On Mon, 01 Jul 2013 22:18:06 +, coderman wrote:
...
you should assume this number will always approach anything greater
than zero; and how do you handle a reduction? axe clients without
prejudice?
Put new clients into the next instance of this service, formally
operated by someone else?
Do governments already have a 1M bit Quantum Annealer (like the DWave),
capable of breaking RSA and ECC?
Well, there's an open source implementation, NTRU, which is not known to be
susceptible to Shor's algorithm (and by extension Quantum Computation),
being lattice-based.
- Forwarded Message -
Hi,
I just installed the 3.0alpha2 release. It's working great! Thanks so much
for this update!
1. Could we make - duckduckgo.com - default search engine? Especially in the
address/location bar. It requires keyword.URL to be set as
Hi all,
does anyone made a technical analysis to understand whenever would be
possible to have Tor running on upcoming FirefoxOS ?
https://people.mozilla.com/~myk/r2d2b2g/
-naif
___
tor-talk mailing list
tor-talk@lists.torproject.org
On 07/02/2013 09:26 AM, Fabio Pietrosanti (naif) wrote:
does anyone made a technical analysis to understand whenever would be
possible to have Tor running on upcoming FirefoxOS ?
https://people.mozilla.com/~myk/r2d2b2g/
We've talked to Mozilla multiple times about this possibility. They even
DER SPIEGEL has an article (german) about how to setup a Tor router
using Rasperry Pie:
http://is.gd/FhUEQ4
It is interesting to see how this kind of news reaches mainstream
media after the PRISM disclosure.
Regards,
Torland
___
tor-talk mailing
On Tue, 02 Jul 2013, Nathan Freitas wrote:
They said we must cross-compile any native code into Javascript. I am
not sure if that was meant to be a joke or not.
They are probably talking about using emscripten :
https://github.com/kripken/emscripten/wiki
Hi Hans Rüdiger,
I am concerned too, that there are malicious exit servers out there. That is
one of the reasons why I operate Exits. To make it less probable that the
malicious ones get the traffic.
Best regards,
Torland
On Tuesday 02 July 2013 01:39:22 anonymous.cow...@posteo.de wrote:
Hi
On 02/07/2013 11:20 AM, tor-admin wrote:
DER SPIEGEL has an article (german) about how to setup a Tor router
using Rasperry Pie:
http://is.gd/FhUEQ4
It is interesting to see how this kind of news reaches mainstream
media after the PRISM disclosure.
Regards,
Torland
This one is a wireless
On Mon, Jul 1, 2013 at 11:15 PM, Andreas Krey a.k...@gmx.de wrote:
...
Put new clients into the next instance of this service, formally
operated by someone else?
you say this like there's an inexhaustible supply of dedicated
individuals / volunteers able to administer a business entity /
Would there be a way to Freenet the service? Distribute it over many
servers...no one actually knowing what clients they have, perhaps not even how
many but operated over the tor network?
From: coderman coder...@gmail.com
To: tor-talk@lists.torproject.org
Il 7/2/13 4:36 PM, Ed Fletcher ha scritto:
http://learn.adafruit.com/onion-pi/overview
I'd like to see the reverse setup; connect to the RPi with the cable
and then to a wifi network using Tor. Most hotels only have wifi
these days, not a wired connection.
I would like to see major nerd
Nicolas Vigier bo...@mars-attacks.org wrote:
On Tue, 02 Jul 2013, Nathan Freitas wrote:
They said we must cross-compile any native code into Javascript. I am
not sure if that was meant to be a joke or not.
They are probably talking about using emscripten :
Hello all, please help me understanding this:
supposed, the NSA were able to break into a large scale of tor nodes, stealing
the tor private server key. At the same time they were able to gather all
traffic they can get. Wouldnt this increase the likelihood that data from
complete circuits can
Il 7/2/13 3:48 PM, Nathan Freitas ha scritto:
They said we must cross-compile any native code into Javascript. I am
not sure if that was meant to be a joke or not.
I am wondering if a Client-Only, lightweight Tor Library in Javascript
would be feasible, maybe considering SilverTunnel porting
thomas.hluch...@netcologne.de:
Hello all, please help me understanding this:
supposed, the NSA were able to break into a large scale of tor nodes,
stealing the tor private server key. At the same time they were able
to gather all traffic they can get. Wouldnt this increase the
likelihood
I am concerned too, that there are malicious exit servers out there. That is
one of the reasons why I operate Exits. To make it less probable that the
malicious ones get the traffic.
How can I see what route my data use? Vidalia shows a map, but it is not
that precise to my eyes. I read you
I see there are email services within the Tor network that are only
available with an *.onion URL. Can these services be used with a
standard email client like Thunderbird (and IMAP or POP3)? Do these
email services interact with the outside email world?
Thanks
R
signature.asc
Description:
On Tue, Jul 02, 2013 at 09:27:23PM +, anonymous coward wrote:
Hello,
I start Tor with Vidalia. And I use TorBirdy with Thunderbird.
Sometimes I see a message from Vidalia:
This is from the Vidalia log:
Jul 02 22:34:44.907 Application request to port 143: this port is
commonly used
Hello,
I start Tor with Vidalia. And I use TorBirdy with Thunderbird.
Sometimes I see a message from Vidalia:
This is from the Vidalia log:
Jul 02 22:34:44.907 Application request to port 143: this port is
commonly used for unencrypted protocols. Please make sure you don't send
anything you
tor-admin:
DER SPIEGEL has an article (german) about how to setup a Tor router
using Rasperry Pie:
http://is.gd/FhUEQ4
If they had the balls, they would operate a Tor exit relay! Maybe I
write this as a comment there.
Gruß
Rüdi
signature.asc
Description: OpenPGP digital signature
On 07/02/2013 02:02 PM, Fabio Pietrosanti (naif) wrote:
I am wondering if a Client-Only, lightweight Tor Library in Javascript
would be feasible, maybe considering SilverTunnel porting
https://silvertunnel.org ?
The problem in the past with silvertunnel, coffee onion, java-tor, etc,
has been
Roger Dingledine:
On Tue, Jul 02, 2013 at 09:27:23PM +, anonymous coward wrote:
Hello,
I start Tor with Vidalia. And I use TorBirdy with Thunderbird.
Sometimes I see a message from Vidalia:
This is from the Vidalia log:
Jul 02 22:34:44.907 Application request to port 143: this port
On Tue, Jul 2, 2013 at 5:39 PM, Nathan Freitas nat...@freitas.net wrote:
On 07/02/2013 02:02 PM, Fabio Pietrosanti (naif) wrote:
I am wondering if a Client-Only, lightweight Tor Library in Javascript
would be feasible, maybe considering SilverTunnel porting
https://silvertunnel.org ?
The
anonymous coward:
I start Tor with Vidalia. And I use TorBirdy with Thunderbird.
Sometimes I see a message from Vidalia:
This is from the Vidalia log:
Jul 02 22:34:44.907 Application request to port 143: this port is
commonly used for unencrypted protocols. Please make sure you don't
anonymous coward:
You should use port 993 (SSL/TLS) for all IMAP accounts if you want to
connect to your mail server over Tor. That is why it is the default
setting :)
Thunderbird try to circumvent Tor? Isn´t it just normal, TB tries
to connect to the imap server on its port?
No, it's not
Yes, they can.
I see there are email services within the Tor network that are only
available with an *.onion URL. Can these services be used with a
standard email client like Thunderbird (and IMAP or POP3)? Do these
email services interact with the outside email world?
Thanks
R
Hi,
This seems like the most appropriate Tor list for this issue, but move the
discussion if not...
This isn't a Tor bug, but rather a security problem that occurs to Tor users
due to an inadvertent anti-anonymity property of popular webpages.
Let's say you open webpage X, which automatically
On Tue, Jul 02, 2013 at 06:45:24PM -0700, Mark Yaler wrote:
Let's say you open webpage X, which automatically refreshes every
minute. But the user doesn't immediately realize this problem.
Variations of this attack are in various research papers, e.g.
On Tue, 02 Jul 2013 12:33:10 +, Mike Perry wrote:
...
But I got distracted by more pressing issues before I could finish the
scripts.. Also, many of those encrypted+authenticated Tor container
things probably don't make much sense without Secure Boot to
authenticate the boot process up
Nathan Freitas:
On 07/02/2013 09:26 AM, Fabio Pietrosanti (naif) wrote:
does anyone made a technical analysis to understand whenever would be
possible to have Tor running on upcoming FirefoxOS ?
https://people.mozilla.com/~myk/r2d2b2g/
We've talked to Mozilla multiple times about this
31 matches
Mail list logo