the revocation message right away and store it
somewhere safe, just to make sure that if the key is stolen ánd deleted,
the owner can still create a revocation certificate.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
Ope
++ 17/01/16 14:17 + - Lara:
>Rejo Zenger:
>> - How can a user reliably determine some .onion address actually
>>belongs to intended owner?
>
>The user can call the admin and ask the admin to read aloud the key
>fingerprint.
Yes, I like the idea. Still, I think
strong technical background. They (no, we all!) should have more
accessible means to verifying the ownership of a .onion-address.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB
e to include those
key in some listing of the directory authorities marking them as bad
nodes. This is a manual process.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4
XMPP
re block lists, based on the criteria that these lists list all
none Tor relays. This may be a problem when site owners decided to deny
traffic from IP-addresses that are running a Tor relay. As a result of
that, if you run a middle relay from home, you may have difficulties
reaching some site
asically boils down to: add the "-no-remote" option when the
browser is starting. This can be done by editing the script that is used
for starting the Tor-browser (and keep in mind, any update will
overwrite your changes).
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https:/
or-browser to facilitate this. Of
course, that is not a very sustainable solution.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4
XMPP OTR 271A 9186 AFBC 8124 18CF
++ 25/05/15 13:22 -0700 - Apple Apple:
>
>It is very easy for website operators to download a list of all Tor exit
>nodes and ban them unconditionally. Is the same true for this VPN service?
No, that is not possible.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738
++ 07/11/14 15:50 +0100 - Öyvind Saether:
>Google also blocking Tor - like they have been doing for a long, long
>time.
Google does work for me, from time to time. If it works, at least two
Captcha's though.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.ze
++ 16/10/14 18:40 + - gnubiferous:
>The Tor Browser download page seems to have the wrong links on it:
Same issue noticed.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0
++ 05/08/14 19:58 +0200 - Rejo Zenger:
>> August 2011. Agents at the National High Tech Crime Unit of the
>> Netherlands’ national police force had decided to crack down on online
>> child porn, according to an FBI affidavit. To that end, they wrote a web
>> crawler t
++ 05/08/14 16:31 +0200 - Rejo Zenger:
> August 2011. Agents at the National High Tech Crime Unit of the
> Netherlands’ national police force had decided to crack down on online
> child porn, according to an FBI affidavit. To that end, they wrote a web
> crawler that scoured
nal nickname for the operation. The
case was a followup to the Robert M.-case, one of the largest child
abuse-cases in the Netherlands.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994
th a secured server that would make things more private. I
>
>And unless one by one with --recv-keys, keyserver sees your
>entire list at once.
Which means: the only thing you are protecting (by using Tor when
updating your keychain) is the source IP-address for the refresh, e.g.
you
Snowden whenever they were releasing documents that apparently
originated from him.
Thanks in advance!
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4
XMPP OTR 271A 9186
++ 03/07/14 04:39 + - scarp:
>Most attacks about breaking out of a VM rely on you installing the
>guest tools, so never do that.
What are "guest tools" in this context?
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@z
he old Vidalia, though, all I did is click "New
>connection" or whatever it was called, and not lose even a second. It
[...]
You could select the onion icon, then select "new identity". However,
that will reset your browser as well and this may not workable if you
m the Firefox startup in the
"start-tor-browser" script.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4
XMPP OTR 271A 9186 AFBC 8124 18CF 4BE2 E000 E70
++ 22/05/14 00:32 +0200 - Lunar:
>Thanks! Have a look at the result at:
>https://people.torproject.org/~lunar/tor-and-https/nl/tor-and-https.svg
Less generic, but a lot shorter and probably better. See attachment.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zen
f them
are too long, let me know and I'll shorten them a bit.
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4
XMPP OTR 271A 9186 AFBC 8124 18CF 4BE2 E000 E708
you of the TP, let me know
and I'll see what details I can find out (as the document is only
partially released, there must be more information).
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
pgpHUk531ki
++ 30/11/13 20:05 -0600 - Joe Btfsplk:
>"servers running fora"
>Is "fora" plural for forum in Dutch? Or should that be "servers running
>forums?"
No (or yes, but it's Latin-origin). Second question: yes.
--
Rejo Zenger . . 0x21DBEFD4 . <https:/
ng and analyzing all available data (and hoping a user once
didn't use Tor while accessing the forum).
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
pgp2T2TztejNC.pgp
Description: PGP signature
--
tor-talk mailin
ing, web searches, etc.
>
>You can get a lot of healthcare-related information on the website
>without signing up.
That's one thing. The other thing is that you may not want to disclose
your location at the time of visiting.
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.n
onsidering the efforts by Tor team
>members and testimonies, is there any way to contact the EU sysadmins?
Also see
<http://www.daten-speicherung.de/index.php/eu-commission-gives-up-blocking-tor-and-vpn-services/>.
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG
++ 03/10/13 13:49 -0400 - Ahmed Hassan:
>One question is still remain unanswered. How did they locate Silkroad
>server before locating him?
>
>They had full image of the server before his arrest.
Where have you read this or deducted this from?
--
Rejo Zenger . . 0x21DBE
with AccountingMax set to 1 GB, a server could send 900 MB
and receive 800 MB and continue running.
In other words, it'll keep running until either rx or tx has reached 10
GB. It'll hibernate when upstream or downstream has reached the limit
you have specified.
--
Rejo Zenger . . 0
ying to access.
It'll help if you could tell which domain the website is hosted at (is
wordpress.com or something else) and it'll help if you could tell what
you do see (an error message, blank page, something else).
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encry
have any questions.
The proposal can be found here (dutch only):
http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2012/10/15/wetgeving-bestrijding-cybercrime/wetgeving-bestrijding-cybercrime-1.pdf.
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG
oftware or hired a
> 3rd party to 'protect' their sites. This protection includes a category
I expect exactly the same.
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
signatu
74&language=EN
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-talk mailing list
tor-talk@li
tHub.
If you have any questions, feel free to ask.
--
Rejo Zenger
r...@zenger.nl (GPG: 0x21DBEFD4)
https://rejo.zenger.nl
+31.6.39642738
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
tor-talk mailing list
tor-talk@lists.to
?
https://www.torproject.org/torbutton/torbutton-faq.html.en#noflash
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
signature.asc
Description: Message signed with OpenPGP using GPGMail
_
oject.org/docs/faq#ChooseEntryExit.
Please make sure you read the recommendation in the answer as well.
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
signature.asc
Description: Message signed with O
t."
That doesn't make sense to me. But then again, it's probably not supposed to
be. :)
--
Rejo Zenger . . 0x21DBEFD4 . <https://rejo.zenger.nl>
GPG encrypted e-mail preferred . +31.6.39642738 . @rejozenger
signature.asc
Description: Message signed with OpenPGP using GPGMail
id they provide any explanation for this?
Your root server, did they have access to the server as well? How did they know
you were running a relay, other than looking on your server for a Tor process,
or looking into your traffic? What problem did they try to solve by adding your
server o
Hi,
> - You get transparent, free end to end encryption. No flawed root CA system.
Just curious, maybe I am overlooking something: how would this be better than a
self-signed and self-generated certificate (apart from the user not being
nagged with a warning)?
--
Rejo Zenger . . 0x21DBE
... If I good understood
> your answer, that's mean the admin of PC (the same of system admin of my PC,
> I think) can track all my activity on the PC.. that's right???
Yes. He could, for example, install a program that tracks everything you do,
e.g. all of your typing.
38 matches
Mail list logo