On 9/6/13, Carsten N. c...@jondos.de wrote:
An analysis of Truecrypt was done by the Privacy-CD team:
en: https://www.privacy-cd.org/downloads/truecrypt_7.0a-analysis-en.pdf
de: https://www.privacy-cd.org/downloads/truecrypt_7.0a-analysis-de.pdf
Just taking a moment to thank anyone reviewing
On Fri, Sep 06, 2013 at 08:00:21AM -0400, Nathan Suchy wrote:
If your so paranoid then encrypt your Tor Browser Bundle with TrueCrypt
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
then wipe the hard drive and destroy the computer when your done. Traffic
Correlation
If your so paranoid then encrypt your Tor Browser Bundle with TrueCrypt
then wipe the hard drive and destroy the computer when your done. Traffic
Correlation is next to impossible via Tor. You could also use a VPN then
Tor for more security...
Sent from my Android so do not expect a fast, long,
On Fri, 06 Sep 2013 14:04:58 +, Eugen Leitl wrote:
...
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open source,
so why wouldn't you use it?
Andreas
--
Totally trivial. Famous last words.
From:
Andreas Krey:
On Fri, 06 Sep 2013 14:04:58 +, Eugen Leitl wrote:
...
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open source,
so why wouldn't you use it?
Tails have an interesting position
On Fri, Sep 06, 2013 at 02:46:06PM +0200, Andreas Krey wrote:
On Fri, 06 Sep 2013 14:04:58 +, Eugen Leitl wrote:
...
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open source,
so why wouldn't you
Am Freitag 06 September 2013 schrieb Eugen Leitl:
On Fri, Sep 06, 2013 at 08:00:21AM -0400, Nathan Suchy wrote:
If your so paranoid then encrypt your Tor Browser Bundle with TrueCrypt
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
What is your concern when using
Lunar wrote (06 Sep 2013 13:16:24 GMT) :
See tc-play for an alternative implementation, though:
https://github.com/bwalex/tc-play
FWIW cryptsetup 1.6 supports the TrueCrypt on-disk format, too.
Cheers,
--
intrigeri
| GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
|
Truecrypt is a open source software therefore NSA doesn't have back door
access to this particular software. Private encryption software that isn't
being done by open source community, NSA is more than likely to have a back
door access for easy access. Disgusting, is it not? No hard work required.
Various wrote:
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open
source,
so why wouldn't you use it?
If you're running a proprietary system, the weakest link will be
likely elsewhere.
// What is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/06/2013 03:16 PM, Carsten N. wrote:
No - you can not compile the TC source without modification. The
source code you can download from the website doesn't compile.
I downloaded v7.1a from truecrypt.org a few minutes ago, verified the
PGP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07.09.2013 02:08, The Doctor wrote:
On 09/06/2013 03:16 PM, Carsten N. wrote:
No - you can not compile the TC source without modification. The
source code you can download from the website doesn't compile.
I downloaded v7.1a from
shadowOps07:
Truecrypt is a open source software therefore NSA doesn't have back
door access to this particular software.
Without deterministic builds, and TrueCrypt isn't deterministically
build, [1] Open Source does not prevent backdoors, unless you compile
from source code. The ones who
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/06/2013 08:35 PM, Martin Weinelt wrote:
It clearly states you are missing a header file to compile the
thing. Try installing gnutls or nss to satisfy that depency, not
sure which one it needs. They both ship a pkcs11.h.
My apologies for
Hi,
two main german technology news sites are spreading news about the
study: »Users Get Routed: Traffic Correlation on Tor by Realistic
Adversaries« [1]
They write about 'broken anonymity' for Tor-users:
Tor-Nutzer surfen nicht anonym - Tor users do not surf anonymously
From http://translate.google.com/
On the basis of patterns can be easily identified despite Tor users
anonymity than expected. The have Aaron Johnson , Chris Wacek , Micah Sherr
and Paul Syverson studied in a scientific study . The authors have
investigated here the data that go into the Tor
16 matches
Mail list logo