On 01/31/2015 11:53 PM, Seth wrote:
> On Sat, 31 Jan 2015 17:47:20 -0800, Mirimir wrote:
> I didn't make the claim, I just linked to it. If you want to
> challenge the claim, best take it up with the person making it.
Hey, no problem. But when I see misinformation, I say something.
> I think
On Sat, 31 Jan 2015 17:47:20 -0800, Mirimir wrote:
On 01/31/2015 11:12 AM, Patrick Schleizer wrote:
See also:
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
| you -> VPN/SSH -> Tor
|
| You can route Tor through VPN/SSH services. That might prevent
| your ISP etc from seeing tha
l.m:
> "Patrick Schleizer" wrote:
>> Being able to use the components, tor-launcher, Tor and pluggable
>> transports that come with the TBB tarball for system use on Debian.
> For
>> use without or with the Tor Browser. Being able to use these
> components,
>> without being forced to run Tor Browse
Whonix is an operating system focused on anonymity, privacy and
security. It's based on the Tor anonymity network, Debian GNU/Linux and
security by isolation.
The project exists since 2012.
Learn more:
https://www.whonix.org
We are currently looking for a sponsor who is willing to donate a
suita
On 01/31/2015 10:03 AM, Seth wrote:
> On Fri, 30 Jan 2015 18:25:38 -0800, Mirimir wrote:
>> How is that any worse than adversaries correlating traffic between your
>> ISP and entry guards with traffic between exit nodes and destinations?
>
> He addresses VPNs and Tor about 45 min into the talk:
>
On 01/31/2015 11:12 AM, Patrick Schleizer wrote:
> See also:
> https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
| you -> VPN/SSH -> Tor
|
| You can route Tor through VPN/SSH services. That might prevent
| your ISP etc from seeing that you're using Tor (VPN/SSH
| Fingerprinting below).
spencer...@openmailbox.org wrote:
>Understanding very little about WebRTC and STUN servers, what does
this
>mean for people?
It means:
1) The network configuration of linux is more secure than the network
configuration of windows. Even when using a VPN. Unless the VPN drops
(and leaks).
2) If
"grarpamp" wrote:
>>Lara wrote:
>>I have a OpenWRT router. And I can install tor on that. I would like
to
>>have a middle relay. Can I hook up my TBB (computer linked over
wifi) to
>>that tor session? Is it a bad idea? It would be on the same
subnetwork.
>TBB likely deploys and expects a specific
"krishna e bera" wrote:
>They are tapping the cables and getting ip addresses of browsers,
then
>sharing that with other "intelligence" agencies. E.g. you could be
>stopped at the border if someone in your house clicked on a monitored
site.
>Another reason to use Tor (not an uppercased acronym) a
"Patrick Schleizer" wrote:
>Being able to use the components, tor-launcher, Tor and pluggable
>transports that come with the TBB tarball for system use on Debian.
For
>use without or with the Tor Browser. Being able to use these
components,
>without being forced to run Tor Browser.
Your main conce
See also:
https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Gavin Wahl:
>> I think the topic Bridge Firewall is also related here:
>>
> https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/BridgeFirewall
>
>
>>
>> (The topic didn't move there yet, but it's all very similar ideas
>> we're discussing here.)
>
> Isn't corridor exactly what that a
On Fri, 30 Jan 2015 18:25:38 -0800, Mirimir wrote:
How is that any worse than adversaries correlating traffic between your
ISP and entry guards with traffic between exit nodes and destinations?
He addresses VPNs and Tor about 45 min into the talk:
http://www.youtube.com/watch?v=9XaYdCdwiWU
Re
On 1/31/2015 at 11:13 AM, "aka" wrote:Hi,
I am using multiple Tor instances on the same machine and my CPU-usage
goes goes way up for a few seconds in exact one hour intervals. Is
this
regular behavior (generating new RSA keys?) or is it an anomaly of an
ongoing attack?
Every hour a new consensus
On Fri, 30 Jan 2015 18:25:38 -0800, Mirimir wrote:
How is that any worse than adversaries correlating traffic between your
ISP and entry guards with traffic between exit nodes and destinations?
He addresses VPNs and Tor about 45 min into the talk:
http://www.youtube.com/watch?v=9XaYdCdwiWU
Re
Hi,
I am using multiple Tor instances on the same machine and my CPU-usage
goes goes way up for a few seconds in exact one hour intervals. Is this
regular behaviour (generating new RSA keys?) or is it an anomaly of an
ongoing attack?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsu
On 01/30/2015 10:42 PM, grarpamp wrote:
> On Fri, Jan 30, 2015 at 9:25 PM, Mirimir wrote:
>> On 01/30/2015 06:19 PM, Seth wrote:
>>> If I remember correctly it has to do with the ability to correlate VPN
>>> traffic on the last 'leg' of the connection from you to your VPN
>>> provider vs traffic o
17 matches
Mail list logo