On Tue, Dec 28, 2010 at 11:29 PM, Roger Dingledine wrote:
[snip]
> What I'm really looking forward to is learning what modifications to Tor
> might slow down the attack. For example, what happens if we move to a 1024
> byte cell by default, or if we randomly add some extra cells periodically,
> or
On 12/29/2010 12:38 AM, Roger Dingledine wrote:
> On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
>> I'm curious- in what way can Tor be used for emailing? When someone is
>> connected to the Tor network is there email routed along the Tor network
>> too? Or, does it go through their the no
On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
> I'm curious- in what way can Tor be used for emailing? When someone is
> connected to the Tor network is there email routed along the Tor network
> too? Or, does it go through their the normal connection with their ISP?
The only recommended
Thus spake Roc Admin (onionrou...@gmail.com):
> Found the presentation at least and watching it now. You have to skip
> to 3:30 for the actual presentation.
>
> http://www.youtube.com/watch?v=crMInOosdBk&feature=related
Here's a direct link to the relevant section:
http://www.youtube.com/watch?
Not sure if anyone else watched the video but of course there is a
different story than the Wired article.
If you don't want to sit through the whole hour, here's how I would sum it up:
The talk in general was about modern tactics for profiling web users.
They actually had some interesting stuff
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
> It would be neat if somebody could send a pointer to the authors'
> actual results.
Based on
http://www-wiwi.uni-regensburg.de/Forschung/Publikationen/Dominik-Herrmann.html.en
I'm guessing they're basing the talk on their CCSW 2009
On Tue, Dec 28, 2010 at 08:51:30PM -0500, Nick Mathewson wrote:
> From the wired.com article, this sounds _exactly_ like the old website
> fingerprinting attack, which has been known since 2002:
> http://freehaven.net/anonbib/#hintz02
>
> It would be neat if somebody could send a pointer to th
Found the presentation at least and watching it now. You have to skip
to 3:30 for the actual presentation.
http://www.youtube.com/watch?v=crMInOosdBk&feature=related
--
ROC Tor Admin
On Tue, Dec 28, 2010 at 8:51 PM, Nick Mathewson wrote:
> On Tue, Dec 28, 2010 at 8:27 PM, Roc Admin wrote:
>>
I'm curious- in what way can Tor be used for emailing? When someone is
connected to the Tor network is there email routed along the Tor network
too? Or, does it go through their the normal connection with their ISP?
***
To unsubs
On Tue, Dec 28, 2010 at 8:27 PM, Roc Admin wrote:
> This doesn't seem like much of a flaw as it is a design decision. See
> https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Youshouldsendpaddingsoitsmoresecure.
> I'm not trying to dismiss the researcher but maybe someone can give
This doesn't seem like much of a flaw as it is a design decision. See
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Youshouldsendpaddingsoitsmoresecure.
I'm not trying to dismiss the researcher but maybe someone can give
some insight into how critical this is to the Tor projec
* Olaf Selke schrieb am 2010-12-28 um 21:04 Uhr:
> are folks from 27c3 trying to break into web forums today? Never got
> so many abuse complaints within a few hours in the last three years.
Have a look at http://events.ccc.de/congress/2010/wiki/Hacked>.
Usually this is the time were lots of scrip
Hi,
are folks from 27c3 trying to break into web forums today? Never got so many
abuse complaints within a few hours in the last three years.
regards Olaf
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubsc
(via arsetechnica)
http://arstechnica.com/tech-policy/news/2010/12/flaws-in-tor-anonymity-network-spotlighted.ars
Flaws in Tor anonymity network spotlighted
By John Borland, wired.com | Last updated about 4 hours ago
At the Chaos Computer Club Congress in Berlin, Germany on Monday, researchers
-Original Message-
From: and...@torproject.org
To: or-talk@freehaven.net
Sent: Mon, Dec 27, 2010 11:06 pm
Subject: Re: Help with JanusVM?
On Sun, Dec 26, 2010 at 08:22:03PM -0500, zzretro...@email2me.net wrote 9.3K
bytes in 548 lines about:
: anyone have this happen? sudd
On Mon, 27 Dec 2010, Praedor Atrebates wrote:
Subject says it all. Why is only TCP sent over tor and not UDP? Why not
simply suck up and send ALL net traffic, regardless of type, through tor so
there can be no anonymity violations?
You want DNS, UDPENCAP, ... go through Tor as well?
Despi
16 matches
Mail list logo