On Mon, Aug 05, 2013 at 01:27:25AM -0400, grarpamp wrote:
> On Sun, Aug 4, 2013 at 12:42 AM, grarpamp wrote:
> > Noting what is apparently a very large drop in the number of onions
> > online. Still checking...
>
> Estimating dropout at about 400 onions or 1/3 of total.
How are you estimating 't
> How are you estimating 'total' here?
> (The way I'd do it is by running a bunch of relays with the HSDir flag,
> and approximating the total number of descriptor publishes based on the
> number that go to my relays.
That would be a good method if all you wanted was a number.
Yet since the dirs a
What is the status of Hidden Service development, at present? Are there still
no developers?
-wendell
grabhive.com | twitter.com/grabhive | gpg: 6C0C9411
On Aug 4, 2013, at 10:47 PM, Patrick wrote:
> For those who are curious, here's an in-depth guide to Freedom Hosting:
> http://www.dailydot.
> Hi, my name is Jamie, I am from Britain. We need your help TOR,
> recently David Cameron proposed a law (passed) which forces our ISP
> to filter websites containing material which his cabinet deems
> "unsuitable". This includes porn, violence, bulimia and anorexia
That is just the beginning. Ex
SUMMARY:
This is a critical security announcement.
An attack that exploits a Firefox vulnerability in JavaScript [1]
has been observed in the wild. Specifically, Windows users using the
Tor Browser Bundle (which includes Firefox plus privacy patches [2])
appear to have been targeted.
Hi Tor talk,
I noticed some of the minutes from the dev meeting in Europe, there was an
idea floated in the "Love for Volunteers" section about forming
geographically based user-groups around Tor.
https://trac.torproject.org/projects/tor/wiki/org/meetings/2013SummerDevMeeting/LoveForVolunteers
So
On 08/05/2013 06:13 PM, Roger Dingledine wrote:
> And finally, be aware that many other vectors remain for vulnerabilities
> in Firefox. JavaScript is one big vector for attack, but many other
> big vectors exist, like css, svg, xml, the renderer, etc.
If I understand it is possible to embed
Original Message
Subject: [guardian-dev] Replicating TorBB/Firefox exploit in Orweb/Webkit?
Date: Mon, 05 Aug 2013 12:33:33 -0400
From: Nathan of Guardian
To: Guardian Dev
Regarding the Tor security advisory
(https://lists.torproject.org/pipermail/tor-announce/2013-August/0
I'm interested in how tor has been affected and will be affected in the
coming weeks. Are there less users now that many onion sites
disappeared? More? Is there a decrease in bittorrent which I doubt. How
about the bandwidth is it 1/5 of what it was last week? etc
I'm curious if users or hidden se
Is anyone focusing on hidden services? I'd like to hear a status update, if
any is available, on the "Hidden Services need some love" post. I'm
interested in donating to the Tor project especially if my donation can be
earmarked to fund hidden service research and development. It should be
possible
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too vulnerable to trust?Watch the video below.
XKeyscore
http://www.youtube.com/wa
On 8/5/2013 1:29 PM, Andrew F wrote:
> Is Tor still Valid now that we know the nsa is actively exploiting holes in
> technology anonymity tools? We know that Tor and hidden services has
> issues, not to mention the whole fingerprinting problems.
>
> Is Tor too vulnerable to trust?Watch the vi
this may be a bit of a tangent to your firefox/TBB exploit question, but
it is an answer regarding the validity of TOR:
TOR is not designed to withstand global passive attackers. it tries to
select relays from different AS to create circuits that leave the area
of influence/surveillance of local p
ently, but is
there a reason why the Firefox update was removed?
thanks,
Bernard
[1] http://www.ei8fdb.org/upload/firefox_update-20130805-214206.png
[2] http://www.ei8fdb.org/upload/TBB_update-20130805-214323.png
- --
Bernard / bluboxthief / ei8f
* krugar wrote:
> cheers :S
I fully concur :-/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 08/05/2013 06:53 PM, Crypto wrote:
> On 8/5/2013 1:29 PM, Andrew F wrote:
>> Is Tor still Valid now that we know the nsa is actively exploiting holes in
>> technology anonymity tools? We know that Tor and hidden services has
>> issues, not to mention the whole fingerprinting problems.
>>
>> Is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 5 Aug 2013, at 21:45, Bernard Tyers - ei8fdb wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi,
>
> One curious question:
>
> In Firefox there is an auto-update option under advanced preferences. [1]
>
> TBB is based on Firefox
http://arstechnica.com/tech-policy/2013/08/researchers-say-tor-targeted-malware-phoned-home-to-nsa/
So...?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Crypto:
> On 8/5/2013 1:29 PM, Andrew F wrote:
>> Is Tor still Valid now that we know the nsa is actively
>> exploiting holes in technology anonymity tools? We know that Tor
>> and hidden services has issues, not to mention the whole
>> fingerprinting problems.
>>
>> Is Tor too vulnerable to trus
What do you think about new vidalia GUI features like:
***
(text between two () means the text for the user [while text between two
[] means the message for the developer] )
**
*
1. Refine Exit properties [by GUI modify the strictExitNodes in torrc]
+ by Country,
+ Country Flags,
+ FR
+
mirimir:
> With persistent entry guards, there are potentially records that
> correlate activity from multiple IP addresses (such as VPN exits or WiFi
> access points).
>
> What's the best way to reset entry guards? I find nothing in man tor or
> man torrc, or by searching the Tor Project wiki. Ed
Adrelanos,
Would the exploit have worked with Whonix?
On 08/05/2013 10:30 PM, adrelanos wrote:
> Crypto:
>> On 8/5/2013 1:29 PM, Andrew F wrote:
>>> Is Tor still Valid now that we know the nsa is actively
>>> exploiting holes in technology anonymity tools? We know that Tor
>>> and hidden services
andrfew:
> Adrelanos,
> Would the exploit have worked with Whonix?
For a discussion of this, please have a look at our forum:
https://whonix.org/wiki/Special:AWCforum/st/id50/Latest_javascript_exploit_againshtml
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or cha
On 08/05/2013 10:42 PM, Lunar wrote:
> mirimir:
>> With persistent entry guards, there are potentially records that
>> correlate activity from multiple IP addresses (such as VPN exits or WiFi
>> access points).
>>
>> What's the best way to reset entry guards? I find nothing in man tor or
>> man to
On 08/05/2013 06:53 PM, Crypto wrote:
On 8/5/2013 1:29 PM, Andrew F wrote:
Is Tor still Valid now that we know the nsa is actively exploiting holes in
technology anonymity tools? We know that Tor and hidden services has
issues, not to mention the whole fingerprinting problems.
Is Tor too vuln
This is one of the reasons I only use tails. As tails is a live cd every
time you boot up you get a fresh system. So any viruses are wiped away.
Of course they have already done there work in the last session. But with
windows.. every time you fire up Tor, they could be watching with this
explo
On 08/06/2013 05:20 AM, Andrew F wrote:
> This is one of the reasons I only use tails. As tails is a live cd every
> time you boot up you get a fresh system. So any viruses are wiped away.
> Of course they have already done there work in the last session. But with
> windows.. every time you fi
27 matches
Mail list logo