Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread Karl
20TB,you'll%20enjoy%20unlimited%20data >> . >> > >> > And their data caps, where they still exist, are 1 terabyte/month, >> which I think would be plenty for an anonymity network. >> >> The problem is that a reliable cheap anonymising network for low-latency

Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread Karl
exist, are 1 terabyte/month, > which I think would be plenty for an anonymity network. > > The problem is that a reliable cheap anonymising network for low-latency > traffic like web traffic is basically impossible. > > Tor is about as good as we can get. When I was designing m-o-o-t I &

Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread Peter Fairbrother
for low-latency traffic like web traffic is basically impossible. Tor is about as good as we can get. When I was designing m-o-o-t I didn't include any web anonymiser for that reason. The problem is traffic volume and latency. If we want low-latency web traffic - nowadays [1] that's less than 4

Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread Karl
, are 1 terabyte/month, which >> I think would be plenty for an anonymity network. >> >> >> 2.Extensive chaff. (which, of course, is an old idea, strangely it's >> not yet implemented in TOR) >> >> 3."Output nodes" would outp

Re: [tor-relays] BadExit: Rerouting exit relays detected (1) 45.63.11.98

2020-10-14 Thread grarpamp
On 10/12/20, Dr Gerard Bulger wrote: > Torrc allows you to exit from a different IP. I thought it a good idea to > stop arbitrary blocking of the advertised Tor exit IP, the captchas and > blacklists that tor users suffer. Relay operators are free to do that for those reasons. An

Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread Stefan Claas
t; > 2.    Extensive chaff.   (which, of course, is an old idea, strangely it's > not yet implemented in TOR) > > 3.    "Output nodes" would output only in encrypted form, so that people > generally could not get in trouble for acting as an > output node:  Their output

Re: Tor, the pentagon's cyberweapon

2020-10-14 Thread jim bell
On Tuesday, October 13, 2020, 03:13:30 PM PDT, Stefan Claas wrote:  Karl wrote: >> I'm burning out a bit so I want to add, >> Please if you have better ideas of what _to_ do, suggest them. >> Haven't read any proposals yet. >An alternative to Tor could be the Nym Networ

Re: Tor, the pentagon's cyberweapon

2020-10-13 Thread Stefan Claas
Karl wrote: > I'm burning out a bit so I want to add, > > Please if you have better ideas of what _to_ do, suggest them. > Haven't read any proposals yet. An alternative to Tor could be the Nym Network, once in production. The Nym team is a good team and have well known

Re: Looking at the tor daemon source code

2020-10-13 Thread Karl
On 10/13/20, Karl wrote: > On 10/13/20, coderman wrote: > ... >> you could monitor sockets and streams for activity, then queue chaff >> traffic >> if needed to fill in toward target rate, or some time-delayed logarithmic >> fall-off... >> >> >> have fun! >> >> best regards, > > wow thanks!

Re: Looking at the tor daemon source code

2020-10-13 Thread Karl
On 10/13/20, coderman wrote: ... > you could monitor sockets and streams for activity, then queue chaff traffic > if needed to fill in toward target rate, or some time-delayed logarithmic > fall-off... > > > have fun! > > best regards, wow thanks!

Re: Looking at the tor daemon source code

2020-10-13 Thread coderman
‐‐‐ Original Message ‐‐‐ On Monday, October 12, 2020 10:36 PM, Karl wrote: ... > `tor_main` appears to be in tor_api.c . If you want to memorize the > basics of how tor works, that's the next file to look in. That's all > for now, folks! for Unix like sys

Re: Tor, the pentagon's cyberweapon

2020-10-13 Thread Karl
> On 10/13/20, Punk-BatSoup-Stasi 2.0 wrote: >>> > The information is unknown to the vast majority of tor users, >>> > including >>> > all the tor users who use tor in 'dark markets' and end up in jail. >>> >>> That's important information

Re: Tor, the pentagon's cyberweapon

2020-10-13 Thread Karl
On 10/13/20, Punk-BatSoup-Stasi 2.0 wrote: > The information is unknown to the vast majority of tor users, including > all the tor users who use tor in 'dark markets' and end up in jail. That's important information. You spew a lot of hard to believe extreme interpretations, do yo

Looking at the tor daemon source code

2020-10-12 Thread Karl
``` tor]$ grep -r 'main(' src/app src/app/config/or_options_st.h: int LogMessageDomains; /**< Boolean: Should we log the domain(s) in which src/app/main/main.c:/* Main entry point for the Tor process. Called from tor_main(), and by src/app/main/main.c:tor_run_main(const tor_main_configuratio

Re: Building Tor from Source

2020-10-12 Thread Karl
On 10/12/20, grarpamp wrote: >>> It looks like your OpenSSL headers don't match what Tor expects during >>> `configure`. > > Giving the type errors during cc .o. I don't understand you here. What do you mean? > >>> You can try building and linking agains

Re: Building Tor from Source

2020-10-12 Thread grarpamp
>> It looks like your OpenSSL headers don't match what Tor expects during >> `configure`. Giving the type errors during cc .o. >> You can try building and linking against your own SSL, ala: >> ./Configure --prefix=/usr no-idea no-rc5 no-mdc2 zlib-dynamic threads shared

Re: Building Tor from Source

2020-10-12 Thread Karl
hey thanks for your response, On 10/12/20, coderman wrote: > Hello Karl! > > It looks like your OpenSSL headers don't match what Tor expects during > `configure`. > > You can try updating your openssl-devel libraries, (sometimes called libssl, > libcrypto, ssl-dev, e

Re: Building Tor from Source

2020-10-12 Thread coderman
Hello Karl! It looks like your OpenSSL headers don't match what Tor expects during `configure`. You can try updating your openssl-devel libraries, (sometimes called libssl, libcrypto, ssl-dev, etc. Check accordingly for your distro). You can try building and linking against your own SSL, ala

Re: Building Tor from Source

2020-10-11 Thread Karl
t; > its source. > > > > s/A/B/ is sed script substitution notation. It means replace A with > > B. I tell jokes because I'm in pain, and I'd rather share nice things > > than harm, especially if those nice things could have some important > > small part. > >

Re: Building Tor from Source

2020-10-11 Thread coderman
note that this is only building little-t tor the application, and not a whole bundle, like Tor Browser, which includes the launcher app, and a modified Firefox, and tor. regarding configure, some other options that might be useful building against your own libs, and on win32: export CFLAGS

Re: Building Tor from Source

2020-10-11 Thread Karl
> > s/A/B/ is sed script substitution notation. It means replace A with > B. I tell jokes because I'm in pain, and I'd rather share nice things > than harm, especially if those nice things could have some important > small part. > > A lot of people are working on the Tor projec

Building Tor from Source

2020-10-11 Thread Karl
, especially if those nice things could have some important small part. A lot of people are working on the Tor project. You can see what they're working on at https://gitweb.torproject.org/ . I have no clue how to use gitweb to actually get source code, but I'm pretty good at guessing people's [s/social

Building Tor from Source

2020-10-11 Thread Karl
, especially if those nice things could have some important small part. A lot of people are working on the Tor project. You can see what they're working on at https://gitweb.torproject.org/ . I have no clue how to use gitweb to actually get source code, but I'm pretty good at guessing people's [s/social

Tor Stinks: Traffic Analysis Methods Get More Public Light via HackerFactor

2020-09-17 Thread grarpamp
https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html https://www.hackerfactor.com/blog/index.php?/archives/890-Tor-0day-Replying-to-the-Tor-Project.html https://www.hackerfactor.com/blog/index.php?/categories/19-Tor Hackerfactor... " I read off the ad

Re: Tor Stinks: Stealthy Traffic Analysis

2020-09-16 Thread Zenaan Harkness
On Wed, Sep 16, 2020 at 05:54:17PM -0400, grarpamp wrote: > https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-01 Thanks for posting this link.

Re: Tor Stinks: Stealthy Traffic Analysis

2020-09-16 Thread grarpamp
https://tools.ietf.org/html/draft-ietf-ipsecme-iptfs-01

Re: [tor-relays] non-encrypted connections from Tor exit relays

2020-09-14 Thread grarpamp
>> do some exit relay operators have a policy to prevent connections >> leaving their exit node via non-encrypted ports (e.g. port 25)? >> >> not even wanting to be in a >> position to observe users' data passing through the exit node in clear >> text. >> hoping that encrypted connections >>

Tor Stinks: Stealthy Traffic Analysis

2020-09-09 Thread grarpamp
Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting Prateek Mittal et al. ACM CCS 2011 https://dl.acm.org/doi/pdf/10.1145/2046707.2046732 https://www.cryptolux.org/images/b/bc/Tor_Issues_Thesis_Thill_Fabrice.pdf

Tor Stinks: >600 Tor relays without ContactInfo and similar properties

2020-08-23 Thread grarpamp
"Tor Stinks" -- NSA ;) -- Forwarded message -- From: nusenu Date: Thu, 20 Aug 2020 22:47:55 +0200 Subject: [tor-talk] >600 Tor relays without ContactInfo and similar properties To: tor-t...@lists.torproject.org Since the Tor directory authorities are no lo

Decrypt: Hackers steal Bitcoin through large-scale exploit on Tor: report

2020-08-12 Thread jim bell
Decrypt: Hackers steal Bitcoin through large-scale exploit on Tor: report. https://decrypt.co/?p=38359

Re: TechRadar: Multiple zero-day vulnerabilities in Tor have been disclosed online

2020-08-01 Thread Travis Biehn
, at worst presenting a DoS condition. Its too bad the Tor project won't answer his calls or accept his patches - it seems at first glance he'd be a solid addition to the project. I hope this conversation ultimately does more good than harm. The techradar article is advertising VPNs and 'privacy

TechRadar: Multiple zero-day vulnerabilities in Tor have been disclosed online

2020-08-01 Thread jim bell
TechRadar: Multiple zero-day vulnerabilities in Tor have been disclosed online. https://www.techradar.com/news/tor-network-hit-by-two-major-zero-day-attacks

Re: IQNets, Tor, "Dumpster Fires"

2020-07-26 Thread Zenaan Harkness
the NSA's fangs on literally every fiber optic cable and in every exchange they can weasel into, GPA. They are difficult to defeat unless you are filling the network with fill traffic such that they can't tell wheat from chaff. Tor doesn't do this. .. At this point the middle node could als

IQNets, Tor, "Dumpster Fires"

2020-07-25 Thread Karl
Hi, Long story short: A Tor dev "pastly" on OFTC muted me ("remotecontrolledboy") in their off topic channel relating to asking about an event some years ago with coderman. pastly and I also had some positive interactions supporting users of Tor and did not stop me from slig

BlackHoleCloud: Another Hardware VPN/Tor Box

2020-06-20 Thread grarpamp
http://blackholecloud.com/ BlackHoleCloud Now with Shadowsocks, Wireguard, OpenVPN, Stunnel, and a Tor Bridge. Dedicated VPN servers matched to a Tiny Hardware Firewall VPN endpoint Build your servers in 19 cities around the globe Introducing our newest and fastest security solution: the J2157

Re: [tor] Re: torservers.net future

2020-06-18 Thread Mirimir
On 06/18/2020 04:31 PM, coderman wrote: > it's all about attack surface (to a lesser degree, hardening). > > when FaceBook bought 0day dev against their own user, the weak link was a > video player - not Tor Browser, not tor, nor Tails model, but a video > implementation insi

Re: [tor] Re: torservers.net future

2020-06-18 Thread coderman
‐‐‐ Original Message ‐‐‐ On Wednesday, May 27, 2020 2:59 PM, John Young wrote: > Barton Gellman claims in Dark Mirror that NSA hacked Tor Browser > Bundle. (pp.79-81). Snowden warned "disable the fucking Javasripts." > > https://twitter.com/Cryptome_/status/1265

Re: tor replacement - was Re: Box for simple Tor node.

2020-06-05 Thread grarpamp
On 5/24/20, Karl wrote: > A general purpose network sounds nice. Everything is doable. > > What do you think of forking the codebase of an existing network, like tor > or gnunet or one of the newer examples from anonymity research? What networks ultimately do, whether they are

Re: [tor] Re: torservers.net future

2020-05-27 Thread Zenaan Harkness
First grarpamp, now John Young! These breaches of the public trust by our "esteemed" Western institutions is a source of great anger for some. The evident compromises that have and continue to exist within organisations such as the Tor Inc board, is entirely insidious. To chan

Re: [tor] Re: torservers.net future

2020-05-27 Thread John Young
Barton Gellman claims in Dark Mirror that NSA hacked Tor Browser Bundle. (pp.79-81). Snowden warned "disable the fucking Javasripts." https://twitter.com/Cryptome_/status/1265658170195804164 At 10:27 AM 5/27/2020, you wrote: From: Vasilis To: torserv...@freelists.org Subject: Re

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-25 Thread jim bell
to implement multiple software concepts.             Jim Bell On Sunday, May 24, 2020, 02:59:42 PM PDT, Karl wrote: A general purpose network sounds nice.  Everything is doable. What do you think of forking the codebase of an existing network, like tor or gnunet or one of the newer examples from

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-24 Thread Karl
A general purpose network sounds nice. Everything is doable. What do you think of forking the codebase of an existing network, like tor or gnunet or one of the newer examples from anonymity research? On Thu, May 21, 2020, 1:55 AM jim bell wrote: > On Wednesday, May 20, 2020, 07:27:40 PM

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-22 Thread grarpamp
https://arstechnica.com/information-technology/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/ "Tor hasn't changed, it's the world that's changed." -- Tor Project Five years later, tor still looks same as 20 years prior, while world adversaries advance

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-20 Thread jim bell
problem is that advances in such networks generally  require implementing entirely new networks to check out new algorithms and new features, such improvements are strongly deterred.  After all, that's one reason that TOR doesn't get as many improvements as we might like.  (Another reason

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-20 Thread other.arkitech
re implementing entirely new networks to check out new algorithms and > new features, such improvements are strongly deterred. After all, that's one > reason that TOR doesn't get as many improvements as we might like. (Another > reason is that it is financed, at least in part, b

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-19 Thread jim bell
are strongly deterred.  After all, that's one reason that TOR doesn't get as many improvements as we might like.  (Another reason is that it is financed, at least in part, by people who are hostile to a "too-good" anonymization system.) Sure, we could implement a new set of nodes, hopefull

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-15 Thread Karl
should'. > > Moot since this chaff fill does not rate limit or impede wheat traffic, > some overheat but user should see roughly same speed > as tor, i2p, phantom, etc. > > > the basic architecture for an overlay that works as "tor replacement". > > Would rather s

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-14 Thread Karl
On Thu, May 14, 2020, 5:02 AM grarpamp wrote: > > the basic architecture for an overlay that works as "tor replacement". > > Would rather see a TA resistant general purpose overlay > transport network that can serve many uses. A 'tor replacement' > would be just o

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-14 Thread grarpamp
see roughly same speed as tor, i2p, phantom, etc. > the basic architecture for an overlay that works as "tor replacement". Would rather see a TA resistant general purpose overlay transport network that can serve many uses. A 'tor replacement' would be just one module in that.

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-12 Thread grarpamp
orks fine. > you can't just foward traffic from > the overlay to the arpanet web cesspool and expect anonimity That's further approachable with some network fill design than it is with tor or anything else today that do nothing. Possibly even a 10x odds reduction or more. > Services that

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-12 Thread grarpamp
> web cesspool servers send data in > big chunks/high speed bursts, which is not compatible with constant rate > links. They are, your ISP rate or physical link speed already serves as max rate, or go test set a lower rate in your packet filter, things work fine, just slower.

Nextgen Traffic Analysis Resistant Overlay Networks (re: tor replacement box)

2020-05-12 Thread grarpamp
>> https://lists.cpunks.org/pipermail/cypherpunks/2020-May/080509.html >> mid: CAD2Ti282noLJEugQ8dQ6BAnbfxdz8DDy1xUpNAXSXMxHNN Being potentially applicable to a more abstract generic overlay transport network handling modular applications, one perhaps being 'replacing tor'...

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-11 Thread grarpamp
adly it gets attacked and broken. Then scrap or amend it, and code and deploy it. Or skip all those traditional formalities and just start hacking stuff together. > The one situation that I consider intolerable is that TOR remains as a > monopoly in the "anonymization marketplace"

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-09 Thread jim bell
and qualifications to write the software.  An additional complication is that whoever volunteers, he might not be trusted by others.  What is to be done? The one situation that I consider intolerable is that TOR remains as a monopoly in the "anonymization marketplace".             Jim Bell 

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-08 Thread Zenaan Harkness
chieving private online communications. other.architekt fell into the same false assumption about Tor, not realising the very real and known problems directly about privacy on the Tor network. When some folks discover they have been deceived in their thinking in this way, there will be backlash agains

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-08 Thread John Young
we agree that 1,000 quantity will be a good initial "critical mass" for this project? A thousand independent node operators isn't a small number. >> tor is currently larger, <https://metrics.torproject.org/networksize.htm l but>https://metrics.torproject.org/n

Re: tor replacement - was Re: Box for simple Tor node.

2020-05-08 Thread jim bell
agree that this is a matter that needs to be discussed.  But no doubt you've heard of the saying, 'the perfect being the enemy of the good'.   > Can we agree that 1,000 quantity will be a good initial "critical mass" for > this project?     A thousand independent node operator

Re: [tor-talk] Jitsi Meet over Tor

2020-04-07 Thread grarpamp
> Yes, VoIP via UDP works very well through Tor with OnionCat. However, > both endpoints must be running Tor and OnionCat. Basically, all devices > running Tor and OnionCat have IPv6 addresses in the same /48 subnet. So > any such device can connect with any other. > But _not_ with

Re: [tor-relays] Migrating to a new data center (Censored by Tor)

2020-03-31 Thread Zenaan Harkness
HA! Tor now shadow-banning! What a golden moment (not) for "free communication" :D On Mon, Mar 30, 2020 at 09:42:08PM -0400, grarpamp wrote: > Regarding... > > https://lists.torproject.org/pipermail/tor-relays/2020-March/018243.html > https://i.imgur.com/VG7pm3S.jpg

Re: [tor-relays] Migrating to a new data center (Censored by Tor)

2020-03-30 Thread grarpamp
Regarding... https://lists.torproject.org/pipermail/tor-relays/2020-March/018243.html https://i.imgur.com/VG7pm3S.jpg Tor's censors did not let below truth through, cowardly let it expire quietly, while approving the others. " Your mail to 'tor-relays' with the subject Re: [tor-r

Re: [tor-relays] Port Forwarding Question

2020-03-17 Thread grarpamp
On 3/6/20, William Pate wrote: > This constantly trips me up. In my modem settings, I'm offered these options > for port forwarding. I know I need to open 9001, but what do I enter into > the external port fields? > https://lists.torproject.org/pipermail/tor-relays/attachments/20200

Re: [tor-talk] How secure is a hidden service?

2020-02-22 Thread grarpamp
Tor Project sometimes censor and manage speech on its mailing lists from some various facts, alternative points of view, free and open convo, news journalist articles, inquiry, critique of Tor Project itself, etc... perhaps some of the links below may be of interest or merit, or even be nothing

Cloudflare Tor Mozilla via StopMITMInternational

2020-02-22 Thread grarpamp
Convo on Cloudflare Tor Mozilla via StopMITMInternational https://github.com/mozilla-mobile/focus-android/issues/1743

Re: [tor-talk] How secure is a hidden service?

2020-02-21 Thread grarpamp
ge become known, particularly when parallel construction and various [il]legal processes around the world effectively allow those trump cards to remain secret, thus not triggering defensive moves and arms races to their disadvantage. This isn't specific to tor, it's the nature of the entire netsec ga

Re: [tor-relays] Would you place your secrets or in worst case make your life

2020-02-21 Thread grarpamp
50-100+k salaries start being depended upon, YouTube channels censored to keep tidy public message, bury evidences, etc. Cigarettes were hide to cause cancer for decades, what if people knew those facts? Tor is increasingly analyzed by analysts over years due its mass, others care for its users too

Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress? - addendum: CIA technology notes

2020-02-18 Thread coderman
‐‐‐ Original Message ‐‐‐ On Thursday, February 13, 2020 10:59 AM, John Young wrote: ... > https://documentcloud.org/documents/6775056-20200211.htm (pages 20-21) https://www.documentcloud.org/notes/print?docs[]=6775056 20200211 206 Pages - Contributed by Alexa O'Brien, Alexa O'Brien

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2020-02-16 Thread grarpamp
> How about https://nymtech.net/ ? Who knows whatabout such things. Post such random links to the list instead, and maybe people will evaluate about it there. > On Sat, Nov 23, 2019 at 8:22 AM wrote: >> > low-latency >> >> This phrase is misused by many as if it were some kind >> of litmus test

Re: one way blogs - OWB - Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-15 Thread Zenaan Harkness
On Fri, Feb 14, 2020 at 01:43:41PM -0800, C. Comet wrote: > > > > One way blogs - OWBs: > > Important points: > > - OWBs are, due to present tech, not anonymous. > > - They simply provide the possibility that something you write or some > > document (say an Affidavit) that you upload, cannot

Re: one way blogs - OWB - Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread Zenaan Harkness
Jurisdictions: User visible blog names might contain the jurisdiction, say: AUS.MyExMateJimIsABastard.OwBloggPlt23jf.onion/... MyExMateJimIsABastard.OwBloggPlt23jf.onion/AU/... and then if an Australian court issues an injunction against "$CODE.MyExMateJimIsABastard.OwBloggPlt23jf.onion/",

Re: one way blogs - OWB - Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread Zenaan Harkness
On Fri, Feb 14, 2020 at 09:52:58AM +1100, Zenaan Harkness wrote: > and due to the contract, and default tech policies in place in "-implicit- technical contract by virtue of the default policies in place" [You know, it seems quite difficult to speak precisely...]

one way blogs - OWB - Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread Zenaan Harkness
guess... The infrastructure is probably something like: - a VM/VPS - ssh - git - user db - sync scripts, push and/or pull depending on peer conf - OWB software/platform - tor - web server to deploy blog as .onion html site and the only parts to develop are the sync scripts, u

Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread Zenaan Harkness
o helo-gunships. Possible names: - one way blog - speak your facts - one way facts - facts don't lie - true news - bloody nasty muffas exposed etc > At 05:31 AM 2/13/2020, you wrote: > > Anyone know of a Tor site which is basically a blog site, but effectively > &g

Re: git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread John Young
forth. Git, Full-Disclosure, Dark Web, alternatives to internet as watering holes, stings, recruitment hangouts, why even this very cess pit. Trust us. At 05:31 AM 2/13/2020, you wrote: Anyone know of a Tor site which is basically a blog site, but effectively only allows additions of

git based dark web (Tor) "one way" blog/ document dump/ wordpress?

2020-02-13 Thread Zenaan Harkness
Anyone know of a Tor site which is basically a blog site, but effectively only allows additions of documents, attachments and pages (sort of like git stores all history) - perhaps based on git? This is sort of like a wikileaks, but unfiltered/ unadjudicated, and also not for any government

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-11 Thread rooty
g physically found in >> the *first place*. Look for cases where the servers were mysteriously >> just "found", with rest of timeline unfolding after that secret or >> questionable moment. Tor and other networks are sold as being >> able to protect from such netwo

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-10 Thread Zenaan Harkness
On Sun, Feb 09, 2020 at 10:02:03PM -0500, grarpamp wrote: > https://cryptome.org/2020/02/marques-62.pdf > https://www.wired.com/2013/09/freedom-hosting-fbi/ > > For example, these are some example of the type of > suspicious quotes lacking any further details that people > can spot littering

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-10 Thread Mirimir
On 02/09/2020 05:23 PM, grarpamp wrote: > Question how exactly the servers are being physically found in > the *first place*. Look for cases where the servers were mysteriously > just "found", with rest of timeline unfolding after that secret or > questionable moment.

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-09 Thread grarpamp
https://cryptome.org/2020/02/marques-62.pdf https://www.wired.com/2013/09/freedom-hosting-fbi/ For example, these are some example of the type of suspicious quotes lacking any further details that people can spot littering cases and investigate further in their analysis project of cases... "It's

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-09 Thread grarpamp
the cases is not what was done to the servers and users *after* the servers were cracked remotely over tor or whatever other overlay network, or similarly done *after* being physically found... that's obviously going to be some silly exploit. Question how exactly the servers are being physical

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-09 Thread Razer
On 2/9/20 3:40 AM, grarpamp wrote: > “We can’t have a world where a government is allowed to use a black box of > technology from which spring these serious criminal prosecutions,” This guy is from another planet (like most lloigors. Yes you can. You do. You ALWAYS will, as long as there are

Re: Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-09 Thread Razer
The code had attacked a Firefox > vulnerability that could target and unmask Tor users—even those using > it for legal purposes such as visiting Tor Mail—if they failed to > update their software fast enough. The article answers the question. Rr signature.asc Description: OpenPGP digital signature

Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview

2020-02-09 Thread grarpamp
against tor and overlay networks in general, and the large number of these "mystery gaps" type of articles (some court cases leaving hardly any other conclusion with fishy case secrecy, dismissals, etc)... the area of speculative brokeness and parallel construction seems to deserve serious inv

NullTX: Darknet Operator Faces 30 Years in Jail yet his Arrest Raises Many Tor-related Questions

2020-02-09 Thread jim bell
NullTX: Darknet Operator Faces 30 Years in Jail yet his Arrest Raises Many Tor-related Questions. https://nulltx.com/darknet-operator-faces-30-years-in-jail-yet-his-arrest-raises-many-tor-related-questions/

Re: [tor-relays] Exit Concentration vs Bulk filters?

2020-01-04 Thread grarpamp
> So what can we do to achieve the ideal distributed network? > Throttle all (nodes) to the slowest... to get the best diversity? > We need all (nodes), whether high or small capacity. Don't we? Tor is a form of gravity well. If the cloud is not saturated, adding more nodes incre

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-18 Thread grarpamp
> https://pando.com/2019/10/23/we-sold-pando/ https://pando.com/author/ylevine/ Might want to see that articles from the above author and others on the subject are archived.

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-15 Thread Steven Schear
I think the most common tech term is "depreciation". Tor should be o marked on their boot page but that assumes there is a practical replacement. On Sat, Dec 14, 2019, 2:38 AM grarpamp wrote: > >>> snowden also said that > >>> the NSA can't break tor. >

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-14 Thread Zenaan Harkness
On Sat, Dec 14, 2019 at 11:57:32AM -, Spirit of Nikopol wrote: > On Sat, December 14, 2019 2:36 am, grarpamp wrote: > >>>> snowden also said that the NSA can't break tor. > >>> Such blanket context is unlikely. > > [.] > > > Also unfortu

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-14 Thread Spirit of Nikopol
On Sat, December 14, 2019 2:36 am, grarpamp wrote: >>>> snowden also said that the NSA can't break tor. >>> Such blanket context is unlikely. [.] > Also unfortunate that, today, one of the few places still > propagating such blankets, in reverse via false advertis

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-13 Thread grarpamp
>>> snowden also said that >>> the NSA can't break tor. >> Such blanket context is unlikely. > was Also unfortunate that, today, one of the few places still propagating such blankets, in reverse via false advertising, downplaying, failing to mention, etc... is the To

Re: [tor-relays] Improving Relay IPv6 - RIPE Grant

2019-12-12 Thread grarpamp
On 12/12/19, Logforme wrote: > My ISP ... does not provide ... and has no roadmap > I can't switch ISP since they provide the fiber connection for the > apartment building. Seems you should be building out your own P2P fiber mesh guerrilla network house-to-house owner-to-owner, each node

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-09 Thread grarpamp
https://www.youtube.com/results?search_query=tor+vs+vpn https://www.youtube.com/watch?v=1EsPIIwnAXM

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-09 Thread grarpamp
Tor vs VPN podcast https://www.youtube.com/watch?v=5qE4J-7Iwzc https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q/videos

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-02 Thread grarpamp
>> http://www.hackerfactor.com/blog/index.php?/categories/19-Tor > > That article links to another article which some may find much more > interesting (same author apparently): My link above is not a link to an article, it's to a blog tag that collates 22 articles about more way

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-02 Thread Zenaan Harkness
On Mon, Dec 02, 2019 at 07:01:55PM -0500, grarpamp wrote: > http://www.hackerfactor.com/blog/index.php?/categories/19-Tor That article links to another article which some may find much more interesting (same author apparently): https://www.hackerfactor.com/blog/index.php?/archives/789-Cy

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-02 Thread grarpamp
http://www.hackerfactor.com/blog/index.php?/categories/19-Tor

Re: tor stinks, take #376029

2019-12-01 Thread Zenaan Harkness
On Thu, Nov 14, 2019 at 12:06:19PM +1100, Zenaan Harkness wrote: > On Wed, Nov 13, 2019 at 07:06:26PM -0300, Punk-Stasi 2.0 wrote: > > https://www.freehaven.net/anonbib/cache/active-pet2010.pdf > > > > "Suppose the adversary runs just two routers. If we take into >

Re: How do we sponsor & maintain critical infrastructure (rsa, tor, floss hardware, ...)

2019-12-01 Thread grarpamp
ave still chosen not to tip their hat. Many now take crypto donations. Or just start some non-profit or cypherpunk collective and do it all in public under the sun of free speech. Even ignoring any meta issues of who, where, for how much, why etc... tor and other networks would still take lots of va

Nextgen G* Traffic Analysis Resistant Overlay Networks (re Tor stinks)

2019-12-01 Thread grarpamp
Various wrote: > "seconds of traffic" refers to the global buffer space > and time required for *PA find a solution within it. > I've wondered whether it's just that they need lots of users for cover > traffic. That _was_ a major factor in opening Tor to the public, in

Re: How do we sponsor & maintain critical infrastructure (rsa, tor, floss hardware, ...)

2019-12-01 Thread Zenaan Harkness
On Sun, Dec 01, 2019 at 11:17:59AM +0100, Adéla Eastmund wrote: > > Few want to do 1, 3, or 4, because when done right, > > there's no profit or control over other people for them > > to have, and that's how it should be. > > That's what cypherpunks are her for tho. > Nobody makes any money from,

Re: Tor Stinks re Traffic Analysis and Sybil (as do other networks)

2019-12-01 Thread grarpamp
https://web.archive.org/web/20160429124221/techeye.net/news/tor-developer-helps-spooks-hack-tor A former Tor Project developer is making a living creating malware for the Federal Bureau of Investigation that allows agents to unmask users of the anonymity software.

<    1   2   3   4   5   6   7   >