Re: [tor-talk] Tor 'roots circuit' Logo

2015-06-22 Thread Virgil Griffith
Anything for you buttercup. https://svn.torproject.org/svn/projects/presentations/images/tor-logo-root-design.svg -V On Mon, Jun 22, 2015 at 5:07 PM, Jan GUTH prometh...@enn.lu wrote: Hello list, Does someone have any idea where I am able to find the 'roots-circuit' [0] logo in a higher

Re: [tor-talk] Tor-ramdisk 20150616 released

2015-06-22 Thread Anthony G. Basile
On 6/22/15 2:43 PM, Çağıl P. Şesto wrote: On Mon, Jun 22, 2015 at 10:58:44AM -0400, Anthony G. Basile wrote: operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the

Re: [tor-talk] (no subject)

2015-06-22 Thread Çağıl P . Şesto
On Sun, Jun 21, 2015 at 10:35:09PM -0700, Andy Iwanski wrote: I'm screwed. But it they ain't getting my money. My files weren't that valuable to me or anyone else. We can never let the terrorists win. See https://blog.torproject.org/category/tags/ransomware and beisdes that, it is

[tor-talk] Tor-ramdisk 20150616 released

2015-06-22 Thread Anthony G. Basile
Hi everyone I want to announce to the list that a new release of tor-ramdisk is out. Tor-ramdisk is a uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhanced by hardening the kernel and

Re: [tor-talk] do Cloudfare captchas ever work?

2015-06-22 Thread Joe Btfsplk
Thanks for the helpful replies. On 6/22/2015 9:36 AM, Çağıl P. Şesto wrote: A cdn like clouldflare can track you very easy over various exits, tor currently has 1115 relays that are exits, its possible to mark all of them malicious on a blacklist-providers sensor in 15-30 minutes. Is that

[tor-talk] Hidden service honeypot

2015-06-22 Thread bidet
This link is a hidden service honeypot. http://zkym3uprkoddlxpq.onion/ The landing page includes some javascript that looks shady. I couldn't understand the javascript or what it is trying to do exactly. I'm interested in knowing how this affects the tor browser and tails, and could this

[tor-talk] Battlemesh travel scholarships available

2015-06-22 Thread Mitar
Hi! (Please spread the word to those you think might be interested in the scholarship.) We are opening a call for sponsored travel to attend Battlemesh for anyone living outside Europe and would like to invite you to send your application! Battlemesh is the annual conference/gathering/hack event

Re: [tor-talk] do Cloudfare captchas ever work?

2015-06-22 Thread Colin Arnott
If these are the pirates you seek, I much prefer their hidden service, no captchas to be found: http://uj3wazyk5u4hnvtk.onion 22. Jun 2015 14:36 by secp...@abwesend.de: Anyway, funny is pirates are using cloudflare too, I consider them busy until they solve that problem. :) -- tor-talk

Re: [tor-talk] do Cloudfare captchas ever work?

2015-06-22 Thread Mansour Moufid
Sometimes I wonder if it's really Cloudflare, or some bad exit node running a CAPTCHA solving business. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] (no subject)

2015-06-22 Thread I
-Original Message- From: aiwan...@cox.net I'm screwed. But it they ain't getting my money. My files weren't that valuable to me or anyone else. We can never let the terrorists win. The term terrorism is now virtually useless and does not fit your situation.

[tor-talk] Important Information for TorBirdy Users: OS upgrade (might) results in failure to mask timezone (observed on Fedora20-21 Qubes OS R2)

2015-06-22 Thread torbirdyfoo
Hi, this is a (pre) information for TorBirdy users (and their developers). Bug Impact: Outbound emails disclose the actual timezone in the Date header (instead of using UTC regardless of actual OS timezone). This reveals a sender's raw location and more importantly allows attackers to link

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-22 Thread grarpamp
Longer reply may come, but I think it is useful to again say that it may be that you must disassociate the classical tor centric idea of fill away from the idea of filling the tor circuit. Of course any circuit level fill from end to end will still be visible. But if the network itself is doing

Re: [tor-talk] Hidden service honeypot

2015-06-22 Thread grarpamp
On Mon, Jun 22, 2015 at 6:36 PM, bi...@ruggedinbox.com wrote: The landing page includes some javascript that looks shady. ... I'm interested in knowing how this affects the tor browser and tails, and could this technique be used in other scenarios by different adversaries. If one thinks that

Re: [tor-talk] Tor-ramdisk 20150616 released

2015-06-22 Thread Çağıl P . Şesto
On Mon, Jun 22, 2015 at 04:05:57PM -0400, Anthony G. Basile wrote: Are you referring to cold boot attack? Not really, depending on memory controller and memorytype most of the data, especially ram based static stuff is easy to extract. If you put stuff into ram, I may find it in 6 of 10 cases.

Re: [tor-talk] do Cloudfare captchas ever work?

2015-06-22 Thread Çağıl P . Şesto
On Sat, Jun 20, 2015 at 09:30:11PM -0500, Joe Btfsplk wrote: Just to clarify (to all that replied) - I have JS enabled. At least, when trying to get captchas to work. Then, I'm using Tor Browser's default settings for NoScript. My observations and conclusions: - two captchas, both unreadable