Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-25 Thread Ted Smith
On Thu, 2010-02-25 at 13:41 -0500, 7v5w7go9ub0o wrote: > On 02/24/10 23:16, Ted Smith wrote: > > On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote: > [] > >> Perhaps mention the benefits of TPM chips (on 'ix, they can be > >> configured to benefit the user, not some record company)? > >> > > Yu

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-25 Thread 7v5w7go9ub0o
On 02/24/10 23:16, Ted Smith wrote: > On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote: [] >> Perhaps mention the benefits of TPM chips (on 'ix, they can be >> configured to benefit the user, not some record company)? >> > Yup. Check out Trusted Grub if you're blessed with the appropriate > ha

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-24 Thread Ted Smith
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote: > On 02/24/10 00:10, Ringo wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA1 > > > > One update that should be noted is that this doesn't protect against > > "bad nanny" attacks. With full disk encryption, the boot partition isn't >

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-24 Thread 7v5w7go9ub0o
On 02/24/10 00:10, Ringo wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 One update that should be noted is that this doesn't protect against "bad nanny" attacks. With full disk encryption, the boot partition isn't encrypted (as you have to load it so it can ask for your passphrase and decr

Re: Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-23 Thread Ringo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 One update that should be noted is that this doesn't protect against "bad nanny" attacks. With full disk encryption, the boot partition isn't encrypted (as you have to load it so it can ask for your passphrase and decrypt the rest of the drive). If the

Create a SAFE TOR Hidden Service in a VM (Re: Please Help Me Test my Hidden Service Pt. 2)

2010-02-23 Thread 7v5w7go9ub0o
Good job! IMHO this is a very nice paper; well written! (Adjusted the title of this post a bit, in case the readers weren't aware your goal ) (FWIW, some might want to read the paper - to gain a lot of insight and background - and then download/test a copy of your (sanitized) .img file.

Re: Please Help Me Test my Hidden Service Pt. 2

2009-09-06 Thread Ringo
It's running Qemu on an Ubuntu 9.04 server. Ringo 7v5w7go9ub0o wrote: > Ringo wrote: >> Hey Torizens, >> >> I've set up another hidden service to test my virtual machine setup. My >> new address is http://3rrf4fqicqwl7amf.onion and you can access drupal >> (and create content) at http://3rrf4fqic

Re: Please Help Me Test my Hidden Service Pt. 2

2009-09-04 Thread Ringo
Nils Vogel wrote: "One thing tho: The content is a static HTML page, no drupal to be seen." Sorry, I mis-typed my original post. The drupal installation is at /drupal and I'm going to be putting moinmoin up at /wiki within the next day or so (maybe mediawiki as well). Thanks in advance to people

Re: Please Help Me Test my Hidden Service Pt. 2

2009-09-04 Thread Nils Vogels
Hey Ringo, On Fri, Sep 4, 2009 at 03:12, Ringo<2600den...@gmail.com> wrote: > Hey Torizens, > > I've set up another hidden service to test my virtual machine setup. My > new address is http://3rrf4fqicqwl7amf.onion and you can access drupal > (and create content) at http://3rrf4fqicqwl7amf.onion.

Please Help Me Test my Hidden Service Pt. 2

2009-09-03 Thread Ringo
Hey Torizens, I've set up another hidden service to test my virtual machine setup. My new address is http://3rrf4fqicqwl7amf.onion and you can access drupal (and create content) at http://3rrf4fqicqwl7amf.onion. If anybody uses this test machine to host illegal content (illegal in the US), I will