode. it is designed to prevent transmission, however, the radio can still receive. get a faraday bag/case instead... ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Tor relay on small and cheap devices
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Ohai list, I'm currently trying to find a way to easily spread some pre-configured, pre-installed devices embedding a tor-relay. And I have some TP Link hardware, the smallest of them being the WR703N (http://wiki.openwrt.org/toh/tp-link/tl-wr703n). Those devices are cheap and handy (can actually run on battery for years,since it does not consumes that much power... around 1W/h). Tor can actually fit on them (as long as you build an OpenWRT firmware including tor), and you even have around half a megabyte of space on the 4MB flash drive after that. And it runs pretty much easily (I used the notes here https://trac.torproject.org/projects/tor/wiki/doc/Torouter/OpenWRT_setup_notes for the whole process). However, given the relatively limited capability of those devices, 4il wondering if they can have enough entropy to run Tor safely, and if it won't endanger the network. So,before going further on the step of propagating those Tor small boxes, I need advices about this entropy. Is it an issue? Is there a way to work around it (generating keys and certificates on a different computer maybe? but then, how?) With datalove, Okhin -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.19 (GNU/Linux) iQIcBAEBCgAGBQJQ+UQ1AAoJEKpfDYQAUTlHSeMP/2x0XmTYgz/rNlna6sucgN3c hxNndzbRrFf/u/lzULsUMtOrcnyF3kZRuQWfvQWWOJtqxxEofGiZoyeX4WSe5GLL 91VENst7cfqUzzDgQh7IwViYghpTp5dfbmsVcCg6SiBE8BbLAs+iGm2PmZYSDJOj 43PCrb4b0iVtRtRjOe0cOqqdYfFqT1lqTlD/zloVt9QSkxxHhK+gyynzjWmIZ+WV ym5i4Sz4NPyszjuyr868F32CB0Su3QDzNLlbfI+QRUCNtG+wUGZqdAniuzpsZme5 zokuA1q2A9zUfLoyKIiGTtb6Bh11w9B6td1geTq9zLuLs7NtLulSL53RestERiV7 Zvmaglchk4EaSBeG3PEd0jsi7VM98bqXJOjRV5Qep0FcbhhHYS9Wk+UKNePMcYHv Om+D0Yn7ii/QMkvZXJ5167hbrI/BR0hnmiUCWairkQw6jNCz5ejdmr/vQ7qsYLx8 S4h79bi8YiofTxtbqbWim/I3N5VI+yYxnIAlRzHUlHQy/ELTMuvwkYUNXXBZv70h OxkiEpEvmBB5hxJ14CIPEuJs7Wo5G1CKmJVe2hXKG5VEKi4sJ3iAhI8KIRRbr7H4 P1CRV5YFNKeai0XpdhQLq7zlljx6XSuycUMgq8gvDwJERVpbd/4NDhTt5clJg8+O asAwcohYLN8xZAVr4pdH =6IJd -END PGP SIGNATURE- ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Mosh safe with tor?
Hello! Does anyone know, is the Mosh shell safe for tor use? Any known leaking? http://mosh.mit.edu/ -- Jerzy Łogiewa -- jerz...@interia.eu ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Mosh safe with tor?
On Fri, 18 Jan 2013 13:40:14 +0100 Jerzy Łogiewa jerz...@interia.eu wrote: Hello! Does anyone know, is the Mosh shell safe for tor use? Any known leaking? It's UDP-based, so no. And it appears to be based upon one person's mods to AES. -- Andrew http://tpo.is/contact pgp 0x6B4D6475 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Mosh safe with tor?
On Fri, Jan 18, 2013 at 10:08 AM, Andrew Lewman and...@torproject.is wrote: On Fri, 18 Jan 2013 13:40:14 +0100 Jerzy Łogiewa jerz...@interia.eu wrote: Hello! Does anyone know, is the Mosh shell safe for tor use? Any known leaking? It's UDP-based, so no. And it appears to be based upon one person's mods to AES. FWIW, mosh has a decent security reputation, though I don't know how secure they are personally. According to their paper, they're using AES128 in OCB mode, which is basically kosher. (If they *are* using a modified AES, that's pretty scary.) But yeah, in any case: if mosh is UDP-only, then it won't run over Tor. yrs, -- Nick ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Mosh safe with tor?
the Mosh shell Cool tool. But yeah, in any case: if mosh is UDP-only, then it won't run over Tor. I don't think the obstacle is mosh... you could run it between hidden services with onioncat, maybe even in the mode without a real client side onion. Or over a standard VPN via an exit. And even roam your tor client behind those three. But when your exit IP changes then the TCP flow breaks and you have to restart session on the TCP level. ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk