Re: [tor-talk] torbirdy default settings

2014-06-30 Thread farinet
Lunar schrieb: > The default port of the Tor Browser is 9150. Idea is that you start Tor > Browser and then start Thunderbird with Torbirdy. Makes sense? If so it makes sense. But, for me, an all machines where i installed tor (debian, ubuntu, arch) the tor config file (/etc/tor/torrc) always cam

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread grarpamp
On Sat, Jun 28, 2014 at 4:09 AM, Mirimir wrote: > On 06/28/2014 01:31 AM, grarpamp wrote: >> On Fri, Jun 27, 2014 at 5:32 PM, coderman wrote: >>> "From a Trickle to a Flood: Active Attacks on Several Mix Types" >>> http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf >> >> Pending a second rea

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread coderman
On Sun, Jun 29, 2014 at 4:53 PM, Mark McCarron wrote: > ... > We already know from the Snowden releases that the physical infrastructure > for this is in place. That it spans at least 33 nations covering all major > fiber links. Within the US, all traffic is copied verbatim at major > exchang

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...))

2014-06-30 Thread coderman
On Sun, Jun 29, 2014 at 5:58 PM, Seth David Schoen wrote: > ... > I wonder if there's a way to retrofit high-latency hidden services > onto Tor -- much as Pond does, but for applications other than Pond's > messaging application. i know that one mechanism i have used to some limited success is fr

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread coderman
On Sun, Jun 29, 2014 at 11:29 PM, grarpamp wrote: > ... > Even though I take certain issues with it, particularly the call to cease > development of anonymity platforms, a more formal examination is here: > > “A Review of the Available Content on Tor Hidden Services: The Case > Against Further Dev

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread grarpamp
> McMark wrote: > I have been examining the number of what would normally be deemed as illegal > sites sites on Tor. Even though I take certain issues with it, particularly the call to cease development of anonymity platforms, a more formal examination is here: “A Review of the Available Content

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Jon Tullett
On 29 June 2014 20:30, Mark McCarron wrote: > Mick, > > Congratulations, so you found someone with a similar name what are the odds > of that. Probably fairly good odds, I guess - it can't be that unusual a name. But just so we're clear: are you definitely not the same Mark McCarron who designed

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Mirimir
On 06/30/2014 12:29 AM, grarpamp wrote: >> McMark wrote: >> I have been examining the number of what would normally be deemed as illegal >> sites sites on Tor. > > Even though I take certain issues with it, particularly the call to cease > development of anonymity platforms, a more formal exami

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Jon Tullett
On 29 June 2014 21:45, Michael Wolf wrote: > > How do Snowden and the NSA slides titled "Tor Stinks" fit into your > little conspiracy theory? Conspiracy theory aside, I'm curious about these. I mean, p12: "How does TOR handle DNS requests?...still investigating". That seems remarkably clueless

[tor-talk] About Bandwidth thottling

2014-06-30 Thread saurav dahal
Hello, Does ISP throttles the Bandwidth which is donated to TOR network? For e.g. I am operating OR as an exit on 10 MegaBytes/s speed network. But when checking from atlas.torproject.org, it shows only 1MBps Advertised Bandwidth. Is it due to throttling of bandwidth by my ISP? I am running as ex

Re: [tor-talk] About Bandwidth thottling

2014-06-30 Thread Kristoffer Rath Hansen
Depends on what ISP you have, but also other factors such as connectivity to the bw auths and such On Jun 30, 2014 10:12 AM, "saurav dahal" wrote: > Hello, > > Does ISP throttles the Bandwidth which is donated to TOR network? For e.g. > I > am operating OR as an exit on 10 MegaBytes/s speed netwo

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread Spam 06
fari...@arcor.de: > So So, you read the documentation and you find out that the repositories have outdated software that can make the whole thing useless. The port was changed in the mean time. Anyway, that is one more reason to read the docs at the torproject.org site. And get the latest pack

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread Lars Luthman
On Mon, 2014-06-30 at 07:59 +0200, fari...@arcor.de wrote: > Lunar schrieb: > > > The default port of the Tor Browser is 9150. Idea is that you start Tor > > Browser and then start Thunderbird with Torbirdy. Makes sense? > > If so it makes sense. But, for me, an all machines where i installed to

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread farinet
Spam 06 schrieb: > So, you read the documentation and you find out that the repositories > have outdated software that can make the whole thing useless. The port > was changed in the mean time. Anyway, that is one more reason to read > the docs at the torproject.org site. And get the latest package

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread Spam 06
fari...@arcor.de: > Thanks. BUT: shortly said, i'm sitting here on a ppc based machine and > there is no ppc version in the tor repositories. So, i'm obliged to use > those of debian ... ;-) (I pinned them to use sid, so that i'll always > get the newer ones). Are you sure you want that? Unsecured

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Zenaan Harkness
OK, I'll bite :) On 6/30/14, Juan wrote: > On Sun, 29 Jun 2014 08:31:20 -0400 > Roger Dingledine wrote: > >> On Sun, Jun 29, 2014 at 12:19:56PM +0100, Mark McCarron wrote: >> > Given the scale of this obviousness, I can only assume that you're a >> >sock puppet for an intelligence agency who has

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread farinet
Spam 06: > Are you sure you want that? Unsecured is worse than not at all in this > particular case. Unless you care for a poor man's proxy. Possibly, i don't know (?). But there's no ppc version on the tor server ... Do you have another source? TIA -- tor-talk mailing list - tor-talk@lists.tor

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread farinet
Lars Luthman: > 9050 is the default for the stand-alone 'tor' program. The 'tor' that is > bundled with the Tor Browser uses 9150 to avoid conflicts with any > separately installed 'tor'. Thanks a lot for your patience. I got it now :D :D >From a pragmatic point of view, may be it's easier to cha

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Mark McCarron
Well, let's put this another way. On a planet, approaching almost 7 billion people, a network exists (Tor) that once had a substantial illegal content available (i.e. child porn, rape and snuff videos, etc.). Then governments, such as the UK government, announce GCHQ was to assist in cleaning

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Andreas Krey
On Mon, 30 Jun 2014 13:19:43 +, Mark McCarron wrote: ... > Then we also have Snowden, who informs of us PRISM. You mean the Snowden that also delivered an internal slide of NSA, stating that they are unable to break tor generally, only with some success for specific targets? Since that is wron

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread Geoff Down
On Mon, Jun 30, 2014, at 12:55 PM, fari...@arcor.de wrote: > Spam 06: > > Are you sure you want that? Unsecured is worse than not at all in this > > particular case. Unless you care for a poor man's proxy. > > Possibly, i don't know (?). But there's no ppc version on the tor server > ... Do you

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Zenaan Harkness
On 6/30/14, Mark McCarron wrote: ... > Tor appears to be... Mark, you may be right; but you have provided NO THING to enable me to verify ANY THING that you have said in THIS thread! > no one makes any moves to correct the situation So Mark, make a move already!! Your finger pointing IS offe

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Mark McCarron
No doubt Snowden's documents are a mixture of real and fake material. It would be standard practice to leave fud on the network to flush out leakers and those involved in espionage. What Snowden knows of this is questionable. The bottom line is that a solution must be implemented for end-to-en

[tor-talk] Hidden service 1024-bit

2014-06-30 Thread Fedor Brunner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 The TOR Hidden service uses 1024-bit long-term RSA key. According to this document it appears possible to break a 1024-bit RSA key in one year using a device whose cost is about $10M http://www.tau.ac.il/~tromer/papers/cbtwirl.pdf According to "

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread tor
This is wrong in so many ways. Edward Snowden's info, hand-in-hand with Prism's details, shows how NSA/GCHQ hates Tor because they can't break it very well. They have to exploit browser flaws and/or go around Tor to get what they want. If they owned Tor from the network perspective there woul

Re: [tor-talk] About Bandwidth thottling

2014-06-30 Thread saurav dahal
So does it mean that if a node is far from directory authority then the advertised bw of that node is always low. In this case that node can't donate the bw it is willing to donate. On Jun 30, 2014 6:11 PM, "Kristoffer Rath Hansen" wrote: > Depends on what ISP you have, but also other factors suc

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread mick
On Sun, 29 Jun 2014 19:30:35 +0100 Mark McCarron allegedly wrote: > > Congratulations, so you found someone with a similar name what are > the odds of that. So. Can I take that as a "no" then? You are not that same Mark McCarron? Mick --

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread mick
On Mon, 30 Jun 2014 10:05:06 -0400 t...@t-3.net allegedly wrote: > > I have a hard time believing that you've been effectively tracking so > much 'child porn, rape, snuff videos' content that you can > conclusively say that all such content has suddenly disappeared from > Tor. My knowledge abou

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Mark McCarron
Mick, I would be very careful what you claim in your emails. I have the capability of suing you into oblivion, that email constitutes defamation. Nothing like that was ever said, either retract it or I will take you for everything that you've got. Your choice. Regards, Mark McCarron Date:

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Morgan Smith
On 6/28/2014 10:01 AM, Mark McCarron wrote: > Anyway, we have a simple solution to this global view and hidden services. > We just implement a distributed hosting solution within the Tor system and > end-to-end visibility is gone. I'm nowhere near done sifting through this thread however Freenet

[tor-talk] Intersection of Projects [Illegal Activity As Security and Anonymity Metric]

2014-06-30 Thread grarpamp
In a long thread starting here: https://lists.torproject.org/pipermail/tor-talk/2014-June/033406.html On Mon, Jun 30, 2014 at 3:22 PM, Morgan Smith wrote: > On 6/28/2014 10:01 AM, Mark McCarron wrote: >> Anyway, we have a simple solution to this global view and hidden services. >> We just imple

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

2014-06-30 Thread Bobby Brewster
They are identified as a person of interest by visiting target_website.com (where target_website.com might be an 'extremist' site or a webmail box that has attracted attention) and then *in real time* code injection and redirection can be used to attack the person's computer. So 'ident

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread grarpamp
On Mon, Jun 30, 2014 at 2:15 AM, coderman wrote: > 1) compute the cost of global traffic analysis. we have big data mark > specifically UPSTREAM model collection at backbone peering points. > this is just one part of a series of costs; how much raw DPI capacity > (it is finite)? how much memory

Re: [tor-talk] torbirdy default settings

2014-06-30 Thread farinet
Geoff Down: > To be clear, no ppc version of what? There's a source tarball of Tor. I see. In any case, in the debian repositories i find the the 0.2.4.22 version the same as the stable on the tor download page. Is there any reason to not have confidence to the debian repositories? TIA -- tor-ta

Re: [tor-talk] Bruce Schneier's Guardian Article about N_S_A and Tor.

2014-06-30 Thread Geoff Down
On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote: > > But how can the person's computer be identified since all that is seen is > the connection between the exit node and the destination > target_website.com > > The point, surely, is that real time code injection should not be > possibl

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread Mark McCarron
Christopher, That's a very selective reading and I don't particularly care what you think. For the record, this is what was stated: "Basically, I keep a track of site numbers year-on-year, site availability from 3rd party monitoring and read comments on forums and chat. From what I can gathe

[tor-talk] Report of Pervasive Active MiTM Attack Against Hidden Services

2014-06-30 Thread Rich Jones
Has anybody responded to this claim yet? http://s7kgnncq3zbe3yza.onion/windex.shtml#mitm I don't understand how such an attack would be possible without decrypting the traffic, unless this is actually a phishing-and-proxy attack and not a "true" MiTM. (How would an MiTM be able to manipulate traff

Re: [tor-talk] Report of Pervasive Active MiTM Attack Against Hidden Services

2014-06-30 Thread grarpamp
On Mon, Jun 30, 2014 at 8:40 PM, Rich Jones wrote: > Has anybody responded to this claim yet? > http://s7kgnncq3zbe3yza.onion/windex.shtml#mitm > > the traffic, unless this is actually a phishing-and-proxy attack and not a It's entirely a userland link phishing to proxy game. It's been going on f

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-30 Thread krishna e bera
(tl;dr: humor, no content) On 14-06-30 02:14 PM, Mark McCarron wrote: > Mick, > > I would be very careful what you claim in your emails. I have the capability > of suing you into oblivion, that email constitutes defamation. Nothing like > that was ever said, either retract it or I will take y

[tor-talk] About Bandwidth rate, burst and observed.

2014-06-30 Thread saurav dahal
In atlas.torproject.org, I saw Bandwidth rate, burst and observed. Can anybody please explain these terms with the following example: Nickname IPredator *Bandwidth values* Bandwidth rate: 1073.74 MB/S Bandwidth burst: 2097.15 MB/S Observed Bandwidth: 60.15 MB/S Advertised Bandwidth: 60.15 M