Re: [tor-talk] tor phone: Nexus 5X remains black after reboot
it was supported by copperheados before, but now nexus 5 is EOL (from googles side) -> no firmware updates anymore -> no secure phone. if you'd like to have a secure phone, you unfortunatley have to buy a new one. On 26.12.2016 20:00, Flipchan wrote: > I would out Copperhead on My phone But i got regular Nexus 5 so i think it > needs to support More hardware -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] 33c3 and tor?
> CCC has opted not to accept any talks by Tor this year, unfortunate but understandable. thanks for the quick reply! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] 33c3 and tor?
Hello, an early version of the fahrplan for 33c3 is released¹ (btw. also the 33c3 app on f-droid is already available). I couldn't find any talks from the tor-project yet, but maybe I've overlooked them? Will there be any? And will there be a tor relay operators meetup? Thanks f. ¹ https://fahrplan.events.ccc.de/congress/2016/Fahrplan/ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Off-Path TCP Exploits: Global Rate Limit Considered Dangerous,
"[...] Such a weakness could be used to launch targeted attacks that track users’ online activity, forcibly terminate a communication, hijack a conversation between hosts or degrade the privacy guarantee by anonymity networks such as Tor.[...]" https://ucrtoday.ucr.edu/39030 the research paper: http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Decoding Jake Appelbaum
Hello, I didn't want to contribute to this topic, but Mattia really upset me. On 07.06.2016 22:44, Mattia wrote: > Was this FBI? Are these accusations real? (I have not seen any accusation > of RAPE, which is profoundly different than having a disturbing behaviour, > although many titles use that word). Seriously, have you read the story from River on jacobappelbaum.net? Or wasn't that rape because they were in a relationship? However you dress, where ever you go, yes means yes and no means no! @Carrie: please do not write about your, truely sad, experiences without marking such an email with a trigger warning. So that people can decide beforehand if they'd like to read it. For people who have been sexually abused reading your story can be retraumatizing! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Profiling Tor users via keystrokes
win10 analyses keystrokes by default: Windows 10 generates advertising-IDs for everyone. The informations Win10 transmitts by default are (among other things): - location of device - browser history - favorites - which Aaps are installed from the windows store - and data for input-personification. this includes biometrical data of pronunciation (cortana), writing style (handwirting) and how the user types on windows devices. but you can opt-out for many options. ( quick translation from my side, original news article is in german: http://www.heise.de/newsticker/meldung/Windows-10-Neue-Datenschutzbestimmungen-Windows-wird-zur-Datensammelstelle-2765536.html ) On 31.07.2015 10:10, spencer...@openmailbox.org wrote: Hi, flapflap: http://arstechnica.com/security/2015/07/how-the-way-you-type-can-shatter-anonymity-even-on-tor/ says that apparently it's possible to deanonymise Tor users by analysing their keystrokes in input fields of websites. Is there need for modifications in the Tor Browser Bundle/upstream Firefox? grarpamp: A keystroke reclocker / normalizer might be better integrated as part of the keyboard driver in your OS. You'd only need to code it once, and could tune it to suit you however you want. Try checking with your OS. Keystroke spoofing would only circumvent interception attacks, right? It seems destination-based form/packet-grabbing could still profile people. Is there a public keylogger that reveals what it sees so people can case test? TorMirror? Wordlife, Spencer -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk