Max Bond wrote:
Organized criminals will probably achieve better operational security
by
conducting themselves in the real world as much as possible. This is
not an
option available to a lone dissident in an oppressed country.
Indeed. There's a great quote from Eliot Spitzer, who used to be
On Sat, Jun 06, 2015 at 04:20:22PM -0400, Charlie Belmer wrote:
> I always took it to mean using malware infected hosts, rootkits, and C&C
> servers to do the dirty work, which not only makes you hard to trace, but
> can also point investigations at the infected host.
>
> On Sat, Jun 6, 2015 at 4:
On 06/06/2015 02:20 PM, Charlie Belmer wrote:
> I always took it to mean using malware infected hosts, rootkits, and C&C
> servers to do the dirty work, which not only makes you hard to trace, but
> can also point investigations at the infected host.
Or Hola Premium ;)
> On Sat, Jun 6, 2015 at 4:
On 06/06/15 18:50, torl...@ruggedinbox.com wrote:
> I'm trying to understand what these options are and why don't we
> non-criminal tech savvy people have some of these better options?
>
> Is this just talking about the option of using encrypted botnets, or are
> there other additional options tha
I always took it to mean using malware infected hosts, rootkits, and C&C
servers to do the dirty work, which not only makes you hard to trace, but
can also point investigations at the infected host.
On Sat, Jun 6, 2015 at 4:16 PM, Max Bond wrote:
> Organized criminals will probably achieve bette
Organized criminals will probably achieve better operational security by
conducting themselves in the real world as much as possible. This is not an
option available to a lone dissident in an oppressed country.
On Sat, Jun 6, 2015 at 11:50 AM, wrote:
> Hello...
>
> I'm an avid tor lover and user
Hello...
I'm an avid tor lover and user.
I'm trying to understand a statement I've heard a number of people on the
Tor team and in the Tor community repeat over the years and was wondering
if it could be explained.
The statement: Paraphrasing, it's been said several times, by Roger, etc,
that...
On 6/6/2015 8:56 AM, Артур Истомин wrote:
On Fri, Jun 05, 2015 at 09:06:32PM -0500, Joe Btfsplk wrote:
Don't know much about Disconnect, except what their Privacy Policy states.
(and that they are a U.S. company?)
https://disconnect.me/privacy
3. We share your personal info only when legally re
On Fri, Jun 05, 2015 at 09:06:32PM -0500, Joe Btfsplk wrote:
> Don't know much about Disconnect, except what their Privacy Policy states.
> (and that they are a U.S. company?)
> https://disconnect.me/privacy
>
> 3. We share your personal info only when legally required, or when
> reasonably necess
On Fri, Jun 05, 2015 at 09:06:32PM -0500, Joe Btfsplk wrote:
> Don't know much about Disconnect, except what their Privacy Policy states.
> (and that they are a U.S. company?)
> https://disconnect.me/privacy
Yes, they are US company.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To uns
On Fri, Jun 05, 2015 at 09:06:32PM -0500, Joe Btfsplk wrote:
> Don't know much about Disconnect, except what their Privacy Policy states.
> (and that they are a U.S. company?)
> https://disconnect.me/privacy
>
> 3. We share your personal info only when legally required, or when
> reasonably necess
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> I'd like to properly understand the implications of tor's
> 'NodeFamily' config option and if there is a DirAuth enforcable
> config option similar to this client side option (something I did
> not find in the man page yet).
>
> names convention
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I'd like to properly understand the implications of tor's 'NodeFamily'
config option and if there is a DirAuth enforcable config option
similar to this client side option (something I did not find in the
man page yet).
names convention I'm usin
13 matches
Mail list logo