Re: VoIP telephony building like Tor

2009-07-25 Thread Vlad "SATtva" Miller
James Brown (25.07.2009 00:16): > Gitano wrote: >> James Brown wrote: >> >> >>> And what about phone calls, including call to ordinaty telephones? >>> >> I use 'ihu' as an alternate for skype, but its a peer-to-peer >> application and for Linux only. AFAIK there is no SIP-based VoIP >> Soft

Re: Version checking (was Re: 25 tbreg relays in directory)

2009-04-29 Thread Vlad "SATtva" Miller
Tripple Moon (29.04.2009 17:33): >> And if somebody wanted to circumvent, I would think the >> client could be >> modified so that when it claimed to be uploading itself, it >> was actually >> uploading a copy of an unmodified binary. Am I missing >> something? > Well yea thats upto the implementa

Re: SSL certificate checker plugin for Firefox?

2009-01-04 Thread Vlad "SATtva" Miller
Matej Kovacic (02.01.2009 19:39): > Hi, > >> That's what it is supposed to say until you give it a name. The >> assumption is that you use out of band methods to authenticate the cert >> is correctly assigned. And then you type whatever nickname you want to >> give it into the petname field. Sh

Re: [OT] mitigating or defeating syntax analysis

2008-04-18 Thread Vlad "SATtva" Miller
scar (18.04.2008 02:04): > not exactly sure how to articulate this, but i'll do my best. > > assume there is a global adversary trying to track down an anonymous > Tor-user by using syntax analysis. that is to say, gathering sets of > sentences or paragraphs from e-mails or forums, etc. and then

Re: Torbutton 1.1.14-alpha released

2008-02-25 Thread Vlad "SATtva" Miller
Mike Perry wrote on 25.02.2008 09:33: > Torbutton 1.1.14-alpha has been released at > https://torbutton.torproject.org/dev/. Hello Mike, Installation link at https://torbutton.torproject.org/dev/, namely http://torbutton.torproject.org/dev/torbutton-current-alpha.xpi has HTTP access schema even

Re: Scripted exclusion of nodes? [Was: How to remove some useless nodes]

2008-01-28 Thread Vlad "SATtva" Miller
F. Fox wrote on 29.01.2008 00:54: > Kraktus wrote: >> You can add >> ExcludeNodes NodeName1, NodeName2 >> to your torrc, where the NodeName1, etc. are the names of Chinese exit >> nodes that you are aware of. However, you much disallow each Chinese >> node separately; you can't exclude by country.

Input required on Secure Wiki project

2008-01-14 Thread Vlad "SATtva" Miller
Hi guys, I'm currently working on the new project of tightly secured collabo- rative/wiki environment software with some neat features, e.g. GnuPG server-side integration for users' signatures verification and display on page revisions, comments and so on. Another major goal is censorship resistan

Re: heise online: Klarstellung

2007-12-18 Thread Vlad "SATtva" Miller
Eugen Leitl wrote on 17.12.2007 20:38: > Log-free? If Tor doesn't log, your firewall'd better. You want > to be your nodes not attributable to you, wait until 20090101, > then go malware. I mean, if running Tor without logs after 20090101 > is illegal, then what else do you have to lose? You're a c

Re: Encrypted Web Pages?

2007-12-18 Thread Vlad "SATtva" Miller
Martin Fick wrote on 18.12.2007 01:05: > --- "Vlad \"SATtva\" Miller" <[EMAIL PROTECTED]> wrote: > >> Have you looked at FireGPG Firefox extension? >> http://firegpg.tuxfamily.org/ > > --- "Alexander W. Janssen" > <[EMAIL PRO

Re: Encrypted Web Pages?

2007-12-17 Thread Vlad &quot;SATtva&quot; Miller
Martin Fick wrote on 17.12.2007 23:25: > I am surprised that HTML does not seem > to have some extension to deal with this > already. It is not much different from > encrypted email concepts, just that the > browser needs the ability to do the > decrypting instead of your mail program. > The s

Re: Encrypted Web Pages?

2007-12-17 Thread Vlad &quot;SATtva&quot; Miller
Michael Holstein wrote on 17.12.2007 23:01: > I'm not a mathematician, but it can't be wise to store multiple copies > of the same plaintext encrypted by the same cipher using different keys > .. much crypto has historically been broken that way. As a side note: In the context of OpenPGP you have

Re: Encrypted Web Pages?

2007-12-15 Thread Vlad &quot;SATtva&quot; Miller
Martin Fick wrote on 15.12.2007 11:08: > Hi, > > I have what may perhaps seem like a strange question. > Is there any commonly used software for encrypting and > decrypting web pages? > > Let me explain that a little better: imagine a web > site which has content destined for specific > indiv

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-07 Thread Vlad &quot;SATtva&quot; Miller
Scott Bennett wrote on 05.12.2007 04:14: >>> I have not run a tor server, so I do not know the exact requirements. >>> Can it be done from a ram drive? >> It could, but you'd need to make sure it doesn't swap/page down to disk, >> which would be bad. >> > I'm not a LINUX user, but I would be s

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-15 Thread Vlad \&quot;SATtva\&quot; Miller
coderman wrote on 14.09.2007 06:39: > On 9/13/07, scar <[EMAIL PROTECTED]> wrote: >> ... >> so, if we are using a website that uses HTTPS, but, in firefox, for >> example, in the cookies list under that website it shows "Send >> for: any type of connection", then the session is vulnerable? > > vul

Re: On the performance scalability of Tor

2007-07-18 Thread Vlad \&quot;SATtva\&quot; Miller
Michael_google gmail_Gersten wrote on 19.07.2007 11:43: > The discussion about fast nodes: Is there a way to tell the client, > "Only select fast nodes"? Does "fast" imply high throughput (but it > might be slow to start up), or fast startup/turn around? I think if such an option would be implemen

Re: new TOR seems excessively chatty

2007-05-05 Thread Vlad \&quot;SATtva\&quot; Miller
Roger Dingledine wrote on 05.05.2007 15:22: > On Sat, May 05, 2007 at 01:50:23AM -0400, Freemor wrote: >> I recently upgraded to"tor 0.1.2.13-2~dapper" and although it works >> very nicely it seems very "chatty". by chatty I mean download 200+ KB >> every minute from DIR servers. That's gonna add

Re: [Fwd: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed]

2007-04-14 Thread Vlad \&quot;SATtva\&quot; Miller
Roger Dingledine wrote on 13.04.2007 23:50: > On Fri, Apr 13, 2007 at 03:24:40PM +0700, Vlad SATtva Miller wrote: >> ...However none of the mentioned below router nicknames or fingerprints >> was found in the current local cache file. >> >> Original Messag

[Fwd: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed]

2007-04-13 Thread Vlad \&quot;SATtva\&quot; Miller
...However none of the mentioned below router nicknames or fingerprints was found in the current local cache file. Original Message Subject: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed Date: Thu, 12 Apr 2007 23:35:52 -0400 From: [EMAIL PROTECTED] To: [EMAIL

Re: ISP controlling entry/exti ("Low-Resource Routing Attacks Against Anonymous Systems")

2007-02-26 Thread Vlad \&quot;SATtva\&quot; Miller
xiando wrote on 26.02.2007 9:15: > It may also be the case that ISPs in a whole country is the adversary, for > example, SORM hardware connected to Federal Agency of Government > Communications and Information (FAGCI) is installed at ALL the ISPs (There > are some fights about this laid out the

Re: CSV Tor IP-Lists

2006-12-27 Thread Vlad \&quot;SATtva\&quot; Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 BlueStar88 wrote on 26.12.2006 00:52: > Hello, > > Tor node ip lists as csv plaintext available here: > > https://torstat.xenobite.eu/tor_exitnodes.csv > https://torstat.xenobite.eu/tor_allnodes.csv Great tool. How frequently is this list