I was curious for Monero dev's rationale to pick I2P over Tor, and then even
forking I2P as Kovri.
Whatever I've seen online doesn't strike me as particularly convincing.
Is there published research in regards to deanonymization attacks against both
Tor
and I2P, and given the design changes
On Sun, Dec 25, 2016 at 12:32:33AM +0100, torphone 5x wrote:
> Hi,
>
> copperheados user here.
While speaking about CopperheadOS. The last supported tablet is Nexus 9.
Except, it's no longer supported by Google after October this year.
So actually not supported by anybody, really.
Pixel C
https://pay.reddit.com/r/Bitcoin/comments/2bwds2/what_does_the_worlds_fastest_tor_node_have_to_do/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/
SILVER BULLETS AND FAIRY TAILS
Introduction
This week we made mention on Twitter of a zero-day vulnerability we’ve
unearthed that affects the popular Tails operating system. As the Tails website
states:
Tails is a live
http://arstechnica.com/security/2014/07/tor-developers-vow-to-fix-bug-that-can-uncloak-users/
Tor developers vow to fix bug that can uncloak users
Weakness was topic of talk abruptly pulled from security conference.
by Dan Goodin - July 22 2014, 8:15pm CEST
Developers of the Tor privacy
https://www.techdirt.com/articles/20140721/11362227955/carnegie-mellon-kills-black-hat-talk-about-identifying-tor-users.shtml
Carnegie Mellon Kills Black Hat Talk About Identifying Tor Users -- Perhaps
Because It Broke Wiretapping Laws
from the questionable-legality dept
There's some buzz in
https://pay.reddit.com/r/TOR/comments/2b8oq3/please_read_if_you_usedepend_on_tor_never_before/
Please read if you use/depend on Tor. Never before seen FH information.
(self.TOR)
submitted 16 hours ago * by Deepthroat2 [+1]
Hello everyone, I have some information that I have been dying to share
Of potential interest to some Tor users here.
- Forwarded message from coderman coder...@gmail.com -
Date: Thu, 10 Jul 2014 17:29:42 -0700
From: coderman coder...@gmail.com
To: John Young j...@pipeline.com, cpunks cypherpu...@cpunks.org,
liberationtech
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote:
Does the NSA barter this database of suspicious extremists with
foreign services?
They do, according to Drake.
Certainly there are some friendly services eager to get their hands
on IP addresses
of NSA selected
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to
email that the echelon system was supposedly looking for. We
Apologies, not sure this has been posted already in the thread, I'm
backlogged.
https://rdns.im/court-official-statement-part-1
Court – Official statement part #1
Posted on July 2, 2014 by Will
As seen possibly here, or here i lost the Tor case and was sentenced to 3
years probation (instead
http://www.technologyreview.com/news/521856/group-thinks-anonymity-should-be-baked-into-the-internet-itself/
Group Thinks Anonymity Should Be Baked Into the Internet Itself
Following NSA surveillance revelations, talks advance on making the
privacy-protecting tool Tor an Internet standard.
By
On Tue, Oct 22, 2013 at 10:09:52PM +0600, Roman Mamedov wrote:
1).I think Cody Wilson is working on a bitcoin wallet in a browser.
Please stop trying to make people build buttcoin wallets into everything. Not
everyone may be a fan of your satoshi-shitoshi pyramid scheme, shocked eh?
Come
On Sun, Oct 20, 2013 at 08:54:12PM +0200, Antispam 06 wrote:
My own. Never published as the spammers seem hungry for addresses.
Compiled by spending time around privacy or security lists. Somehow
like the /ignore in IRC.
I went exactly the other way. I've been doing about
zero filtering for
On Fri, Oct 18, 2013 at 04:05:58PM +0600, Roman Mamedov wrote:
Several years down the road, when the fashionable shortener service of the day
is long dead in the water, to a future reader there is no way to tell where
this URL used to go, and not knowing the URL they can't even use the
On Thu, Oct 17, 2013 at 01:40:43PM +, Marcos Eugenio Kehl wrote:
1. Wich version of Linux do you recomend to use with Tor in a virtual
machine? Ubuntu? Linux Mint? Other? Why?Wich is the most recomended site to
download Linux?
Best regards!
Marcos Kehl (Brasil)
I would look into Tails
On Mon, Oct 14, 2013 at 12:40:16PM +0100, mick wrote:
Not strictly on topic, but why do you think you need a groupware
application? Why not simply install postfix/exim and dovecot/courier (or
whatever your MTA and IMAP/POP3 server of choice).
Zimbra might be another option, if you need more
On Mon, Oct 14, 2013 at 11:35:05AM -0400, jake.tar...@gmail.com wrote:
What do you guys think of riseup.net?
Not playing in the same league as own-hosted software.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
On Thu, Oct 10, 2013 at 06:40:22PM -0300, Juan Garofalo wrote:
The staged release may be a good idea, but have they got the timing
right?
Probably not, but processing that pile of information is hard work.
this article is dated June 6
On Wed, Oct 09, 2013 at 07:32:35PM -0300, Juan Garofalo wrote:
Why hasn't Snowden published all the stuff he got from the NSA
nazis? Why hasn't he uploaded it to wikileaks for instance? Or
torrented it?
He seems to believe in responsive disclosure (Cablegate set a few
ops in the field
/freedombox-discuss
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89
On Mon, Oct 07, 2013 at 11:59:42AM -0700, Blibbet wrote:
BTW, UEFI-based systems have a full IPv4/IPV6 network stack, with
PXE remote boot and WS-Management remote admin/control, and tools
like Perl and Telnet baked-in, so make sure your firmware isn't
spewing packets before Linux and Tor
On Fri, Oct 04, 2013 at 08:57:04AM -0700, Gordon Morehouse wrote:
I *think* people are mistaking VPN for VPS here - I can't find the
source, but there was some well distributed speculation that the FBI
was easily able to obtain a server image without disrupting the site
itself by having a VPS
On Thu, Sep 26, 2013 at 08:32:39AM -0400, David Green wrote:
Red Hat or Centos and or Debian; yes they do and have appealed, alas I have
a perfectly good and secure OS X Tiger -- which I have no reason to
upgrade... SCREECH Oops, I have wasted time defending myself before, so I
will not.
On Thu, Sep 26, 2013 at 10:29:14AM -0400, David Green wrote:
Upgrading to Leopard (10.5) has always been an option for myself, but I
invariably find, with minor work, upgrading is never required -- and yes,
IMHO, I have never been insecure or threatened in any IT way.
I run the system
On Thu, Sep 12, 2013 at 05:40:57PM -0400, Nathan Suchy wrote:
I like that idea. We need processer companies to stop owning their products
and to just let them go after we buy the product. It sucks being locked
into one solution...
Parallella Epiphany is soon shipping with a 85 kGate FPGA (Zynq
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
tor-talk
http://www.reddit.com/r/TOR/comments/1m3jum/gchq_tor_events_capture/
GCHQ 'Tor Events' Capture... (scribd.com)
submitted 3 hours ago by kant_go_on
6 commentssharesavehidereport
all 6 comments
sorted by: best
formatting helpreddiquette
save
[–]kant_go_on[S] 3 points 3 hours ago
Anyone seen this?
On Mon, Sep 09, 2013 at 05:24:31PM -0400, Nathan Suchy wrote:
Well, why don't you write your own bios?
Even coreboot helps you very little, as there is simply too much
proprietary crap in a typical PC platform where you can drop
undetectable (out of band) malware.
You need completely open
...@zgp.org
http://zgp.org/cgi-bin/mailman/listinfo/linux-elitists
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5
On Fri, Sep 06, 2013 at 08:00:21AM -0400, Nathan Suchy wrote:
If your so paranoid then encrypt your Tor Browser Bundle with TrueCrypt
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
then wipe the hard drive and destroy the computer when your done. Traffic
Correlation
On Fri, Sep 06, 2013 at 02:46:06PM +0200, Andreas Krey wrote:
On Fri, 06 Sep 2013 14:04:58 +, Eugen Leitl wrote:
...
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open source,
so why wouldn't you
/cryptography
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
Content and popularity analysis of Tor hidden services
July 29, 2013
Alex Biryukov
University of Luxembourg alex.biryu...@uni.lu
Ivan Pustogarov University of Luxembourg ivan.pustoga...@uni.lu
Ralf-Philipp Weinmann University of
On Thu, Sep 05, 2013 at 12:45:42PM +0200, Lunar wrote:
Eugen Leitl:
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
Content and popularity analysis of Tor hidden services
Watch out for dead horses [1] and see the previous discussion [2].
I'm glad you can work fulltime
with
How Things Work for Dummies.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE
On Tue, Sep 03, 2013 at 10:06:36PM +, mirimir wrote:
How would one identify new, and suddenly very popular, hidden services?
Ask the NSA? ;)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
I can verify signatures on Tor source packages, using key fingerprint given
out of band. How do I do that for https://www.torproject.org/docs/debian
Building from source (BTW, amd64 deps are missing quilt)?
These would be weasel's signature, not Roger's, right? Thanks.
--
tor-talk mailing list
On Mon, Sep 02, 2013 at 05:30:27PM +0200, Lunar wrote:
Eugen Leitl:
I can verify signatures on Tor source packages, using key fingerprint given
out of band. How do I do that for https://www.torproject.org/docs/debian
Building from source (BTW, amd64 deps are missing quilt)?
weasel ships
On Fri, Aug 30, 2013 at 01:03:49PM +0400, mamoeb mamoeb wrote:
Четверг, 29 августа 2013, 23:21 UTC от mirimir miri...@riseup.net:
On 08/29/2013 10:04 PM, mamoeb mamoeb wrote:
Поднял onion сайт получил доменное имя onion. Вопрос как его изменить?
вместо рандомных знаков в начале
I've managed to lay my hands onb a couple of Lenovo X60's that are
in pretty good shape and would like to use them as a moderately secure
communication/development system. (I'm not trusting my desktops,
servers or mobile devices for obvious reasons). I'm loath to modify
the hardware at this
https://blog.torproject.org/blog/join-us-tor-hack-day-munich-germany
JOIN US - Tor Hack Day, Munich, Germany
Posted July 8th, 2013 by kelley in dev meeting hack day
Join us for a public hack day on Friday, July 26, 2013 in Munich, Germany.
Thank you to our hosts at the Technische Universität
On Thu, Jul 18, 2013 at 10:45:27AM +, Andrew F wrote:
What are the issues with Hardware cypto?
Hardware is not inspectable, unless open, and
verified to function by an audit.
The sad reality of USB drive encryption:
On Thu, Jul 04, 2013 at 09:01:27PM +, adrelanos wrote:
Also keep in mind, that there are no Tor servers in China. When the US
starts banning Tor, it will be almost the end of the Tor network. The
The moment they ban Tor it will be the moment the network will
start growing beyond your
On Thu, Jul 04, 2013 at 11:39:43PM +, adrelanos wrote:
One can run Tor relays through VPNs with port forwarding.
That just pushes the risk one step further. If Tor gets banned, VPN
services get banned all in one go.
Great -- they should just pass a law than bans shipping software
with
On Tue, Jun 18, 2013 at 05:22:26PM +, adrelanos wrote:
At the moment most techies just don't believe or can't imagine that
anyone has more difficulties using a mailing list compared to a forum.
I very much doubt that.
It's just that mailing lists/IRC work well for us, and browser-based
On Mon, Jun 17, 2013 at 06:51:05PM -0700, Cat S wrote:
2. This e-mail you wrote only very recently appeared in my Yahoo! inbox, and
I refresh every couple of minutes. Your second e-mail that's up on Tor Talk
hasn't even arrived in my inbox yet. That's why I'm so pissed that Tor deiced
to
On Tue, Jun 18, 2013 at 10:14:24AM +0600, Roman Mamedov wrote:
That said however I don't see a 10 minute delay as a terrible problem, E-Mail
is
not a real-time medium anyway.
It can be. If it's set up right.
___
tor-talk mailing list
On Tue, Jun 18, 2013 at 07:24:58PM +0600, Roman Mamedov wrote:
On Tue, 18 Jun 2013 14:36:50 +0200
Eugen Leitl eu...@leitl.org wrote:
Why not FB or G+, or whatever.
Well for one, because it will be kind of hilarious when you won't be able
to use the Tor forum/group/circle/whatever _via
On Fri, May 31, 2013 at 05:07:47PM -0300, Juan Garofalo wrote:
Agreed, although the privacy policy for their Public DNS service seems
decent:
https://developers.google.com/speed/public-dns/privacy
TL;DR They wipe requesting IP addresses from their logs after 48 hours,
Yes.
On Thu, May 23, 2013 at 09:54:23AM -0700, Seth David Schoen wrote:
krishna e bera writes:
Would it be advisable to setup a small pool of random logins that Tor users
could share?
In the late 1990s people upset with the trend of requiring accounts on
Internet sites started a convention
On Sat, Apr 13, 2013 at 01:14:16PM -0400, grarpamp wrote:
Sure, i2P exists, but who wants to spin up a huge honking java virtual
machine just to participate in that relay pool?
It's actually pretty easy and can run on modest hardware as a node.
I disagree about modest hardware. Anything
On Wed, Feb 06, 2013 at 09:02:35PM -0500, Andrew Lewman wrote:
The Tor Project doesn't officially endorse anything. We use 1984.is for
hosting some of our infrastructure. And they are made up of fine
individuals willing to support us. We don't have, nor give out,
Thanks, that's good enough
I take https://blog.torproject.org/category/tags/iceland
as an official endorsement of 1984.is for freedom-minded
hosting.
Is that a correct interpretation?
Thanks.
___
tor-talk mailing list
tor-talk@lists.torproject.org
On Fri, Jan 25, 2013 at 02:38:11AM -0800, Linux Foundation wrote:
I do recommend you one cool hosting provider - http://hosting.wedos.com
His offer is very comfortable, good prices and if your offer on the page
doesn't suit you exactly, you can settle more details individually. They're
Hi -- I'm shopping around for a virtual server in a privacy-minded
jurisdiction, for a low-budget organization.
I'm currently looking at Iceland, and hosters like 1984.is
Are there countries and hosters with comparable attitudes to
privacy? I'm looking for a virtual servers in 20-30 EUR/month
On Mon, Jan 07, 2013 at 11:29:06PM -0500, grarpamp wrote:
It is an interesting questions, if with a modern user interface, can they
get to new life?
I see no reason the state of the art from the legacy remailer types
can't be combined and updated into a new service running on some
of the
http://www.reddit.com/r/darknetplan/comments/15sxwv/i_have_made_a_tor_bridge_available_over/c7pwd89
[–]HyperGrundy[S] 2 points 29 minutes ago*
Sure! First a warning: Tor will leak your IPv4 internet address to clients
using your bridge even if they are connecting only through cjdns, so don't
On Fri, Dec 07, 2012 at 09:50:32PM +, Aaron Brouard wrote:
I'm trying to make my hidden service more secure. It runs on a server
running Ubuntu 12.04.1 LTS server version. I have set up full disk
If you can't place the service on physically distinct machines,
private (RFC1918) address space
On Thu, Dec 06, 2012 at 03:11:20AM -0800, Edwin Farnworth wrote:
I want to know how to purchase merchandise on silk road using tor-talk
Tor-talk is a mailing list. I doubt the Silk Road accepts
mailing lists as currency. Pro tip: try Google.
___
, and greatly respect the Tor engineers.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014
Die| Public Access Internet | SINCE 1989 *oo*
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE
alone, that's way too many apples.
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A
On Sat, Dec 01, 2012 at 02:37:30PM +0200, Maxim Kammerer wrote:
Is it possible to configure the tor-talk mailing list to discard
messages not explicitly addressed to it? Like this nanog discussion.
I was chewed out for losing the threading info when I forwarded,
now Maxim dislikes bounces. You
On Sat, Dec 01, 2012 at 04:20:38PM +0200, Maxim Kammerer wrote:
On Sat, Dec 1, 2012 at 3:00 PM, Eugen Leitl eu...@leitl.org wrote:
I was chewed out for losing the threading info when I forwarded,
now Maxim dislikes bounces. You just can't make it right for
some people.
Well, to be sure
://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820
...@baylink.com
Designer The Things I Think RFC 2100
Ashworth Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274
- End forwarded message -
--
Eugen* Leitl
?
...
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D
-
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
business?
...
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
and see what they think, as IANAL.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com
of.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3
in the US and see what they think, as IANAL.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http
.
--
-george william herbert
george.herb...@gmail.com
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
(fax) | froom...@law.tm
--It's warm here.--
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
...@gmail.com
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
+1 (305) 284-4285 |+1 (305) 284-6506 (fax) | froom...@law.tm
--It's warm here.--
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820
of Things We Like (Lots), jotwell.com
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285 |+1 (305) 284-6506 (fax) | froom...@law.tm
--It's warm here.--
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl
Research j...@reptiles.org+1 416 410-5633
He who dies with the most toys is nonetheless dead
--
Kyle Creyts
Information Assurance Professional
BSidesDetroit Organizer
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
:
Assuming it's true, it was bound to happen. Running anything , TOR or
otherwise, that allows strangers to do whatever they want is just folly.
Such as, say, an Internet Service Provider business?
...
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http
allows us to clearly
discern that this is what it purports to be and not simply an attempt
to shut down a Tor node (and intimidate the operators of others)
by using a plausible excuse based on a universal hot-button issue?
---rsk
- End forwarded message -
--
Eugen* Leitl a href=http
--
--C
The dumber people think you are, the more surprised they're going to
be when you kill them. - Sir William Clayton
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100
*
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
they're going to
be when you kill them. - Sir William Clayton
--
~Em
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http
| b...@theworld.com |
http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD| Dial-Up: US, PR,
Canada
Software Tool Die| Public Access Internet | SINCE 1989
*oo*
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl
the equipment from that store?
--
TTFN,
patrick
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3
- Forwarded message from elijah wright e...@stderr.org -
From: elijah wright e...@stderr.org
Date: Thu, 29 Nov 2012 13:38:51 -0600
To: Eugen Leitl eu...@leitl.org
Cc: na...@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
We had a guy
http://threatpost.com/en_us/blogs/side-channel-attack-steals-crypto-key-co-located-virtual-machines-110512
November 5, 2012, 9:25AM
Side-Channel Attack Steals Crypto Key from Co-Located Virtual Machines
by Michael Mimoso
Side-channel attacks against cryptography keys have, until now, been
On Sat, Oct 20, 2012 at 09:13:39PM +0100, Julian Yon wrote:
On Sat, 20 Oct 2012 21:26:33 +0200
Eugen Leitl eu...@leitl.org wrote:
So, let's please not overreact and let the people who want us to be
manipulated by universal handles succeed. Because it's just where they
want you
On Sat, Oct 20, 2012 at 07:34:48PM +, Lee Whitney wrote:
Eugen do you have children? Not attacking you based on this but I'm
curious how it affects perspective.
Yes, I have a kid. Doesn't change a single thing in that attitude.
In my mind it's pretty easy to drawn the line, things that
On Sat, Oct 20, 2012 at 07:27:13PM +0100, Julian Yon wrote:
On Sat, 20 Oct 2012 13:16:44 +0900
익명 namfree...@gmail.com wrote:
Please help us. Child pornography without child is illegal in south
Korea.
This is one of the most disturbing messages I have read for a while.
You seem to be
On Fri, Oct 19, 2012 at 11:25:34AM +0100, Anon Mus wrote:
e.g. lets say a node is in a server in an IBM/US telecoms company based
in France, then that server will almost certainly be routing ALL its
traffic through the USA and back to itself (or another node in the same
company) before
- Forwarded message from Ted Smith te...@riseup.net -
From: Ted Smith te...@riseup.net
Date: Wed, 03 Oct 2012 11:09:00 -0400
To: Eugen Leitl eu...@leitl.org
Cc: cypherpu...@al-qaeda.net
Subject: Re: [tor-talk] clockskewer attack
The attack assumes that the targeted hidden service
http://44con.com/presentation/2012-in-review-tor-and-the-censorship-arms-race/
2012 in review: Tor and the censorship arms race
Presentation speakers
Runa A. Sandvik
New! On DVD
Kazakhstan blocked Tor using Deep Packet Inspection in January 2012.
China started
http://nplusonemag.com/leave-your-cellphone-at-home
Sarah Resnick
Leave Your Cellphone at Home
Interview with Jacob Appelbaum
From OCCUPY Gazette 4, out May 1.
Earlier this year in Wired, writer and intelligence expert James Bamford
described the National Security Agency’s plans for the Utah
-bin/mailman/listinfo/tor-talk
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
/tor-talk
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
-...@googlegroups.com
On Mon, Aug 20, 2012 at 3:43 PM, Eugen Leitl eu...@leitl.org wrote:
- Forwarded message from Maxim Kammerer m...@dee.su -
Beta testing some criticism here...
Anyway, let's do some math. Below, you will find a table where left
column denotes the number of Guard+Exit+Fast
- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
1 - 100 of 160 matches
Mail list logo