-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Scott Bennett wrote:
(snip)
> I'm not a LINUX user, but I would be surprised if there were not some
> similar facility in LINUX, but I haven't the foggiest notion how one would get
> Windows XP to encrypt its swapping/paging file or even whether W
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Eugen Leitl wrote:
> On Tue, Dec 04, 2007 at 01:35:49PM -0700, [EMAIL PROTECTED] wrote:
(snip)
>> Most data overwrite programs take too long-you do not have that time
>> when they are knocking down your door.
>
> You have to power down the servers bef
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alexander W. Janssen wrote:
> [EMAIL PROTECTED] schrieb:
(snip)
>> I have not run a tor server, so I do not know the exact requirements.
>> Can it be done from a ram drive?
>
> It could, but you'd need to make sure it doesn't swap/page down to disk,
>
Roger Dingledine wrote:
>
> If you're using Linux, and you're unhappy with the amount of ram and
> cpu your Tor server is using, try out Nick's suggestion here:
>
> http://bugs.noreply.org/flyspray/index.php?do=details&id=468&area=comments#1304
>
> and let us know what you learn. :)
okey-dokey,
On Tue, 04 Dec 2007 22:13:08 +0100 "Alexander W. Janssen"
<[EMAIL PROTECTED]> wrote:
>[EMAIL PROTECTED] schrieb:
>> Judge: "Ok you are to be held in contempt and in jail xyz, until such
>> time as you give us the pass phrase to your data"
>
>Only a matter of the UK at the moment. Bad enough th
On Dec 4, 2007 3:35 PM, <[EMAIL PROTECTED]> wrote:
> A strong magnetic field close to the hard drive will completely destroy
> the data making it impossible to recover. I will also probably fuckup
> the drive mechanism, rendering the drive useless.
If by strong you mean a super conducting magnet
On Tue, Dec 04, 2007 at 01:35:49PM -0700, [EMAIL PROTECTED] wrote:
> Judge: "Ok you are to be held in contempt and in jail xyz, until such
> time as you give us the pass phrase to your data"
Plausible deniability. http://en.wikipedia.org/wiki/TrueCrypt
> Most data overwrite programs take too l
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[EMAIL PROTECTED] schrieb:
> Judge: "Ok you are to be held in contempt and in jail xyz, until such
> time as you give us the pass phrase to your data"
Only a matter of the UK at the moment. Bad enough though.
> Most data overwrite programs take too l
By "full disk encryption" I guess your talking about access via a pass
phrase.
Judge: "Ok you are to be held in contempt and in jail xyz, until such
time as you give us the pass phrase to your data"
Most data overwrite programs take too long-you do not have that time
when they are knocking down y
On Thu, 29 Nov 2007 19:05:00 -0600 (CST), "Scott Bennett"
<[EMAIL PROTECTED]> said:
> On Thu, 29 Nov 2007 13:10:43 -0700 [EMAIL PROTECTED] wrote
>
> >I agree. But here is what one judge in Colorado did to a juror who told
Agree that jury nullification is a right and should be exercised.
>
On Tue, 4 Dec 2007 09:53:40 -0500 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Fri, Nov 30, 2007 at 11:35:23PM -0600, Scott Bennett wrote:
>> However, I would be interested in knowing why I see this:
>>
>> -rw--- 1 _tor _tor365907 Nov 30 23:10 cached-consensus
>> -rw---
In the latest build of xB Browser, if you foolishly trust metasploit to allow
scripts, you get the following results:
External Address206.57.47.50Browser (CONTROL)
Internal Host 192.168.0.4 Java(SUCCESS)
Internal Address192.168.0.4 Java(SUCCESS)
DNS Se
On Fri, Nov 30, 2007 at 11:35:23PM -0600, Scott Bennett wrote:
> However, I would be interested in knowing why I see this:
>
> -rw--- 1 _tor _tor365907 Nov 30 23:10 cached-consensus
> -rw--- 1 _tor _tor 39096827 Nov 30 23:11 cached-descriptors
> -rw--- 1 _tor _tor17
On Wed, Nov 14, 2007 at 12:47:39AM -0500, Roger Dingledine wrote:
> This addresses a big issue with exit relays, but there is still some
> other issue remaining. We're not back to the 0.0.9.x days quite yet I'm
> afraid. :)
Hi folks (especially Olaf),
If you're using Linux, and you're unhappy wit
On Mon, Dec 03, 2007 at 07:08:07PM +0100, kazaam wrote:
> But I still have a question how to find out if its dns-leaking? How
>in general can I find out that an app leaks dns-requests?
I just added a faq entry to help out a bit here:
http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#TestSocks
How's it do against the decloak tests at metasploit?
http://metasploit.com/research/misc/decloak/
--- Arrakis <[EMAIL PROTECTED]> wrote:
> It appears that Java attacks for causing external IP data to be leaked
> can be mitigated to some good degree. The upshot is that you can now run
> Java appl
--- Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:
> > Privoxy also removes certain
> > dangerous headers from your web
> > requests, and blocks obnoxious ad
> > sites like Doubleclick.
>
> This is better done in the browser, for quite a few reasons, including
> the fact that there is
17 matches
Mail list logo