Re: Help me understand tor with SSL?

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Juliusz Chroboczek wrote: Firefox should in principle not use the DNS if network.proxy.socks_remote_dns is set to true (in about:config). Hm, I'm not sure - I thought this option only works if you're using a SOCKS-proxy, e.g. connecting

Re: Help me understand tor with SSL?

2007-12-02 Thread Juliusz Chroboczek
Using privoxy is necessary because browsers leak your DNS requests when they use a SOCKS proxy directly, which is bad for your anonymity. Firefox should in principle not use the DNS if network.proxy.socks_remote_dns is set to true (in about:config). Privoxy also removes

[Politics/Legal] Re: German Tor Legal Fund

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Onion wrote: Alexander W. Janssen wrote: (snip) offtopic (ignore at will) First of all, I'm not fond of political discussions in tech groups, but in this specific case of an aid, that was developed not least for sociopolitical reasons,

Re: Nice quiet, private, anonymous life??

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [EMAIL PROTECTED] wrote: If I was in your position I might consider putting some bulk demagnetizers near my hard drives with a panic switch, with backups to a secure unknown location. Now this is definitively a bizarre idea... :-) That reminds

Re: [Political/Legal] Passing ideas on German Tor nodes

2007-12-02 Thread Alexander W. Janssen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 F. Fox wrote: However, let's suppose that we're in a time when German Tor nodes are now actively keeping logs of all connections. What would be the best way to: As I already said in an earlier posting, German Tor nodes won't be starting logging

[Political/Legal] Passing ideas on German Tor nodes

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Just a couple ideas I had, regarding the issue of German Tor nodes and the upcoming data retention policies; keep in mind that my own knowledge regarding the Tor network isn't all that deep, so these may be flawed. However, let's suppose that we're

Re: Nice quiet, private, anonymous life??

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Eugen Leitl wrote: On Sat, Dec 01, 2007 at 02:06:22PM -0700, [EMAIL PROTECTED] wrote: If I was in your position I might consider putting some bulk demagnetizers near my hard drives with a panic switch, with backups to a Doesn't work, you'd

Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread Ringo Kamens
You can specify which exit node to use, but this makes you less anonymous because tor can't randomize your circuits. The best way (AFAIK) is to block all nodes except those in the particular country you want to use. Comrade Ring Kamens On Dec 2, 2007 5:22 PM, David Hill [EMAIL PROTECTED] wrote:

Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
Hey Folks, New to Tor, but love the idea and the functionality. Privacy is my business right now, so I find this a great effort. I've installed Tor and all on Firefox, and it works great. Problem is I can't quite figure out how to control the country from which I emerge from the Tor Cloud. I

Re: Nice quiet, private, anonymous life??

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Alexander W. Janssen wrote: [EMAIL PROTECTED] wrote: If I was in your position I might consider putting some bulk demagnetizers near my hard drives with a panic switch, with backups to a secure unknown location. Now this is definitively a

Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
That's fine... for this exercise I don't really care about the anonymity. Can you literally describe how to do that? the UI has me a bit confused on how to do this? thanks Tetsu On Dec 2, 2007 2:27 PM, Ringo Kamens [EMAIL PROTECTED] wrote: You can specify which exit node to use, but this

Re: Win32 / netsh

2007-12-02 Thread coderman
On Nov 20, 2007 8:06 AM, chris misztur [EMAIL PROTECTED] wrote: ... I'm thinking that the 'v4tov4' port proxy is only for inbound connections... hi chris, this works the opposite way you'd need it to for the behavior you seek. it is indeed for inbound connection relay only. note that even if

Re: javaprogram using tor

2007-12-02 Thread coderman
On Oct 28, 2007 12:36 PM, Juliusz Chroboczek [EMAIL PROTECTED] wrote: [ configuring SOCKS in java ] you can also use the system and/or user level deployment properties file to set the SOCKS proxy settings: http://java.sun.com/j2se/1.5.0/docs/guide/deployment/deployment-guide/properties.html

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread Tom Hek
On Dec 2, 2007 2:25 PM, F. Fox [EMAIL PROTECTED] wrote: [ strange, dangerous, and likely to fail methods for destroying drives ] use full disk encryption, even the latest ubuntu supports this. Last time I tried this with the Ubuntu 7.10 Alternate CD it didn't work. The installer crashes

Re: javaprogram using tor

2007-12-02 Thread coderman
On Nov 1, 2007 2:02 PM, Frozen Flame [EMAIL PROTECTED] wrote: You can use a java socks api or use an external app, such as tsocks (Linux) to socksify your app without it even knowing about it. my understanding is that doing DNS resolution via tsocks is spotty at best since it forces the

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread F. Fox
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 coderman wrote: apologies in advance for veering this far off topic... On Dec 2, 2007 2:25 PM, F. Fox [EMAIL PROTECTED] wrote: [ strange, dangerous, and likely to fail methods for destroying drives ] use full disk encryption, even the latest

Re: storage privacy

2007-12-02 Thread Eugene Y. Vasserman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I don't think much of the aforementioned physical destruction methods; I also agree in that full disk encryption is the best way to go, if at all possible. (snip) While I don't think much of physical destruction either, the encrypted storage

Re: Question: How to set where you emerge from the Tor Cloud?

2007-12-02 Thread David Hill
Ringo, thanks. that I think does the trick. Tetsu On Dec 2, 2007 3:33 PM, Ringo Kamens [EMAIL PROTECTED] wrote: See 4.9. Can I control what nodes I use for entry/exit? at http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ Comrade Ringo Kamens On Dec 2, 2007 5:39 PM, David Hill [EMAIL

Re: Reducing java leakage in windows

2007-12-02 Thread James Muir
Arrakis wrote: It appears that Java attacks for causing external IP data to be leaked can be mitigated to some good degree. The upshot is that you can now run Java applets that even when attempting to phone home directly (revealing your IP), they are routed through the socks port and thus Tor or

Re: Reducing java leakage in windows

2007-12-02 Thread Arrakis
James, Do you have a copy of these tests? I'm definitely interested in seeing it. However, I am NOT posing this as a solution to java issues, just another defense layer. This effectively keeps non-malicious applets from surreptitious leakage. I highly doubt a determined application would be

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread Michael Schmidt
privacy back-up storage concept: http://sourceforge.net/tracker/index.php?func=detailaid=1833093group_id=178712atid=886242 http://forums.truecrypt.org/viewtopic.php?t=8000 2007/12/3, F. Fox [EMAIL PROTECTED]: -BEGIN PGP SIGNED MESSAGE-

Broken DNS

2007-12-02 Thread s bier
I followed a link here with the title Earthlink's broken DNS affecting Tor nodes. Maybe someone here could answer these questions about broken DNS. If you check the two IP's 216.154.211.104 and 65.74.151.220 http://ip-lookup.net/neighborhood.popup.php?ip=216.154.211.104

Re: Reducing java leakage in windows

2007-12-02 Thread Jacob Appelbaum
James Muir wrote: Arrakis wrote: It appears that Java attacks for causing external IP data to be leaked can be mitigated to some good degree. The upshot is that you can now run Java applets that even when attempting to phone home directly (revealing your IP), they are routed through the socks