I will answer many e-mails in this message. Look for yours:
Roger Dingledine wrote:
> people have had problems with the interactions
> between these two programs in the past.
In an universe of so many interaction problems among programs, TOR must
have a more than suspicious "problem"?
Why not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/23/2014 12:00 AM, Sebastian G. wrote:
Comparing to my personal mirror:
> Well for the "installer" of 3.6.3 I get: MD5:
> 9529C5A633CF0CF6201662CA12630A04
Match.
> SHA-1: 22BD98A14BCA9F1002CA2F6DBF7CFD4702B241EA
Match.
> SHA-256:
> 526818
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 08/22/2014 03:16 PM, no.thing_to-h...@cryptopathie.eu wrote:
> I just downloaded the old version 3.6.3, the download link on
> http://www.neowin.net/news/tor-browser-bundle-363 still works and
> leads to the file
> https://www.torproject.org/dis
On Mon, Aug 25, 2014 at 11:22:27AM -0700,
bm-2cvvnfwsftfx8dv12l8z8pjejmtrjyj...@bitmessage.ch wrote:
> Mirimir wrote:
> > Maybe Zemana is incorrectly flagging some aspect of HTML5 canvas
> > spoofing by the Tor browser as taking a screen snapshot".
>
> The incident happend at different web pages
On Mon, Aug 25, 2014 at 8:22 PM,
wrote:
> I did a new upload to a popular JPG hosting service. Here they are:
> http://i.imgur.com/QAKp7k1.jpg (Zemana log)
> http://i.imgur.com/nJkCQJp.jpg (Zemana version)
> http://i.imgur.com/06ZW0IK.jpg
> http://i.imgur.com/XsbpQ4X.jpg
> http://i.imgur.
There is a solved ticket about this and more info about it.
https://trac.torproject.org/projects/tor/ticket/9490
@OP, instead of bitching about Tor being an NSA trap, why don't you learn
to use google?
Cheerz
http://apx808.blogspot.com
On Mon, Aug 25, 2014 at 4:02 PM, APX 808 wrote:
> I did a
I did a quick search and found a similar report from August 2013
https://blog.torproject.org/blog/tor-browser-bundle-30alpha2-released
Check the latest comment
Cheerz
http://apx808.blogspot.com
On Mon, Aug 25, 2014 at 3:22 PM, <
bm-2cvvnfwsftfx8dv12l8z8pjejmtrjyj...@bitmessage.ch> wrote:
> Hi
Hi,
I will answer messages sent by different list members. Check for yours:
Joe Btfsplk wrote:
> Or, this could be a hoax by the OP, or a simple mistake.
This is not a hoax and is not a mistake.
Mirimir wrote:
> Maybe Zemana is incorrectly flagging some aspect of HTML5 canvas
> spoofi
I don't know the anti-spyware tool that you used nor details about what the
tool deems a "screenshot" but I want to point out that in Windows
(especially older versions) one of the entropy sources for OpenSSL is the
screenshot of your current session[1]. So if the Tor Browser needs to
generate keys
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ok, let's try to find our what's going in here.
I checksummed some files:
-
++ The directory I found yesterday evening.
https://www.torproject.org/dist/torbrowser/3.6.3/
- -> This was the old download directory for the Torbrowser v3.6.3
- -> Not
22.08.2014, 23:38 bm-2cvvnfwsftfx8dv12l8z8pjejmtrjyj...@bitmessage.ch:
> Hi,
>
> I have TOR 3.6.3 installed in a Windows XP computer that is used almost
> just for it with very few additional software installed.
> My understanding is that a potential attacker will test his
> exploit/approach again
23.08.2014, 00:16 no.thing_to-h...@cryptopathie.eu:
> I just downloaded the old version 3.6.3, the download link on
> http://www.neowin.net/news/tor-browser-bundle-363
> still works and leads to the file
> https://www.torproject.org/dist/torbrowser/3.6.3/torbrowser-install-3.6.3_en-US.exe
>
> When
MD5 is not collision resistant, and as such it shouldn't be used for verifying
file integrity against tampering. A tampered file might be computed in order to
have the same MD5 checksum of the original with a relatively small effort. See
for instance
http://eprint.iacr.org/2013/170.pdf
Attacks
On 8/22/14, Joe Btfsplk wrote:
>
> On 8/22/2014 5:16 PM, no.thing_to-h...@cryptopathie.eu wrote:
>>
>> One of us downloaded a wrong Tor installer package ...
>>
>> Best regards
>>
>> Anton
>>
> Please expand on the possibilities beyond the face value statement.
no.thing_to-h...@cryptopathie.eu go
On 8/22/14, no.thing_to-h...@cryptopathie.eu
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> I just downloaded the old version 3.6.3, the download link on
> http://www.neowin.net/news/tor-browser-bundle-363
> still works and leads to the file
> https://www.torproject.org/dist/torbrows
On 08/22/2014 05:14 PM, Joe Btfsplk wrote:
>
> On 8/22/2014 5:16 PM, no.thing_to-h...@cryptopathie.eu wrote:
>>
>> One of us downloaded a wrong Tor installer package ...
>>
>> Best regards
>>
>> Anton
>>
> Please expand on the possibilities beyond the face value statement.
> That is, assuming the
On 8/22/2014 5:16 PM, no.thing_to-h...@cryptopathie.eu wrote:
One of us downloaded a wrong Tor installer package ...
Best regards
Anton
Please expand on the possibilities beyond the face value statement.
That is, assuming the OP downloaded the Tor software from the legitimate
TorProject si
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I just downloaded the old version 3.6.3, the download link on
http://www.neowin.net/news/tor-browser-bundle-363
still works and leads to the file
https://www.torproject.org/dist/torbrowser/3.6.3/torbrowser-install-3.6.3_en-US.exe
When I use jacksum on
Hi,
I have TOR 3.6.3 installed in a Windows XP computer that is used almost
just for it with very few additional software installed.
My understanding is that a potential attacker will test his
exploit/approach against most of the security software available, but
possibly will not be able to test a
19 matches
Mail list logo