Re: [tor-talk] Routing Jitsi through Tor

2013-06-30 Thread Van Gegel
Jitsi now cann't route RTP through Tor becouse not supported RTP over TCP.
Only Skype, Mumble and my forks of PGPFone and SpeekFrealy, and maybe some 
other rare apps  can use TCP as a transport layer for voice.
It makes no sense to use Tor to connect to the XMPP server only. All the same, 
the server has information about your location from XML ICE invites, and also 
your provider will determine your subscriber via a direct connection.
I2P theoretically supported UDP, but only one way streams for now. Now there is 
no 'out of box' solution to your for I2P. In addition, the I2P network today  
has significantly high latency and jitter than Tor.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Routing Jitsi through Tor

2013-06-30 Thread grarpamp
 over 9050. The only thing that didn't happen was issuing a NEWNYM
 command. But would that have stopped the connection from happening?

Maybe, sometimes Tor gets a little stuck, or the exit packetfilter's things
after Tor finds a path. Using MAPADDRESS can help with testing exits.

 Also, a quick question about the encryption service. I'm offering
 SSL/TLS connections to the service. Is that what you mean or are you

Yes, offering encryption is good.

As far as anything other than TCP goes, you can do that but only
if you're going hidden service to hs with onioncat or have
established an openvpn with some destination across tor exit.

And any testing of new apps should be accompanied by proof
work as to leaks with wireshark, etc.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Identify requests made by the same user

2013-06-30 Thread Katya Titov
Andrew F:
 krishna,
 Tor minimizes the variables that can Identify you via fingerprinting
 techniques, but
 a dedicated team can still track you with enough effort.  I know form
 personal experience

Andrew, I'm interested in any more light you can shine on this. I don't
expect full details, but:

I expect that if someone is targeting the physical me then they would
be able to see and track much or all of my anonymous traffic if they
really wanted to. However if someone is trying to find out who is
behind some anonymous traffic or actions of a nym then this would be
quite a lot more difficult, assuming adequate precautions were made.

So could let us know from your personal experience which one is
feasible?

Thanks
-- 
kat
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Binary patch downloads (for updating TBB)?

2013-06-30 Thread Cool Hand Luke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 06/29, Mike Perry wrote:
 David Balažic:
  In that light, are there patches available to update between releases?
  It might reduce load on the servers too.
 
 We hope to support the Firefox updater in TBB soon. After some Tor
 Launcher cleanup, this is Pearl Crescent's next task.
 
 The Firefox updater uses Mozilla MAR format, and updates contain only
 the binary deltas (patches) between two release versions.

that would also allow one to retain, across upgrades, any extensions
that may have been installed into the tor browser bundle as well, no?

- -chl

- --
cool hand luke


-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQF8BAEBCgBmBQJR0FClXxSAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ5RUE3NjY3OTY3NTE0RjAyMDgyRTNBQzAy
QkE2NTVENTVDODgzNUVCAAoJECumVdVciDXrAB8IAKfu5KnSOHIE6vCzAkJIKrkU
iWOQzpLPEMV9oQSPI6wyebCWkReRnklHJBQwRNCKhQQbihUqLNuXxNvy8PllPWvU
x461ktIoSszAlydnbl/P9+aJD8Szx5fi96c1iEWWi9ST8bVNF0QXtkaVX34nbbuT
I4uLFbyx1ypyyv92HscX4GyXkl9srFDzZJsz2GsQGKObHYj23S62UZpSVrhfemvS
EZxHDuL5WJMy1tfbCvn4Z+5SUgcAs2aDnbJAfdQBd01XrAfz/tBk6vpRovsLITKL
DIt2Vy+BKtNaP3WNK9JF8nJzPm+vK8Qa8c739NPkzJRtlnN3VfnwuK0S7VXxzxY=
=vN87
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Secure email with limited usable metadata

2013-06-30 Thread alice-tor
everyone is tooting about pgp these. pgp encryption doesnt solve the problem of 
tla surveillance. pgp encryption does not touch metadata (recipent, sender).

how to secure mail communication?

i was thinking about pointing the mx record of the tld to a mail server that is 
shared with other individuals. the server is configured to drop incoming 
non-tls smtp connection from other mail server. On a per account basis, every 
message that is not encrypted to the public pgp key of the address is dropped, 
too. users use pop3/smtp over a hidden server to download/send messages.

what do you think? the setup is easy to maintain. if inbox size is limited to a 
few mbs any cheap vps thats like 20$ a year can be used to service hundreds of 
thousands of accounts. a trusted umbrella organization is needed to maintain 
the server as anonymity is increased by increasing users count. is the tor 
project or torservers.net interested in running such a service? i would 
literally pay money for that, so would others.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Anthony Papillion
I would think that simply finding a mail server that doesn't log
ANYTHING (like what StartMail is about to offer) and encrypting
everything should be enough. Of course, you'd need to trust that the
service really isn't logging anything but that could be solved by
accessing it via Tor.

So StartMail (when it opens) via Tor should do the trick.

Just a thought,
Anthony

On 06/30/2013 10:52 AM, alice-...@safe-mail.net wrote:
 everyone is tooting about pgp these. pgp encryption doesnt solve the problem 
 of tla surveillance. pgp encryption does not touch metadata (recipent, 
 sender).
 
 how to secure mail communication?
 
 i was thinking about pointing the mx record of the tld to a mail server that 
 is shared with other individuals. the server is configured to drop incoming 
 non-tls smtp connection from other mail server. On a per account basis, every 
 message that is not encrypted to the public pgp key of the address is 
 dropped, too. users use pop3/smtp over a hidden server to download/send 
 messages.
 
 what do you think? the setup is easy to maintain. if inbox size is limited to 
 a few mbs any cheap vps thats like 20$ a year can be used to service hundreds 
 of thousands of accounts. a trusted umbrella organization is needed to 
 maintain the server as anonymity is increased by increasing users count. is 
 the tor project or torservers.net interested in running such a service? i 
 would literally pay money for that, so would others.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 

-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
IM:  cypherpun...@jit.si

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Jimmy Chen
This poses a really interesting question.

Another solution would be to use already existing remailers, and doubling
the encryption together with the TO: email in the inline plaintext. The
question is how to properly do a dual encryption.

My proposed solution is the following:

Plaintext message (encrypted for recipient, with unencrypted portion
dictating the recipient through inline text) - Encrypted Message
(encrypted again to remailer's PGP, including inline portion) - Remailer
(decrypted intended layer. Message is sent to recipient dictated in the
inline text) - Recipient's Email Server / Provider (cannot be read by
provider) - Recipient Mailbox


On Sun, Jun 30, 2013 at 8:52 AM, alice-...@safe-mail.net wrote:

 everyone is tooting about pgp these. pgp encryption doesnt solve the
 problem of tla surveillance. pgp encryption does not touch metadata
 (recipent, sender).

 how to secure mail communication?

 i was thinking about pointing the mx record of the tld to a mail server
 that is shared with other individuals. the server is configured to drop
 incoming non-tls smtp connection from other mail server. On a per account
 basis, every message that is not encrypted to the public pgp key of the
 address is dropped, too. users use pop3/smtp over a hidden server to
 download/send messages.

 what do you think? the setup is easy to maintain. if inbox size is limited
 to a few mbs any cheap vps thats like 20$ a year can be used to service
 hundreds of thousands of accounts. a trusted umbrella organization is
 needed to maintain the server as anonymity is increased by increasing users
 count. is the tor project or torservers.net interested in running such a
 service? i would literally pay money for that, so would others.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread mirimir
On 06/30/2013 03:52 PM, alice-...@safe-mail.net wrote:

 everyone is tooting about pgp these. pgp encryption doesnt solve the problem 
 of tla surveillance. pgp encryption does not touch metadata (recipent, 
 sender).
 
 how to secure mail communication?

There's an easy solution. Only communicate among arbitrarily anonymous
accounts, and always use arbitrary subjects.

 i was thinking about pointing the mx record of the tld to a mail server that 
 is shared with other individuals. the server is configured to drop incoming 
 non-tls smtp connection from other mail server. On a per account basis, every 
 message that is not encrypted to the public pgp key of the address is 
 dropped, too. users use pop3/smtp over a hidden server to download/send 
 messages.
 
 what do you think? the setup is easy to maintain. if inbox size is limited to 
 a few mbs any cheap vps thats like 20$ a year can be used to service hundreds 
 of thousands of accounts. a trusted umbrella organization is needed to 
 maintain the server as anonymity is increased by increasing users count. is 
 the tor project or torservers.net interested in running such a service? i 
 would literally pay money for that, so would others.

If you want total overkill, you can use Mixmaster nyms with
alt.privacy.anon-server as inbox. Quicksilver is easy to use, and runs
on Linux in Wine.

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread alice-tor
 I would think that simply finding a mail server that doesn't log
 ANYTHING (like what StartMail is about to offer) and encrypting
 everything should be enough. Of course, you'd need to trust that the
 service really isn't logging anything but that could be solved by
 accessing it via Tor.
 
 So StartMail (when it opens) via Tor should do the trick.
StartMail/tormail does not solve the problem of metadata either. i do not want 
to hide my identity. i want to use my real name and communicate with people i 
know in real life. its about *enforcing* content encryption and secure 
communication so an outside observer cannot easily correlate my social network 
by snooping on mail traffic at net gateways.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread AK
That's why I'm setting up my own mail server at home. And also plan to
access it via web interface if using someone else's machine (like at
home). I would only allow web access via SSL and password, and only
show the emails of the last week (not more). Trying postfix, dovecot,
and SquirrelMail. Still in progress :)

On Sun, Jun 30, 2013 at 5:48 PM,  alice-...@safe-mail.net wrote:
 I would think that simply finding a mail server that doesn't log
 ANYTHING (like what StartMail is about to offer) and encrypting
 everything should be enough. Of course, you'd need to trust that the
 service really isn't logging anything but that could be solved by
 accessing it via Tor.

 So StartMail (when it opens) via Tor should do the trick.
 StartMail/tormail does not solve the problem of metadata either. i do not 
 want to hide my identity. i want to use my real name and communicate with 
 people i know in real life. its about *enforcing* content encryption and 
 secure communication so an outside observer cannot easily correlate my social 
 network by snooping on mail traffic at net gateways.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread AK
edit: someone one's else machine *like at work

On Sun, Jun 30, 2013 at 6:18 PM, AK aka...@gmail.com wrote:
 That's why I'm setting up my own mail server at home. And also plan to
 access it via web interface if using someone else's machine (like at
 home). I would only allow web access via SSL and password, and only
 show the emails of the last week (not more). Trying postfix, dovecot,
 and SquirrelMail. Still in progress :)

 On Sun, Jun 30, 2013 at 5:48 PM,  alice-...@safe-mail.net wrote:
 I would think that simply finding a mail server that doesn't log
 ANYTHING (like what StartMail is about to offer) and encrypting
 everything should be enough. Of course, you'd need to trust that the
 service really isn't logging anything but that could be solved by
 accessing it via Tor.

 So StartMail (when it opens) via Tor should do the trick.
 StartMail/tormail does not solve the problem of metadata either. i do not 
 want to hide my identity. i want to use my real name and communicate with 
 people i know in real life. its about *enforcing* content encryption and 
 secure communication so an outside observer cannot easily correlate my 
 social network by snooping on mail traffic at net gateways.
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk