James Brown (25.07.2009 00:16):
Gitano wrote:
James Brown wrote:
And what about phone calls, including call to ordinaty telephones?
I use 'ihu' as an alternate for skype, but its a peer-to-peer
application and for Linux only. AFAIK there is no SIP-based VoIP
Software using Tor.
Tripple Moon (29.04.2009 17:33):
And if somebody wanted to circumvent, I would think the
client could be
modified so that when it claimed to be uploading itself, it
was actually
uploading a copy of an unmodified binary. Am I missing
something?
Well yea thats upto the implementation of this
Matej Kovacic (02.01.2009 19:39):
Hi,
That's what it is supposed to say until you give it a name. The
assumption is that you use out of band methods to authenticate the cert
is correctly assigned. And then you type whatever nickname you want to
give it into the petname field. Should the
scar (18.04.2008 02:04):
not exactly sure how to articulate this, but i'll do my best.
assume there is a global adversary trying to track down an anonymous
Tor-user by using syntax analysis. that is to say, gathering sets of
sentences or paragraphs from e-mails or forums, etc. and then
Mike Perry wrote on 25.02.2008 09:33:
Torbutton 1.1.14-alpha has been released at
https://torbutton.torproject.org/dev/.
Hello Mike,
Installation link at https://torbutton.torproject.org/dev/, namely
http://torbutton.torproject.org/dev/torbutton-current-alpha.xpi has HTTP
access schema even
F. Fox wrote on 29.01.2008 00:54:
Kraktus wrote:
You can add
ExcludeNodes NodeName1, NodeName2
to your torrc, where the NodeName1, etc. are the names of Chinese exit
nodes that you are aware of. However, you much disallow each Chinese
node separately; you can't exclude by country.
(snip)
Hi guys,
I'm currently working on the new project of tightly secured collabo-
rative/wiki environment software with some neat features, e.g. GnuPG
server-side integration for users' signatures verification and display
on page revisions, comments and so on. Another major goal is censorship
Martin Fick wrote on 18.12.2007 01:05:
--- Vlad \SATtva\ Miller [EMAIL PROTECTED] wrote:
Have you looked at FireGPG Firefox extension?
http://firegpg.tuxfamily.org/
--- Alexander W. Janssen
[EMAIL PROTECTED] wrote:
Why not simply use the Firegpg-extension for
Firefox?
I had
Eugen Leitl wrote on 17.12.2007 20:38:
Log-free? If Tor doesn't log, your firewall'd better. You want
to be your nodes not attributable to you, wait until 20090101,
then go malware. I mean, if running Tor without logs after 20090101
is illegal, then what else do you have to lose? You're a
Michael Holstein wrote on 17.12.2007 23:01:
I'm not a mathematician, but it can't be wise to store multiple copies
of the same plaintext encrypted by the same cipher using different keys
.. much crypto has historically been broken that way.
As a side note: In the context of OpenPGP you have to
Martin Fick wrote on 17.12.2007 23:25:
I am surprised that HTML does not seem
to have some extension to deal with this
already. It is not much different from
encrypted email concepts, just that the
browser needs the ability to do the
decrypting instead of your mail program.
The
Martin Fick wrote on 15.12.2007 11:08:
Hi,
I have what may perhaps seem like a strange question.
Is there any commonly used software for encrypting and
decrypting web pages?
Let me explain that a little better: imagine a web
site which has content destined for specific
individuals.
Scott Bennett wrote on 05.12.2007 04:14:
I have not run a tor server, so I do not know the exact requirements.
Can it be done from a ram drive?
It could, but you'd need to make sure it doesn't swap/page down to disk,
which would be bad.
I'm not a LINUX user, but I would be surprised if
coderman wrote on 14.09.2007 06:39:
On 9/13/07, scar [EMAIL PROTECTED] wrote:
...
so, if we are using a website that uses HTTPS, but, in firefox, for
example, in the cookies list under that website it shows Send
for: any type of connection, then the session is vulnerable?
vulnerable
Roger Dingledine wrote on 05.05.2007 15:22:
On Sat, May 05, 2007 at 01:50:23AM -0400, Freemor wrote:
I recently upgraded totor 0.1.2.13-2~dapper and although it works
very nicely it seems very chatty. by chatty I mean download 200+ KB
every minute from DIR servers. That's gonna add up to a
Roger Dingledine wrote on 13.04.2007 23:50:
On Fri, Apr 13, 2007 at 03:24:40PM +0700, Vlad SATtva Miller wrote:
...However none of the mentioned below router nicknames or fingerprints
was found in the current local cache file.
Original Message
Subject: High-traffic
...However none of the mentioned below router nicknames or fingerprints
was found in the current local cache file.
Original Message
Subject: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed
Date: Thu, 12 Apr 2007 23:35:52 -0400
From: [EMAIL PROTECTED]
To: [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
BlueStar88 wrote on 26.12.2006 00:52:
Hello,
Tor node ip lists as csv plaintext available here:
https://torstat.xenobite.eu/tor_exitnodes.csv
https://torstat.xenobite.eu/tor_allnodes.csv
Great tool. How frequently is this list gets
18 matches
Mail list logo