Re: [tor-talk] pidgin and tor

2015-10-05 Thread coderman
On 9/29/15, Tempest wrote: > ... > another option to consider is whonix. https://whonix.org. it's a good > mitigation platform against potentially leaky aps. the primary problem with Pidgin is libpurple [ https://pidgin.im/news/security/ ] and a more appropriate mitigation would be Qubes isolatio

[tor-talk] Making TBB undetectable!

2015-10-05 Thread Spencer
Hi, Spencer: The various bits that define your fingerprint. sh-expires-12-2...@quantentunnel.de: Basically, the countermeasure against such behavior is to stick a cookie with an hash of your fingerprint to your browser and deny you, as soon as it no longer matches. Yes, but discrimination

Re: [tor-talk] Potential uses for the Tor network

2015-10-05 Thread z...@manian.org
Tor Hidden Services have a lot utility in the context of peer of peer networks. Consider how Tor and Hidden Services work in Bitcoin. 1. The user sets up a Hidden Service for their Bitcoin. https://github.com/bitcoin/bitcoin/blob/master/doc/tor.md 2. Once the user's node starts, the .onion addre

Re: [tor-talk] Potential uses for the Tor network

2015-10-05 Thread Moritz Bartl
On 10/04/2015 09:39 PM, Bryan Gwin wrote: > Is it possible for someone to design some software that can > utilize the Tor network (i.e. software that will allow users to communicate > with each other through the Tor Network allowing for private > conversations). Totally! "Tor" as core component s

Re: [tor-talk] Making TBB undetectable!

2015-10-05 Thread sh-expires-12-2...@quantentunnel.de
On Mon, Oct 05, 2015 at 02:14:11AM -0700, Spencer wrote: > The various bits that define your fingerprint. That makes only sense if you sync your clients requests to TrackHostExitsExpire, the effect on CDNs that stick lots of cookies to you, is that what happens to the folks in the cloudflare threa

[tor-talk] Redirects from exits

2015-10-05 Thread sh-expires-12-2...@quantentunnel.de
While using the exits EF8AFB7F6A040CBE0ABA2C5A76BE04D84524C56B~Heaven 184E9215A97F21323BF8661329FCB6F89305CDAC~QPgufmQMLX9T to i.e. http://www.freedesktop.org (and some academic sites) we observe occasionally strange behavior, like HTTP requests redirected from port 80 to 8123. I can't tell much

[tor-talk] Making TBB undetectable!

2015-10-05 Thread Spencer
Hi, Ben Tasker: The problem you have there, is what to randomize, The various bits that define your fingerprint. but natural's hard to fake No need to spoof traffic if using real fingerprint variables. When we're talking about making the browser unidentifiable as TBB, the very act

[tor-talk] Making TBB undetectable!

2015-10-05 Thread Spencer
Hi, Spencer: Is a 'Natural Fingerprint' like a clearnet fingerprint, in that it identifies you as a regular, >non-tor, internet user, making you part of the larger herd? behnaz Shirazi: I don't understand what do you mean by “clearnet fingerprint” ? I have been defining fingerprint as

[tor-talk] Accessing Cloudflare sites on TBB

2015-10-05 Thread Spencer
Hi, Malte: I don't know other people's browsing behaviour, but for me being able to read the cached content would have sufficed in 100% of cases. Yes. Text and image cache for me. Google makes it hard to get their cache content, it would be great if the other middleman made it easy :)