-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Juliusz Chroboczek wrote:
Firefox should in principle not use the DNS if
network.proxy.socks_remote_dns
is set to true (in about:config).
Hm, I'm not sure - I thought this option only works if you're using a
SOCKS-proxy, e.g. connecting
Using privoxy is necessary because
browsers leak your DNS requests when
they use a SOCKS proxy directly,
which is bad for your anonymity.
Firefox should in principle not use the DNS if
network.proxy.socks_remote_dns
is set to true (in about:config).
Privoxy also removes
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Onion wrote:
Alexander W. Janssen wrote:
(snip)
offtopic (ignore at will)
First of all, I'm not fond of political discussions in tech groups,
but in this specific case of an aid, that was developed not least for
sociopolitical reasons,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED] wrote:
If I was in your position I might consider putting some bulk
demagnetizers near my hard drives with a panic switch, with backups to a
secure unknown location.
Now this is definitively a bizarre idea... :-)
That reminds
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
F. Fox wrote:
However, let's suppose that we're in a time when German Tor nodes are
now actively keeping logs of all connections. What would be the best way to:
As I already said in an earlier posting, German Tor nodes won't be
starting logging
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Just a couple ideas I had, regarding the issue of German Tor nodes and
the upcoming data retention policies; keep in mind that my own knowledge
regarding the Tor network isn't all that deep, so these may be flawed.
However, let's suppose that we're
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Eugen Leitl wrote:
On Sat, Dec 01, 2007 at 02:06:22PM -0700, [EMAIL PROTECTED] wrote:
If I was in your position I might consider putting some bulk
demagnetizers near my hard drives with a panic switch, with backups to a
Doesn't work, you'd
You can specify which exit node to use, but this makes you less anonymous
because tor can't randomize your circuits. The best way (AFAIK) is to block
all nodes except those in the particular country you want to use.
Comrade Ring Kamens
On Dec 2, 2007 5:22 PM, David Hill [EMAIL PROTECTED] wrote:
Hey Folks,
New to Tor, but love the idea and the functionality. Privacy is my
business right now, so I find this a great effort.
I've installed Tor and all on Firefox, and it works great. Problem is
I can't quite figure out how to control the country from which I
emerge from the Tor Cloud. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alexander W. Janssen wrote:
[EMAIL PROTECTED] wrote:
If I was in your position I might consider putting some bulk
demagnetizers near my hard drives with a panic switch, with backups to a
secure unknown location.
Now this is definitively a
That's fine... for this exercise I don't really care about the
anonymity. Can you literally describe how to do that? the UI has me
a bit confused on how to do this?
thanks
Tetsu
On Dec 2, 2007 2:27 PM, Ringo Kamens [EMAIL PROTECTED] wrote:
You can specify which exit node to use, but this
On Nov 20, 2007 8:06 AM, chris misztur [EMAIL PROTECTED] wrote:
... I'm thinking that the 'v4tov4' port proxy is only for
inbound connections...
hi chris,
this works the opposite way you'd need it to for the behavior you seek.
it is indeed for inbound connection relay only.
note that even if
On Oct 28, 2007 12:36 PM, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
[ configuring SOCKS in java ]
you can also use the system and/or user level deployment properties
file to set the SOCKS proxy settings:
http://java.sun.com/j2se/1.5.0/docs/guide/deployment/deployment-guide/properties.html
On Dec 2, 2007 2:25 PM, F. Fox [EMAIL PROTECTED] wrote:
[ strange, dangerous, and likely to fail methods for destroying
drives ]
use full disk encryption, even the latest ubuntu supports this.
Last time I tried this with the Ubuntu 7.10 Alternate CD it didn't
work. The installer crashes
On Nov 1, 2007 2:02 PM, Frozen Flame [EMAIL PROTECTED] wrote:
You can use a java socks api or use an external app, such as tsocks
(Linux) to socksify your app without it even knowing about it.
my understanding is that doing DNS resolution via tsocks is spotty at
best since it forces the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
coderman wrote:
apologies in advance for veering this far off topic...
On Dec 2, 2007 2:25 PM, F. Fox [EMAIL PROTECTED] wrote:
[ strange, dangerous, and likely to fail methods for destroying drives ]
use full disk encryption, even the latest
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I don't think much of the aforementioned physical destruction methods;
I also agree in that full disk encryption is the best way to go, if at
all possible.
(snip)
While I don't think much of physical destruction either, the encrypted
storage
Ringo,
thanks. that I think does the trick.
Tetsu
On Dec 2, 2007 3:33 PM, Ringo Kamens [EMAIL PROTECTED] wrote:
See 4.9. Can I control what nodes I use for entry/exit? at
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ
Comrade Ringo Kamens
On Dec 2, 2007 5:39 PM, David Hill [EMAIL
Arrakis wrote:
It appears that Java attacks for causing external IP data to be leaked
can be mitigated to some good degree. The upshot is that you can now run
Java applets that even when attempting to phone home directly (revealing
your IP), they are routed through the socks port and thus Tor or
James,
Do you have a copy of these tests? I'm definitely interested in seeing
it. However, I am NOT posing this as a solution to java issues, just
another defense layer. This effectively keeps non-malicious applets from
surreptitious leakage. I highly doubt a determined application would be
privacy back-up storage concept:
http://sourceforge.net/tracker/index.php?func=detailaid=1833093group_id=178712atid=886242
http://forums.truecrypt.org/viewtopic.php?t=8000
2007/12/3, F. Fox [EMAIL PROTECTED]:
-BEGIN PGP SIGNED MESSAGE-
I followed a link here with the title Earthlink's broken DNS affecting Tor
nodes.
Maybe someone here could answer these questions about
broken DNS.
If you check the two IP's 216.154.211.104 and 65.74.151.220
http://ip-lookup.net/neighborhood.popup.php?ip=216.154.211.104
James Muir wrote:
Arrakis wrote:
It appears that Java attacks for causing external IP data to be leaked
can be mitigated to some good degree. The upshot is that you can now run
Java applets that even when attempting to phone home directly (revealing
your IP), they are routed through the socks
23 matches
Mail list logo