Re: [tor-talk] tor phone: Nexus 5X remains black after reboot

2016-12-27 Thread fatal
it was supported by copperheados before, but now nexus 5 is EOL (from
googles side) -> no firmware updates anymore -> no secure phone.

if you'd like to have a secure phone, you unfortunatley have to buy a
new one.


On 26.12.2016 20:00, Flipchan wrote:
> I would out Copperhead on My phone But i got regular Nexus 5 so i think it 
> needs to support More hardware
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] 33c3 and tor?

2016-12-20 Thread fatal

> CCC has opted not to accept any talks by Tor this year, 

unfortunate but understandable.

thanks for the quick reply!
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] 33c3 and tor?

2016-12-20 Thread fatal
Hello,

an early version of the fahrplan for 33c3 is released¹ (btw. also the
33c3 app on f-droid is already available).

I couldn't find any talks from the tor-project yet, but maybe I've
overlooked them? Will there be any?

And will there be a tor relay operators meetup?

Thanks

f.

¹ https://fahrplan.events.ccc.de/congress/2016/Fahrplan/


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Off-Path TCP Exploits: Global Rate Limit Considered Dangerous,

2016-08-10 Thread fatal
"[...] Such a weakness could be used to launch targeted attacks that
track users’ online activity, forcibly terminate a communication, hijack
a conversation between hosts or degrade the privacy guarantee by
anonymity networks such as Tor.[...]"


https://ucrtoday.ucr.edu/39030

the research paper:
http://www.cs.ucr.edu/~zhiyunq/pub/sec16_TCP_pure_offpath.pdf
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Decoding Jake Appelbaum

2016-06-08 Thread fatal
Hello,

I didn't want to contribute to this topic, but Mattia really upset me.

On 07.06.2016 22:44, Mattia wrote:
> Was this FBI? Are these accusations real? (I have not seen any accusation
> of RAPE, which is profoundly different than having a disturbing behaviour,
> although many titles use that word).

Seriously, have you read the story from River on jacobappelbaum.net?
Or wasn't that rape because they were in a relationship?

However you dress, where ever you go, yes means yes and no means no!

@Carrie: please do not write about your, truely sad, experiences without
marking such an email with a trigger warning. So that people can decide
beforehand if they'd like to read it. For people who have  been sexually
abused reading your story can be retraumatizing!

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Profiling Tor users via keystrokes

2015-07-31 Thread fatal
win10 analyses keystrokes by default:

Windows 10 generates advertising-IDs for everyone. The informations
Win10 transmitts by default are (among other things):

- location of device
- browser history
- favorites
- which Aaps are installed from the windows store
- and data for input-personification. this includes biometrical data of
pronunciation (cortana), writing style (handwirting) and how the user
types on windows devices.

but you can opt-out for many options.

( quick translation from my side, original news article is in german:
http://www.heise.de/newsticker/meldung/Windows-10-Neue-Datenschutzbestimmungen-Windows-wird-zur-Datensammelstelle-2765536.html
)

On 31.07.2015 10:10, spencer...@openmailbox.org wrote:
 Hi,
 

 flapflap:
 http://arstechnica.com/security/2015/07/how-the-way-you-type-can-shatter-anonymity-even-on-tor/

 says that apparently it's possible to deanonymise Tor users by analysing
 their keystrokes in input fields of websites.

 Is there need for modifications in the Tor Browser Bundle/upstream
 Firefox?


 grarpamp:
 A keystroke reclocker / normalizer might be better integrated
 as part of the keyboard driver in your OS. You'd only need to
 code it once, and could tune it to suit you however you want.
 Try checking with your OS.

 
 Keystroke spoofing would only circumvent interception attacks, right? 
 It seems destination-based form/packet-grabbing could still profile people.
 
 Is there a public keylogger that reveals what it sees so people can case
 test?  TorMirror?
 
 Wordlife,
 Spencer
 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk