Re: Your system clock just jumped on Debian+VMware ESX

2008-03-02 Thread Juliusz Chroboczek
I'm guessing this is a kernel thing, so running date a lot will probably not help to notice it. Is gettimeofday() the wrong way to ask what time it is under vmware? :) Using select (or poll) and gettimeofday, while not technically correct, is the only portable way of writing an even-driven

Defeat Exit Node Sniffing?

2008-03-02 Thread defcon
I have been using tor for a while now, and I absolutely love it, although the only thing keeping me from using it, is the insecurities of the exit nodes. I know to truly stay anonymous you should stay away from personal accounts but how can I connect through tor to gmail or other ssl enabled

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread Stian Øvrevåge
On Sun, Mar 2, 2008 at 9:30 PM, defcon [EMAIL PROTECTED] wrote: I have been using tor for a while now, and I absolutely love it, although the only thing keeping me from using it, is the insecurities of the exit nodes. I know to truly stay anonymous you should stay away from personal accounts

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread Chris Palmer
defcon writes: I have been using tor for a while now, and I absolutely love it, although the only thing keeping me from using it, is the insecurities of the exit nodes. I know to truly stay anonymous you should stay away from personal accounts but how can I connect through tor to gmail or

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread Michael_google gmail_Gersten
Also, see the Tor technical FAQ wiki entry for this: https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#head-5e18f8a8f98fa9e69ffac725e96f39641bec7ac1 Which says: We'd like to make it still work even if the service is nearby the Tor relay but not on the same IP address. But there

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread scar
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Chris Palmer @ 2008/03/02 14:15: | defcon writes: | | I have been using tor for a while now, and I absolutely love it, although | the only thing keeping me from using it, is the insecurities of the exit | nodes. I know to truly stay anonymous you

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread defcon
It is unfortunate about there privacy policy, but I consider all mail unsafe, as mail passes through the net from server to server they can be intercepted, is there any guarantee your mail being sent through the net is unread/analyzed/archived before you read it? The only solution is using PGP

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread Gregory Maxwell
On Sun, Mar 2, 2008 at 6:34 PM, Michael_google gmail_Gersten [EMAIL PROTECTED] wrote: [snip] Here's a simple idea. Just as search engines added a robots.txt file, how about a web server providing a torexit.txt file, which is simply the list of tor exit nodes that the server considers close

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread defcon
Gmail with SSL is by default is a more secure webmail provider than Hotmail. It appears to have a failure mode that is less than desirable when an active attacker decides to mangle packets. All someone would have to do to force non-ssl is: Send TCP reset packets for any connection to port 443.

Re: Defeat Exit Node Sniffing?

2008-03-02 Thread Chris Palmer
scar writes: sorry, but that's not entirely true. if you watch your tor circuits, gmail will jump to one insecure connection on port 80 to do something during the login phase, and then go back https, even if you use https://mail.google.com/. this has been discussed to death, please search