On Fri, Dec 13, 2019 at 11:29:34AM +, Alec Muffett wrote:
> tldr: new TLS certificate is stuck in the pipeline for a few days, because
> onion certificates are special and weird:
Onion certificates are an oxymoron. The onion address
is self-validating. It is a bug that web browsers apply
the
On Tue, Sep 05, 2017 at 08:50:20AM +0200, Jon Tullett wrote:
> > This is still an alpha release
> > * Exchange implements the full Taler protocol, but does not integrate with
> > traditional banking systems
> > * No integration with "real" banks, so only toy currencies are available
> > for now.
On Mon, Sep 04, 2017 at 08:35:17PM +0500, Roman Mamedov wrote:
> BTC wouldn't require "same timeframe" of 36 hours to transfer, it can be done
> within less than an hour. And with the recent developments in the BTC world,
> both transaction speed and cost per transaction will continue to improve.
as hardly anything to do
with bitcoin and co. And certainly nothing with Tor.
> Le 31/08/2017 à 13:07, carlo von lynX a écrit :
> > Let's discuss it: http://my.pages.de/illegalblockchains
--
E-mail is public! Talk to me in private using encryption:
http://loupsycedyglgamf
Would the "darknet" be a better place if there was
no Bitcoin? Are any of the ethical uses of Bitcoin
actually necessary to be done using Bitcoin? Should
society make blockchain finance tools illegal?
Should Tor activists combat criminal uses of the
onion space by impeding its anti-social finance
Hey out there.. I had two more attempts
from 'coriandolino' to MITM my ssh traffic!
Is anybody going to exclude that node from
the network or do we have to get used that
abusive nodes are not going to suffer any sanctions?
On Sat, Jul 15, 2017 at 01:28:50PM +, flipchan wrote:
> Could you post
Hi, I report an experience I seem to have made.
In recent weeks I was occasionally prompted with
a wrong SSH key for my server, like this:
RSA key fingerprint is SHA256:DcXN8UTcDaCz7N1BoUXc9H8yUAs4gxiy37Y1+BDIhUU.
Today I was fast enough to look up the stream
list, using remotor:
2602 SUCCEEDED
On Sun, Aug 28, 2016 at 09:44:55AM -0400, Nathaniel Suchy wrote:
> On 2016-08-28 02:18, Andreas Krey wrote:
> >On Fri, 26 Aug 2016 13:25:58 +0000, carlo von lynX wrote:
> >...
> >>I still don't understand why you guys hang out on a public surveilled
> >>IRC netw
On Thu, Aug 25, 2016 at 03:16:12PM -0400, Nathaniel Suchy wrote:
> address with a matching GPG key instead. I am still active on Tor's
> IRC Channels under the username "deatives" and will continue to do
I still don't understand why you guys hang out on a public surveilled
IRC network where each
On Sat, Aug 20, 2016 at 12:16:32AM +, Jeremy Rand wrote:
> Looks like last update to their GitHub was 2 days ago:
> https://github.com/Bitmessage/PyBitmessage/branches
Good.
> Of course, whether Bitmessage is a protocol that makes sense from an
> engineering perspective is an entirely
Still sounds a lot like JTRIG and Zersetzung to me...
http://www.zeit.de/kultur/2016-08/jacob-appelbaum-rape-sexual-abuse-allegations/komplettansicht
Jacob Appelbaum: What Has This Man Done?
The year 2016 is only a couple of hours old when the orgy in Jacob Appelbaum’s
apartment in a
On Tue, Jul 19, 2016 at 05:42:17AM -0400, grarpamp wrote:
> Cloudflare reCAPTCHA De-anonymizes Tor Users
Terrific information. I am informing the Italian community
about this development:
On Thu, Jul 07, 2016 at 01:50:51PM -0700, Yuri wrote:
> ZeroNet actually comes very close to a completely decentralized web.
q.e.d.
> The sites aren't static, they are very dynamic, modern looking, with
lol
> JavaScript and css. ZeroNet sites aren't censorable. User comments
like torrents
On Wed, Jul 06, 2016 at 01:44:43PM -0700, Yuri wrote:
> The article says "this lack of diversity in hosting infrastructure
> is concerning—it places the future of a large proportion of Onion
> Services in the hands of a limited number of groups". The future web
Indeed insisting on the
Just thought.. strange.. Aymeric never bails out of a discussion,
and guess what, I overlooked his reply! Here we go.
On Mon, Jun 27, 2016 at 01:00:14PM +0200, Aymeric Vitte wrote:
> > Do you know of any other technology that does so with comparable dedication?
> > Is the spy detection for
On Wed, Jun 22, 2016 at 08:38:55AM -0400, Paul Syverson wrote:
> Everything's a technical term to somebody. Roughly yes I was
> contrasting client/server with anything where every entity is both a
> participant and part of the routing infrastructure (in that sense the
> first published and
On Thu, Jun 23, 2016 at 02:08:13PM +0200, Aymeric Vitte wrote:
> >
> > http://cdn.media.ccc.de/congress/2013/workshops/30c3-WS-en-YBTI_Mesh-Bart_Polot-GNUnet_Wireless_Mesh_DHT.webm
> >
> >
Paul, I thank you for the honor of "proofreading" that page.
On Wed, Jun 22, 2016 at 07:16:21AM -0400, Paul Syverson wrote:
> On Tue, Jun 21, 2016 at 07:39:22PM +0200, carlo von lynX wrote:
> > On Tue, Jun 21, 2016 at 12:48:38PM -0400, Paul Syverson wrote:
> > > We
Hello Aymeric!
On Wed, Jun 22, 2016 at 12:41:35PM +0200, Aymeric Vitte wrote:
> Not a specialist with gnunet (how does peers discovery works with
I think this talk is very worthwhile in explaining how gnunet works
and why it is indeed a *replacement* for the current internet, not
something that
On Tue, Jun 21, 2016 at 12:48:38PM -0400, Paul Syverson wrote:
> Well there's things like alpha-mixing (better tau-mixing) as that
Yes, alpha-mixing would be a great step forward I guess.
Would you say the things I wrote on http://secushare.org/anonymity
regarding not building future work on Tor
FOR IMMEDIATE RELEASE: Saturday 11th June 2016
We, the undersigned, are a group of women who have been friends, colleagues,
co-workers or partners of Jacob "Jake" Appelbaum over many years.
We have decided that we must speak out due to the nature of this coordinated
and one-sided attack on his
Oc Thu, Jun 09, 2016 at 05:58:38PM -0600, Mirimir wrote:
> http://www.twitlonger.com/show/n_1sop8ps
Liberate the content from the inappropriate surveilled hosting!
+++
Statement by Jill Bähring regarding Jacob Appelbaum
On June 7, 2016, Gizmodo published a story in which “eyewitnesses” -
Everyone is free to refute sociology or science in general
and declare it an opinion.
I just came here to suggest a way to handle the situation
that nobody else had the idea of suggesting, based on some
research that got published on this thing called Internet.
I got some good feedback (in
https://blog.cr.yp.to/20160607-dueprocess.html
Suppose someone is accused of rape, or some other horrifying crime. If the
accusation is true then the perpetrator should go to jail. If the accusation is
false then the source of this false accusation should pay for this slander.
Clearly someone
> On Wed, Jun 08, 2016 at 05:32:31PM +0200, carlo von lynX wrote:
> > That is a possible way a vibes watcher could go about it, but I would
> > rather intercept any aggressive postings to appear in the original form,
> > but rather send them back to the writer asking to
a counter-crime.
> >
> > ???
If that paragraph was unclear, please ask a question.
On Wed, Jun 08, 2016 at 09:19:04PM +1000, Zenaan Harkness wrote:
> On Wed, Jun 08, 2016 at 12:47:15PM +0200, ma...@wk3.org wrote:
> > Quoting carlo von lynX (2016-06-08 08:28:23)
> &g
On Tue, Jun 07, 2016 at 10:08:57PM +0300, ja.talk wrote:
> https://www.documentcloud.org/documents/2853643-Jacob-Appelbaum-CULT-of-the-DEAD-COW-Statement.html
> https://www.facebook.com/cultdeadcow/posts/10157076402890360
Facebook? Ouch.
> CULT OF THE DEAD COW Statement on Jacob Appelbaum /
On Tue, Jun 07, 2016 at 02:12:43PM -0400, Not Friendly wrote:
> I do not understand why those people think that Tor is a honeypot by
> the federal government. It is OPEN SOURCE. If you are by any means
> worried look at the source code and compile it manually. There is no
> hiding a backdoor.
On Tue, Jun 07, 2016 at 01:58:59PM +, df. wrote:
>
> "Freedom Act jurisdiction"? I remember in 2014 the NSA monitored
> Chancellor Angela Merkel:
>
> http://www.spiegel.de/international/germany/germany-expected-to-open-investigation-into-nsa-spying-on-merkel-a-973326.html
One thing is the
On Tue, Jun 07, 2016 at 02:44:40AM -0500, Crypto wrote:
> RiseUp actually has .onion addresses for all of their various services.
> They list them in their Help->Security section.
I don't understand why people still use mail services under
Patriot Act.. er.. I mean Freedom Act jurisdiction? It's
On Mon, Jun 06, 2016 at 09:58:41AM -0400, Griffin Boyce wrote:
> Chris Dagdigian wrote:
> >It's sorta disgusting to see the creep defenders come out in force on
I'm a defender of democracy and justice..
> >this list - especially the ones who talk big about anti-establishment
> >stuff and post
On Sun, Jun 05, 2016 at 02:46:52PM -0300, juan wrote:
> On Sun, 5 Jun 2016 17:03:45 +0200
> carlo von lynX <l...@time.to.get.psyced.org> wrote:
>
> > Julia Schramm who did everything
> > right,
>
> https://torrentfreak.com/fail-prominent-pirate-party-polit
Woah, looks like some people took those JTRIG slides quite literally.
The problem with (in)justice in open activist communities is
that, even should the facts be clear, those facts affect
private details of life of either contendants or third parties,
which makes it inacceptable to disclose in
On Mon, Feb 16, 2015 at 09:19:51AM +0100, Bernhard R. Fischer wrote:
On Sunday 15 February 2015 12:59:08 grarpamp wrote:
Hello.
Is there an English version of a paper (or presentation) for this?
Bernhard Fischer - OnionCat und Tors neues Kryptosystem
On Thu, May 21, 2015 at 12:03:24PM -0700, Yuri wrote:
On one hand, Mailpile is after security, which is great. But on the
other hand they use node which doesn't sign packages, therefore
What a shame! Somebody please fix this node thing. I can't
believe these nodejs enthusiastos are playing
On Thu, Mar 12, 2015 at 04:09:36PM +0100, Andreas Krey wrote:
On Thu, 12 Mar 2015 14:16:44 +, ma...@wk3.org wrote:
On Wed, 11 Mar 2015 12:35:53 -0400
l.m ter.one.lee...@hush.com wrote:
Which site blocks tor exit entirely? I haven't seen one recently.
I'm sorry to disturb with this, but I am being confronted with
hearsay about Roger D. having said that it would take latencies
in the order of hours to fully make communications impossible
to shape and correlate. And that hearsay is being purported as
generic for any kind of anonymization network.
I like Patrick's initiative. Please, make it possible
to have Tor solutions that are more timely than debian
but less intrusive than TAILS (I hate when I can't have
my own unix configuration with all of my preferred apps).
On Sun, Jan 25, 2015 at 02:17:29AM -0500, Libertas wrote:
At that point,
On Sat, Jan 17, 2015 at 08:42:44PM +, cont...@sharebook.com wrote:
If attackers break ciphers one decade later then Tor's forward secrecy
is compromised even for any collected forward secure operation today.
Should a way to break ciphers be developed, it is likely it will come
at an
Dear evervigilant, no we do not consider running Diaspora
behind Tor since that is not a good idea in both terms of
anonymity and scalability. Diaspora already has scalability
issues, it would certainly not improve if each transaction
travels across six Tor relays. And the way each Diaspora
node
On Tue, Jan 13, 2015 at 09:48:21PM +, cont...@sharebook.com wrote:
It is possible to use pubsub between Alice's SC's third hop and Bob's RP
but it doesn't improve anything for our application because your pubsub
is a topological multicast mechanism over application layer but what
Alice
On Sun, Jan 11, 2015 at 11:39:55PM +, cont...@sharebook.com wrote:
Hybrid hidden services doesn't exist yet and it's design isn't
Ok, that is an important bit that somehow wasn't immediately clear to me.
You are not planning to use current Tor but you intend to make a relevant
contribution
On Fri, Jan 09, 2015 at 12:13:11AM +, cont...@sharebook.com wrote:
i think you got it all wrong, maybe it's because English is not my
native language. let me demonstrate it by technical details
It may be the language, but I feel you are talking about completely
different things than the
On Mon, Nov 17, 2014 at 09:46:37PM +, Gareth Owen wrote:
Just to let you know, I am also giving a talk at 31c3 on Tor, but my talk
is focussing on a research project we did on the Tor HS DHT. I was also
planning to talk a little about the Tor Research Framework and an
accessible overview
Happy new ear (as they say in Italy).
On Tue, Dec 30, 2014 at 01:23:55PM +0330, cont...@sharebook.com wrote:
User only establish hundreds of Tor hidden services once, when launch
the app, which cost high computational power for awhile, but when all
hidden services are connected then it doesn't
On Tue, Dec 30, 2014 at 03:14:33AM +0330, cont...@sharebook.com wrote:
Hi all. we published documentations about our big plan here
sharebook.com/design.html
Thank you for posting to several mailing lists about it.
I see you have spent quite some time in the design of
the cryptographic
grarpamp, thanks for making me look at
http://cryptome.org/2014/12/peck-roark-affidavit.pdf
I had dared to skip it, albeit it says a lot about the person
I am holding an exchange with.
On Sun, Dec 07, 2014 at 10:15:31AM -0800, coderman wrote:
On 12/7/14, carlo von lynX l
On Sun, Dec 07, 2014 at 02:27:44AM -0800, coderman wrote:
Whonix on Qubes OS represents defense in depth unlike any other
system. as such, it is a likely target, like Tails and the Tor Browser
before it.
This question may spell a change of topic, but wouldn't
it make much more sense to
On Sun, Dec 07, 2014 at 03:38:56AM -0800, coderman wrote:
would compromising Debian upstream be easier? probably, but it would
also be more visible.
If it took ages to find heartbleed in the source, how likely is it
that a backdoored binary is found?
I know that currently 13600 packages of
On Sun, Dec 07, 2014 at 04:53:20AM -0800, coderman wrote:
finding backdoors or vulnerabilities a problem for every
implementation, open source or not. source based or not. reproducible
builds or not.
And still it is much harder to sneak something into the official
codebase in plain view of
Thanks a lot for replying, Mo.
On Mon, Sep 01, 2014 at 07:45:00PM +0200, Moritz Bartl wrote:
For some reason this seems to be a Hot Topic these days. There are quite
Where else is it? I was passed a link to a thing called TorCoin
but I think that operates very differently from what I had in
On Mon, Sep 01, 2014 at 11:20:02PM +0200, Aymeric Vitte wrote:
First question is: why do you want people to pay for relays? That's
probably one of the best way to deanonymize you.
Because I want to destroy the necessity for telcos to identify my
mobile phone as I walk down the street. So if
52 matches
Mail list logo