Re: [tor-talk] Operation Onymous Technical Explanation?

2016-03-28 Thread krishna e bera
On 03/26/2016 07:32 AM, CANNON NATHANIEL CIOTA wrote:
> Seeking technical information on how hidden services were de anonymized
> and what updates to HS protocol was applied as a mitigation.
> Thanks,

https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Operation Onymous Technical Explanation?

2016-03-28 Thread Flipchan
What i have heard was that it was alot of bad opsec and also some pma-exploits 

CANNON NATHANIEL CIOTA  skrev: (26 mars 2016 12:32:21 
CET)
>Seeking technical information on how hidden services were de anonymized
>
>and what updates to HS protocol was applied as a mitigation.
>Thanks,
>-- 
>Cannon N. Ciota
>Digital Identity (namecoin): id/cannon
>Website: www.cannon-ciota.info
>Email: can...@cannon-ciota.info
>PGP Fingerprint: E7FB 0605 1BD4 8B88 B7BC 91A4 7DF7 76C7 25A6 AEE2
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Sincerly Flipchan
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] MetaGer

2016-03-28 Thread mtsio
What do you think of this search engine? (https://metager.de/en/) I
think it would be nice to add it to Tor Browser so more people learn
about it and use it. Their press release:
https://suma-ev.de/en/press/index.html
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor 0.2.8.2-alpha is released

2016-03-28 Thread Nick Mathewson
  Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
  bugs in earlier versions of Tor, including some that prevented
  authorities using Tor 0.2.7.x from running correctly. IPv6 and
  directory support should also be much improved.

You can download the source from the usual place on the website.
Packages should be available over the next several days.

PLEASE NOTE: This is an alpha release.  Expect a lot of bugs.  Only
run this release if you're willing to find bugs and report them. :)

Changes in version 0.2.8.2-alpha - 2016-03-28
Changes in version 0.2.8.2-alpha - 2016-03-28
  Tor 0.2.8.2-alpha is the second alpha in its series. It fixes numerous
  bugs in earlier versions of Tor, including some that prevented
  authorities using Tor 0.2.7.x from running correctly. IPv6 and
  directory support should also be much improved.

  o New system requirements:
- Tor no longer supports versions of OpenSSL with a broken
  implementation of counter mode. (This bug was present in OpenSSL
  1.0.0, and was fixed in OpenSSL 1.0.0a.) Tor still detects, but no
  longer runs with, these versions.
- Tor no longer attempts to support platforms where the "time_t"
  type is unsigned. (To the best of our knowledge, only OpenVMS does
  this, and Tor has never actually built on OpenVMS.) Closes
  ticket 18184.
- Tor now uses Autoconf version 2.63 or later, and Automake 1.11 or
  later (released in 2008 and 2009 respectively). If you are
  building Tor from the git repository instead of from the source
  distribution, and your tools are older than this, you will need to
  upgrade. Closes ticket 17732.

  o Major bugfixes (security, pointers):
- Avoid a difficult-to-trigger heap corruption attack when extending
  a smartlist to contain over 16GB of pointers. Fixes bug 18162;
  bugfix on 0.1.1.11-alpha, which fixed a related bug incompletely.
  Reported by Guido Vranken.

  o Major bugfixes (bridges, pluggable transports):
- Modify the check for OR connections to private addresses. Allow
  bridges on private addresses, including pluggable transports that
  ignore the (potentially private) address in the bridge line. Fixes
  bug 18517; bugfix on 0.2.8.1-alpha. Reported by gk, patch by teor.

  o Major bugfixes (compilation):
- Repair hardened builds under the clang compiler. Previously, our
  use of _FORTIFY_SOURCE would conflict with clang's address
  sanitizer. Fixes bug 14821; bugfix on 0.2.5.4-alpha.

  o Major bugfixes (crash on shutdown):
- Correctly handle detaching circuits from muxes when shutting down.
  Fixes bug 18116; bugfix on 0.2.8.1-alpha.
- Fix an assert-on-exit bug related to counting memory usage in
  rephist.c. Fixes bug 18651; bugfix on 0.2.8.1-alpha.

  o Major bugfixes (crash on startup):
- Fix a segfault during startup: If a Unix domain socket was
  configured as listener (such as a ControlSocket or a SocksPort
  "unix:" socket), and tor was started as root but not configured to
  switch to another user, tor would segfault while trying to string
  compare a NULL value. Fixes bug 18261; bugfix on 0.2.8.1-alpha.
  Patch by weasel.

  o Major bugfixes (dns proxy mode, crash):
- Avoid crashing when running as a DNS proxy. Fixes bug 16248;
  bugfix on 0.2.0.1-alpha. Patch from "cypherpunks".

  o Major bugfixes (relays, bridge clients):
- Ensure relays always allow IPv4 OR and Dir connections. Ensure
  bridge clients use the address configured in the bridge line.
  Fixes bug 18348; bugfix on 0.2.8.1-alpha. Reported by sysrqb,
  patch by teor.

  o Major bugfixes (voting):
- Actually enable support for authorities to match routers by their
  Ed25519 identities. Previously, the code had been written, but
  some debugging code that had accidentally been left in the
  codebase made it stay turned off. Fixes bug 17702; bugfix
  on 0.2.7.2-alpha.
- When collating votes by Ed25519 identities, authorities now
  include a "NoEdConsensus" flag if the ed25519 value (or lack
  thereof) for a server does not reflect the majority consensus.
  Related to bug 17668; bugfix on 0.2.7.2-alpha.
- When generating a vote with keypinning disabled, never include two
  entries for the same ed25519 identity. This bug was causing
  authorities to generate votes that they could not parse when a
  router violated key pinning by changing its RSA identity but
  keeping its Ed25519 identity. Fixes bug 17668; fixes part of bug
  18318. Bugfix on 0.2.7.2-alpha.

  o Minor features (security, win32):
- Set SO_EXCLUSIVEADDRUSE on Win32 to avoid a local port-stealing
  attack. Fixes bug 18123; bugfix on all tor versions. Patch
  by teor.

  o Minor features (bug-resistance):
- Make Tor survive errors involving connections without a
  corresponding event object. Previously we'd fail with an
   

Re: [tor-talk] Religion provides statistical proof of the, Creation of our civilization. This is .. really ... the Apocalypse., Today, see Eden and Exodus in superposition.

2016-03-28 Thread Paul Crable
Perhaps I've missed something, but does this have anything to do 
whatsoever with TOR?


Paul
--
PAUL A CRABLE
PORTLAND, OREGON, U.S.A.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Religion provides statistical proof of the, Creation of our civilization. This is .. really ... the Apocalypse., Today, see Eden and Exodus in superposition.

2016-03-28 Thread Adam M. Dobrin
This isn't about the Torah?

*http://shrub.lamc.la *

And God said "let there be light"

The third reference superimposes over Earth, and the quote is “neither yet
bread for the wise.” The light of this statement is the periodic element
Xe, for both an Oracle Database and the element responsible for camera
flashes. This is the location of our story of Exodus, and that whole word,
taken in reverse speaks volumes. In addition to “Xe,” the four letter
command “sudo” is the Unix equivalent of “run as the God account.”

[image: let there be light is "sudo xe"]
“sudo xe” is the logical equivalent of “Let there be Light.” Exodus in
reverse; in Linux and chemistry. Geek.

Towards the end Saturn and Uranus... the gods of Time and the Sky
correspond to the final two references in Ecc 9:11... but time and chance
happeneth to them all. Uranus clearly links to the element Uranium, and
also ties the story of the messiah on the run, the lamb of God (is lam) to
the court battle which is referenced in the Book of Judges and the Trial of
Jesus Christ.

The missing references, clarify the teachings of Christ related to Salt,
the Iron Rod, and Silicon... the Fifth (14th) Element. This event, and the
series of details clearly set the stage for Exodus being realized in the
world all around us. Not until we had these elements, Oracle, and English
would all of these things made sense as a sort of decoder, showing us that
the Revelation of Christ is meant to be unsealed right now. Linked to our
rapid advancement in technology, the guidance of the Holy Bible is meant to
free us from slavery, censorship, through transparency and disclosure.

Christ's Iron Rod juxtaposes the Rod of Aaron in the Egyptian story, and is
further extrapolated into our world through the music of the Doors. A
number of songs, from Peace Frog to Riders on the Storm reference Plagues
of Egypt; and it is from reading the word “rod” backwards and using the
context of story that we see how important the period element for Iron is.
Fe, means Doors.. For everyone. This is about passage to Heaven,
bi-directional transportation. This is in clear contrast to Aaron's link to
“let my people go.” The light of Exodus is to see its meaning in reverse...
and The Doors are beckoning for this fire to be lit.

For thousands of years the Holy Scriptures have been passed down from
generation to generation, all the while holding within their secretive
pages a message to 2016. This message reveals technologies that are central
to the creation of Heaven, things like mind mapping and time travel... it
begins by setting the stage and proving that time travel exists and has
been actively used in the creation of our civilization. The book of Matthew
links Moses and Christ through near parallel events, a microcosm of the 40
years in the desert and mounting of the peak of Sinai; days in the life of
Christ. This number 40 has been holy only to God (meaning secret), until
now. It is a homo-phonic reference to 4-D, the fourth dimensional
wilderness that we currently are walking in. The desert is one of lack of
knowledge of the technology, and its possible uses for both good and evil.
It is the purpose of the Book of Exodus to help us end this dark period of
wandering and find the light of the Son; ending the 10th Plague. The stage
is set, though, all the way in the Book of Revelation.




On Mon, Mar 28, 2016 at 7:38 PM, Paul Crable  wrote:

> Perhaps I've missed something, but does this have anything to do
> whatsoever with TOR?
>
> Paul
> --
> PAUL A CRABLE
> PORTLAND, OREGON, U.S.A.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Operation Onymous Technical Explanation?

2016-03-28 Thread CANNON NATHANIEL CIOTA

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-03-28 16:13, Flipchan wrote:
" What i have heard was that it was alot of bad opsec and also some 
pma-exploits"


Or maybe the 'bad opsec' claim is actually a case of parallel 
reconstruction in which the excuse of bad opsec is to cover the actual 
technique.

-BEGIN PGP SIGNATURE-
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=ep7a
-END PGP SIGNATURE-


--
Cannon N. Ciota
Digital Identity (namecoin): id/cannon
Website: www.cannon-ciota.info
Email: can...@cannon-ciota.info
PGP Fingerprint: E7FB 0605 1BD4 8B88 B7BC 91A4 7DF7 76C7 25A6 AEE2
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Crowd Sourced Protest Of Cloudflare

2016-03-28 Thread CANNON NATHANIEL CIOTA

https://www.reddit.com/r/TOR/comments/4cdx30/crowd_sourced_protest_of_cloudflare/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk