ore detail:
http://www.antitree.com/projects/convergence/
- - Convergence Github site including my listing:
https://github.com/moxie0/Convergence/wiki/Notary-list-:--share-and-find-no
taries!
AntiTree
-BEGIN PGP SIGNATURE-
Charset: utf-8
wj8DBQFOnv4YzoSux/204X0
Can anyone from the Tor Project jump in to say whether these guys have
reached out or not?
We should be concerned about another CCC-style "0-day" presentation where
they find a legitimate vulnerability that could have been patched prior,
but are using it as a PR stunt to boost book sales as oppose
Looks like you have "Torproject" instead of your distro name. This should
be "lucid" or whatever is the name of your distro.
https://www.torproject.org/docs/debian.html.en
On Sun, Jul 6, 2014 at 3:36 PM, ttzeqq wrote:
> When I tried to reach debs from torproject's server, I got this:
>
> http:/
, hardened OS with temporal logging
- keeps obfsproxy up to date on a regular basis
I'd put it all on github but it's about 200mb. So everything besides debian
is on there.
* Source code for custom scripts:
https://github.com/antitree/tor-raspberry-pi-build-scripts
* Design Docum
Yes, it's been discussed
https://lists.torproject.org/pipermail/tor-talk/2014-July/033664.html
On Sun, Jul 13, 2014 at 2:27 PM, ceftrax wrote:
> Alexánder Volynkin and Michael McCord will give a presentation about how
> to destroy the anonimity in Tor network in Black Hat USA 2014:
>
>
> https:
I don't know the anti-spyware tool that you used nor details about what the
tool deems a "screenshot" but I want to point out that in Windows
(especially older versions) one of the entropy sources for OpenSSL is the
screenshot of your current session[1]. So if the Tor Browser needs to
generate keys
>
> Someone somewhere (I think Mike Perry quoting AGL) mentioned today that
> we'd only be
> breaking 0.3% of the internet if we do this.
>
My fact checker 9000 looked into this[1]. the 0.3% is probably close but
here are a few stats per Zmap and Alexa
- of the top 1 Million domains, 0.02% have S
There are a lot of tools out there that generate vanity hidden service
addresses. Facebook merely used something like Shallot [1], or they
purchased the hidden service address off of one of the domain brokers that
are hosted as a hidden service. Generating an address does not mean
cracking an addre
It appears that someone has been issued a facebookcorewwwi.onion cert
from another CA as .onion has no way of verifying a collision.
https://news.ycombinator.com/item?id=8538527
On Fri, Oct 31, 2014 at 12:12 PM, Andreas Krey wrote:
> On Fri, 31 Oct 2014 16:49:38 +, AFO-Admin wrote:
> ...
>> H
This PoC has made its ways around. Using webRTC to deanonomize your IP. New
to me: https://diafygi.github.io/webrtc-ips/
@
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
It appears the repo has moved or been deleted? https://github.com/rustybird/
corridor
Is this on purpose while addressing the issue that Gavin brings up?
On Wed Feb 04 2015 at 5:54:43 PM Gavin Wahl wrote:
> > https://github.com/rustybird/corridor/#pitfalls
> > > corridor cannot prevent malware
yntax]
This is an interesting project that attempts to leverage Tor hidden
services to share communications and X.509 certificates to verify identity.
I'm wondering if anyone has looked into this on the list.
More info: http://dee.su/cables
AntiTree
--
tor-talk mailing list
eremy
>
>
> On Sat, Nov 16, 2013 at 11:22:21PM -0500, AntiTree wrote:
> > I'm a bit late to the party, but I was taking a look at the Cables
> project
> > form the Liberte Linux distro. Here is the project page:
> > https://github.com/mkdesu/cables
>
cting with the control port, using some of the less popular
torrc options, and getting started with Stem. Then going into how
Tails is made.
Feel free to reach out off-list if you'd like.
Thanks
AntiTree
1.
https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/not
Similar to Chutney and Shadow, I made a Docker image and compose file to
spin up a private tor network instance spread across multiple containers.
It can scale up to (AFAIK) any size you want. I'm looking for feedback if
someone wants to try it out.
Source: https://github.com/antitree/privat
15 matches
Mail list logo