* on the Sun, Jun 30, 2013 at 06:18:01PM -0600, AK wrote:
That's why I'm setting up my own mail server at home. And also plan to
access it via web interface if using someone else's machine (like at
home). I would only allow web access via SSL and password, and only
show the emails of the last
Yesterday evening the German TV magazine ttt showed a
program about the darknet and Tor. Online there is a
recording available:
http://is.gd/eofnVF
Unfortunately only in German. But the page also provides a
German transcript of the TV program.
Regards,
Torland
In the case of access to e-mail from untrusted computer is convenient and
reliable to use one-time password authentication using e-codebook - mobile
Java applet for your phone. A one-time password is generated in response to
RAND, generated by the mail server. QR-code can be used. For example
Hi,
Thank you for raising this topic once again. Toying with the idea of
better email for quite some time, I think there's direct and practical
things you can offer,
i was thinking about pointing the mx record of the tld to a mail
server that is shared with other individuals. the server
is
Thank you for raising this topic once again. Toying with the idea of
better email for quite some time, I think there's direct and practical
things you can offer,
i was thinking about pointing the mx record of the tld to a mail
server that is shared with other individuals. the server
is
Sounds like for Germany and like countries/laws such servers should be limited
to no more than 10k users each to prevent that invasion.
From: Moritz Bartl mor...@torservers.net
To: tor-talk@lists.torproject.org
Sent: Monday, July 1, 2013 10:41 AM
Subject: Re:
Hi there,
I have a concern regarding exit nodes in Tor. In my mind it is possible
for an attacker to run a malicious exit server that gathers information
at the exit point. Of course, this does not compromise anonymity per se,
but it still can reveal sensitive data to malicious people. I
I have a concern regarding exit nodes in Tor. In my mind it is possible for
an attacker to run a malicious exit server that gathers information at the
exit point. Of course, this does not compromise anonymity per se, but it
still can reveal sensitive data to malicious people. I think the
There are malicious TOR Nodes, and you can't stop that from happening. But
it is up to the service providers to enable encryption on their servers,
removing the possibility that such data can be intercepted. You shouldn't
trust your information to be sent through a plaintext protocol to begin
What happens if JonDo certified mixes do things forbidden by certification?
Jimmy Chen:
If you want your exit nodes to be certified, it's probably best at this
time, to use JAP instead of TOR.
Or combine both, tunnel JonDo through Tor (user - Tor - JonDo). (Not
saying it's necessarily a good
I never said properly and ethically certified, did I.
On Jul 1, 2013 8:25 PM, adrelanos adrela...@riseup.net wrote:
What happens if JonDo certified mixes do things forbidden by certification?
Jimmy Chen:
If you want your exit nodes to be certified, it's probably best at this
time, to use
How about we eliminate the issue by pushing a campaign for every website to
offer an ssl option. It really should be the standard.
Anyone a marketing Guru or PR specialist?
On Tue, Jul 2, 2013 at 3:47 AM, Jimmy Chen m...@jimmychen.com wrote:
I never said properly and ethically certified, did
On 13-07-02 12:04 AM, Andrew F wrote:
How about we eliminate the issue by pushing a campaign for every website to
offer an ssl option. It really should be the standard.
Anyone a marketing Guru or PR specialist?
Please do support EFF in this initiative!
https://www.eff.org/encrypt-the-web
On Mon, Jul 1, 2013 at 4:12 PM, Praedor Tempus prae...@yahoo.com wrote:
Sounds like for Germany and like countries/laws such servers should be
limited to no more than 10k users each to prevent that invasion.
you should assume this number will always approach anything greater
than zero; and how
14 matches
Mail list logo