Re: VoIP telephony building like Tor

2009-07-25 Thread Vlad SATtva Miller
James Brown (25.07.2009 00:16): Gitano wrote: James Brown wrote: And what about phone calls, including call to ordinaty telephones? I use 'ihu' as an alternate for skype, but its a peer-to-peer application and for Linux only. AFAIK there is no SIP-based VoIP Software using Tor.

Re: Version checking (was Re: 25 tbreg relays in directory)

2009-04-29 Thread Vlad SATtva Miller
Tripple Moon (29.04.2009 17:33): And if somebody wanted to circumvent, I would think the client could be modified so that when it claimed to be uploading itself, it was actually uploading a copy of an unmodified binary. Am I missing something? Well yea thats upto the implementation of this

Re: SSL certificate checker plugin for Firefox?

2009-01-04 Thread Vlad SATtva Miller
Matej Kovacic (02.01.2009 19:39): Hi, That's what it is supposed to say until you give it a name. The assumption is that you use out of band methods to authenticate the cert is correctly assigned. And then you type whatever nickname you want to give it into the petname field. Should the

Re: [OT] mitigating or defeating syntax analysis

2008-04-18 Thread Vlad SATtva Miller
scar (18.04.2008 02:04): not exactly sure how to articulate this, but i'll do my best. assume there is a global adversary trying to track down an anonymous Tor-user by using syntax analysis. that is to say, gathering sets of sentences or paragraphs from e-mails or forums, etc. and then

Re: Torbutton 1.1.14-alpha released

2008-02-25 Thread Vlad SATtva Miller
Mike Perry wrote on 25.02.2008 09:33: Torbutton 1.1.14-alpha has been released at https://torbutton.torproject.org/dev/. Hello Mike, Installation link at https://torbutton.torproject.org/dev/, namely http://torbutton.torproject.org/dev/torbutton-current-alpha.xpi has HTTP access schema even

Re: Scripted exclusion of nodes? [Was: How to remove some useless nodes]

2008-01-28 Thread Vlad SATtva Miller
F. Fox wrote on 29.01.2008 00:54: Kraktus wrote: You can add ExcludeNodes NodeName1, NodeName2 to your torrc, where the NodeName1, etc. are the names of Chinese exit nodes that you are aware of. However, you much disallow each Chinese node separately; you can't exclude by country. (snip)

Input required on Secure Wiki project

2008-01-14 Thread Vlad SATtva Miller
Hi guys, I'm currently working on the new project of tightly secured collabo- rative/wiki environment software with some neat features, e.g. GnuPG server-side integration for users' signatures verification and display on page revisions, comments and so on. Another major goal is censorship

Re: Encrypted Web Pages?

2007-12-18 Thread Vlad SATtva Miller
Martin Fick wrote on 18.12.2007 01:05: --- Vlad \SATtva\ Miller [EMAIL PROTECTED] wrote: Have you looked at FireGPG Firefox extension? http://firegpg.tuxfamily.org/ --- Alexander W. Janssen [EMAIL PROTECTED] wrote: Why not simply use the Firegpg-extension for Firefox? I had

Re: heise online: Klarstellung

2007-12-18 Thread Vlad SATtva Miller
Eugen Leitl wrote on 17.12.2007 20:38: Log-free? If Tor doesn't log, your firewall'd better. You want to be your nodes not attributable to you, wait until 20090101, then go malware. I mean, if running Tor without logs after 20090101 is illegal, then what else do you have to lose? You're a

Re: Encrypted Web Pages?

2007-12-17 Thread Vlad SATtva Miller
Michael Holstein wrote on 17.12.2007 23:01: I'm not a mathematician, but it can't be wise to store multiple copies of the same plaintext encrypted by the same cipher using different keys .. much crypto has historically been broken that way. As a side note: In the context of OpenPGP you have to

Re: Encrypted Web Pages?

2007-12-17 Thread Vlad SATtva Miller
Martin Fick wrote on 17.12.2007 23:25: I am surprised that HTML does not seem to have some extension to deal with this already. It is not much different from encrypted email concepts, just that the browser needs the ability to do the decrypting instead of your mail program. The

Re: Encrypted Web Pages?

2007-12-15 Thread Vlad SATtva Miller
Martin Fick wrote on 15.12.2007 11:08: Hi, I have what may perhaps seem like a strange question. Is there any commonly used software for encrypting and decrypting web pages? Let me explain that a little better: imagine a web site which has content destined for specific individuals.

Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-07 Thread Vlad SATtva Miller
Scott Bennett wrote on 05.12.2007 04:14: I have not run a tor server, so I do not know the exact requirements. Can it be done from a ram drive? It could, but you'd need to make sure it doesn't swap/page down to disk, which would be bad. I'm not a LINUX user, but I would be surprised if

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-15 Thread Vlad \SATtva\ Miller
coderman wrote on 14.09.2007 06:39: On 9/13/07, scar [EMAIL PROTECTED] wrote: ... so, if we are using a website that uses HTTPS, but, in firefox, for example, in the cookies list under that website it shows Send for: any type of connection, then the session is vulnerable? vulnerable

Re: new TOR seems excessively chatty

2007-05-05 Thread Vlad \SATtva\ Miller
Roger Dingledine wrote on 05.05.2007 15:22: On Sat, May 05, 2007 at 01:50:23AM -0400, Freemor wrote: I recently upgraded totor 0.1.2.13-2~dapper and although it works very nicely it seems very chatty. by chatty I mean download 200+ KB every minute from DIR servers. That's gonna add up to a

Re: [Fwd: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed]

2007-04-14 Thread Vlad \SATtva\ Miller
Roger Dingledine wrote on 13.04.2007 23:50: On Fri, Apr 13, 2007 at 03:24:40PM +0700, Vlad SATtva Miller wrote: ...However none of the mentioned below router nicknames or fingerprints was found in the current local cache file. Original Message Subject: High-traffic

[Fwd: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed]

2007-04-13 Thread Vlad \SATtva\ Miller
...However none of the mentioned below router nicknames or fingerprints was found in the current local cache file. Original Message Subject: High-traffic Colluding Tor Routers in Washington, D.C. Confirmed Date: Thu, 12 Apr 2007 23:35:52 -0400 From: [EMAIL PROTECTED] To: [EMAIL

Re: CSV Tor IP-Lists

2006-12-27 Thread Vlad \SATtva\ Miller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 BlueStar88 wrote on 26.12.2006 00:52: Hello, Tor node ip lists as csv plaintext available here: https://torstat.xenobite.eu/tor_exitnodes.csv https://torstat.xenobite.eu/tor_allnodes.csv Great tool. How frequently is this list gets