[tor-talk] Hidden Convergence Notary

2011-10-19 Thread AntiTree
ore detail: http://www.antitree.com/projects/convergence/ - - Convergence Github site including my listing: https://github.com/moxie0/Convergence/wiki/Notary-list-:--share-and-find-no taries! AntiTree -BEGIN PGP SIGNATURE- Charset: utf-8 wj8DBQFOnv4YzoSux/204X0

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread AntiTree
Can anyone from the Tor Project jump in to say whether these guys have reached out or not? We should be concerned about another CCC-style "0-day" presentation where they find a legitimate vulnerability that could have been patched prior, but are using it as a PR stunt to boost book sales as oppose

Re: [tor-talk] Bug of torproject's server?

2014-07-06 Thread AntiTree
Looks like you have "Torproject" instead of your distro name. This should be "lucid" or whatever is the name of your distro. https://www.torproject.org/docs/debian.html.en On Sun, Jul 6, 2014 at 3:36 PM, ttzeqq wrote: > When I tried to reach debs from torproject's server, I got this: > > http:/

[tor-talk] Raspberry Bridge Project

2014-07-13 Thread AntiTree
, hardened OS with temporal logging - keeps obfsproxy up to date on a regular basis I'd put it all on github but it's about 200mb. So everything besides debian is on there. * Source code for custom scripts: https://github.com/antitree/tor-raspberry-pi-build-scripts * Design Docum

Re: [tor-talk] Black Hat USA 2014 will show how to break anonimity in Tor network

2014-07-13 Thread AntiTree
Yes, it's been discussed https://lists.torproject.org/pipermail/tor-talk/2014-July/033664.html On Sun, Jul 13, 2014 at 2:27 PM, ceftrax wrote: > Alexánder Volynkin and Michael McCord will give a presentation about how > to destroy the anonimity in Tor network in Black Hat USA 2014: > > > https:

Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-23 Thread AntiTree
I don't know the anti-spyware tool that you used nor details about what the tool deems a "screenshot" but I want to point out that in Windows (especially older versions) one of the entropy sources for OpenSSL is the screenshot of your current session[1]. So if the Tor Browser needs to generate keys

Re: [tor-talk] New SSLv3 attack: Turn off SSLv3 in your TorBrowser

2014-10-15 Thread AntiTree
> > Someone somewhere (I think Mike Perry quoting AGL) mentioned today that > we'd only be > breaking 0.3% of the internet if we do this. > My fact checker 9000 looked into this[1]. the 0.3% is probably close but here are a few stats per Zmap and Alexa - of the top 1 Million domains, 0.02% have S

Re: [tor-talk] Facebook brute forcing hidden services

2014-10-31 Thread AntiTree
There are a lot of tools out there that generate vanity hidden service addresses. Facebook merely used something like Shallot [1], or they purchased the hidden service address off of one of the domain brokers that are hosted as a hidden service. Generating an address does not mean cracking an addre

Re: [tor-talk] Facebook brute forcing hidden services

2014-10-31 Thread AntiTree
It appears that someone has been issued a facebookcorewwwi.onion cert from another CA as .onion has no way of verifying a collision. https://news.ycombinator.com/item?id=8538527 On Fri, Oct 31, 2014 at 12:12 PM, Andreas Krey wrote: > On Fri, 31 Oct 2014 16:49:38 +, AFO-Admin wrote: > ... >> H

[tor-talk] WebRTC to uncover local IP

2015-01-28 Thread AntiTree
This PoC has made its ways around. Using webRTC to deanonomize your IP. New to me: https://diafygi.github.io/webrtc-ips/ @ -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] corridor, a Tor traffic whitelisting gateway

2015-02-04 Thread AntiTree
It appears the repo has moved or been deleted? https://github.com/rustybird/ corridor Is this on purpose while addressing the issue that Gavin brings up? On Wed Feb 04 2015 at 5:54:43 PM Gavin Wahl wrote: > > https://github.com/rustybird/corridor/#pitfalls > > > corridor cannot prevent malware

[tor-talk] Cables Secure Anonymous Communications

2013-11-16 Thread AntiTree
yntax] This is an interesting project that attempts to leverage Tor hidden services to share communications and X.509 certificates to verify identity. I'm wondering if anyone has looked into this on the list. More info: http://dee.su/cables AntiTree -- tor-talk mailing list

Re: [tor-talk] Cables Secure Anonymous Communications

2013-11-19 Thread AntiTree
eremy > > > On Sat, Nov 16, 2013 at 11:22:21PM -0500, AntiTree wrote: > > I'm a bit late to the party, but I was taking a look at the Cables > project > > form the Liberte Linux distro. Here is the project page: > > https://github.com/mkdesu/cables >

[tor-talk] Tor Workshop at a Con

2014-03-13 Thread AntiTree
cting with the control port, using some of the less popular torrc options, and getting started with Stem. Then going into how Tails is made. Feel free to reach out off-list if you'd like. Thanks AntiTree 1. https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/not

[tor-talk] Private Tor Network with Docker

2016-06-25 Thread AntiTree
Similar to Chutney and Shadow, I made a Docker image and compose file to spin up a private tor network instance spread across multiple containers. It can scale up to (AFAIK) any size you want. I'm looking for feedback if someone wants to try it out. Source: https://github.com/antitree/privat