-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey all,
So I worked a little more on this guide and I have worked out
(hopefully) all the bugs and kinks. Please try this guide out and let me
know how it works for you. This is still a beta thing so please be
careful and don't do anything you need s
Kyle Williams wrote:
> On Mon, Aug 24, 2009 at 6:18 AM, 7v5w7go9ub0o
> <7v5w7go9u...@gmail.com>wrote:
>
==
>>
>> 1. Which VM software are the most breakout proof, should an
>> attacker gain access with a root shell?
>>
>
> This is a tricky question which depends on your requirements. Befo
On Mon, Aug 24, 2009 at 6:18 AM, 7v5w7go9ub0o <7v5w7go9u...@gmail.com>wrote:
> But ISTM that small, optimized, hardened little VMs would be ideal -
> additionally protecting anonymity; perhaps reasonably allowing the use
> of JS on your browser within your browser VM.
>
Agreed.
>
>
> Your post
Ringo wrote:
> I would appreciate any feedback people have on this. This is just an
> idea and it's kind of beta, so don't use this unless you know what
> you're doing. PGP key at bottom of message
>
>
>
>
> More Secure Tor Browsing Through A Virtual Ma
doing. PGP key at bottom of message
> >
> >
> >
> >
> > More Secure Tor Browsing Through A Virtual Machine in Ubuntu
> >
>
>
> I've been trying to get Tor/Privoxy to work on an openSUSE guest in
> VirtualBox. I have the Tor and the Privoxy dae
On Wed, 2009-08-19 at 02:12 -0400, Ringo wrote:
> I would appreciate any feedback people have on this. This is just an
> idea and it's kind of beta, so don't use this unless you know what
> you're doing. PGP key at bottom of message
>
>
>
>
> More Secure
On Thu, Aug 20, 2009 at 9:05 AM, Curious
Kid wrote:
> ..
> How is entropy gathered in virtual machines? Will it tell you if there is not
> enough entropy to support unpredictable routing and encryption? (Or is that
> even an issue at all with Tor?)
hi Curious,
entropy in virtual machines can be
On Thu, Aug 20, 2009 at 9:05 AM, Curious Kid wrote:
> Please excuse my extreme ignorance.
>
> > Even if an attacker were to be able to gain
> > command-line access through a vulnerability in a program such as
> > Firefox, they still wouldn't be able to obtain the user's IP address,
> > look at th
Please excuse my extreme ignorance.
> Even if an attacker were to be able to gain
> command-line access through a vulnerability in a program such as
> Firefox, they still wouldn't be able to obtain the user's IP address,
> look at their file system, or gain access to any other
> personally-identif
It's a good base
> to start a project like what you describe, and is what we've been working on
> (quietly) for some time now. :)
> https://www.torproject.org/torvm/
> http://www.janusvm.com/tor_vm/
>
>
> - Kyle
>
> On Tue, Aug 18, 2009 at 11:12 PM, Ringo <
This is just an
> idea and it's kind of beta, so don't use this unless you know what
> you're doing. PGP key at bottom of message
>
>
>
>
> More Secure Tor Browsing Through A Virtual Machine in Ubuntu
>
> Whenever somebody uses the internet through Tor using
I would appreciate any feedback people have on this. This is just an
idea and it's kind of beta, so don't use this unless you know what
you're doing. PGP key at bottom of message
More Secure Tor Browsing Through A Virtual Machine in Ubuntu
Whenever somebody uses the internet th
12 matches
Mail list logo