On 9/29/15, Tempest wrote:
> ...
> another option to consider is whonix. https://whonix.org. it's a good
> mitigation platform against potentially leaky aps.
the primary problem with Pidgin is libpurple [
https://pidgin.im/news/security/ ] and a more appropriate mitigation
would be Qubes isolatio
Hi,
Spencer:
The various bits that define your fingerprint.
sh-expires-12-2...@quantentunnel.de:
Basically, the countermeasure against such behavior is
to stick a cookie with an hash of your fingerprint
to your browser and deny you, as soon as it no longer
matches.
Yes, but discrimination
Tor Hidden Services have a lot utility in the context of peer of peer
networks.
Consider how Tor and Hidden Services work in Bitcoin.
1. The user sets up a Hidden Service for their Bitcoin.
https://github.com/bitcoin/bitcoin/blob/master/doc/tor.md
2. Once the user's node starts, the .onion addre
On 10/04/2015 09:39 PM, Bryan Gwin wrote:
> Is it possible for someone to design some software that can
> utilize the Tor network (i.e. software that will allow users to communicate
> with each other through the Tor Network allowing for private
> conversations).
Totally! "Tor" as core component s
On Mon, Oct 05, 2015 at 02:14:11AM -0700, Spencer wrote:
> The various bits that define your fingerprint.
That makes only sense if you sync your clients requests
to TrackHostExitsExpire, the effect on CDNs that stick
lots of cookies to you, is that what happens to the folks
in the cloudflare threa
While using the exits
EF8AFB7F6A040CBE0ABA2C5A76BE04D84524C56B~Heaven
184E9215A97F21323BF8661329FCB6F89305CDAC~QPgufmQMLX9T
to i.e. http://www.freedesktop.org (and some academic sites)
we observe occasionally strange behavior, like HTTP
requests redirected from port 80 to 8123.
I can't tell much
Hi,
Ben Tasker:
The problem you have there, is what to randomize,
The various bits that define your fingerprint.
but natural's hard to fake
No need to spoof traffic if using real fingerprint variables.
When we're talking about making the browser unidentifiable as TBB, the
very
act
Hi,
Spencer:
Is a 'Natural Fingerprint' like a clearnet fingerprint, in that it
identifies you as
a regular, >non-tor, internet user, making you part of the larger
herd?
behnaz Shirazi:
I don't understand what do you mean by “clearnet fingerprint” ?
I have been defining fingerprint as
Hi,
Malte:
I don't know other people's browsing behaviour, but for me being able
to
read the cached content would have sufficed in 100% of cases.
Yes. Text and image cache for me. Google makes it hard to get their
cache content, it would be great if the other middleman made it easy :)