Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Mike Cardwell
* on the Sun, Jun 30, 2013 at 06:18:01PM -0600, AK wrote: That's why I'm setting up my own mail server at home. And also plan to access it via web interface if using someone else's machine (like at home). I would only allow web access via SSL and password, and only show the emails of the last

[tor-talk] Main German TV ARD reports about Tor

2013-07-01 Thread tor-admin
Yesterday evening the German TV magazine ttt showed a program about the darknet and Tor. Online there is a recording available: http://is.gd/eofnVF Unfortunately only in German. But the page also provides a German transcript of the TV program. Regards, Torland

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Van Gegel
In the case of access to e-mail from untrusted computer is convenient and reliable to use one-time password authentication using e-codebook - mobile Java applet for your phone. A one-time password is generated in response to RAND, generated by the mail server. QR-code can be used. For example

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Moritz Bartl
Hi, Thank you for raising this topic once again. Toying with the idea of better email for quite some time, I think there's direct and practical things you can offer, i was thinking about pointing the mx record of the tld to a mail server that is shared with other individuals. the server is

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread alice-tor
Thank you for raising this topic once again. Toying with the idea of better email for quite some time, I think there's direct and practical things you can offer, i was thinking about pointing the mx record of the tld to a mail server that is shared with other individuals. the server is

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread Praedor Tempus
Sounds like for Germany and like countries/laws such servers should be limited to no more than 10k users each to prevent that invasion. From: Moritz Bartl mor...@torservers.net To: tor-talk@lists.torproject.org Sent: Monday, July 1, 2013 10:41 AM Subject: Re:

[tor-talk] safety of exit nodes

2013-07-01 Thread anonymous . coward
Hi there, I have a concern regarding exit nodes in Tor. In my mind it is possible for an attacker to run a malicious exit server that gathers information at the exit point. Of course, this does not compromise anonymity per se, but it still can reveal sensitive data to malicious people. I

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread grarpamp
I have a concern regarding exit nodes in Tor. In my mind it is possible for an attacker to run a malicious exit server that gathers information at the exit point. Of course, this does not compromise anonymity per se, but it still can reveal sensitive data to malicious people. I think the

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
There are malicious TOR Nodes, and you can't stop that from happening. But it is up to the service providers to enable encryption on their servers, removing the possibility that such data can be intercepted. You shouldn't trust your information to be sent through a plaintext protocol to begin

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread adrelanos
What happens if JonDo certified mixes do things forbidden by certification? Jimmy Chen: If you want your exit nodes to be certified, it's probably best at this time, to use JAP instead of TOR. Or combine both, tunnel JonDo through Tor (user - Tor - JonDo). (Not saying it's necessarily a good

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Jimmy Chen
I never said properly and ethically certified, did I. On Jul 1, 2013 8:25 PM, adrelanos adrela...@riseup.net wrote: What happens if JonDo certified mixes do things forbidden by certification? Jimmy Chen: If you want your exit nodes to be certified, it's probably best at this time, to use

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread Andrew F
How about we eliminate the issue by pushing a campaign for every website to offer an ssl option. It really should be the standard. Anyone a marketing Guru or PR specialist? On Tue, Jul 2, 2013 at 3:47 AM, Jimmy Chen m...@jimmychen.com wrote: I never said properly and ethically certified, did

Re: [tor-talk] safety of exit nodes

2013-07-01 Thread krishna e bera
On 13-07-02 12:04 AM, Andrew F wrote: How about we eliminate the issue by pushing a campaign for every website to offer an ssl option. It really should be the standard. Anyone a marketing Guru or PR specialist? Please do support EFF in this initiative! https://www.eff.org/encrypt-the-web

Re: [tor-talk] Secure email with limited usable metadata

2013-07-01 Thread coderman
On Mon, Jul 1, 2013 at 4:12 PM, Praedor Tempus prae...@yahoo.com wrote: Sounds like for Germany and like countries/laws such servers should be limited to no more than 10k users each to prevent that invasion. you should assume this number will always approach anything greater than zero; and how