RE: Help! Tor With Maxthon Web Browser

2006-11-15 Thread y0himba
You shouldn't need to no.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Vincent Ninefifty
Sent: Wednesday, November 15, 2006 3:05 AM
To: or-talk@freehaven.net
Subject: Re: Help! Tor With Maxthon Web Browser

I don't need to add anything with the bypass addresses beginning with:
box do I?
At the moment it's box just shows local

Thanks so far.

This is a resend without my signature which I believe hindered previous
requests in case you get a duplicate.

Vincent.

y0himba wrote: 

www.maxthon.com It's a wrapper for IE, not an actual browser. You
can go to
options then proxy then proxy setup. If you are running the
default
Tor/Privoxy configuration then hit the green + button at the top
right,
Name it TOR(Privoxy), address is localhost:8118 and speed is
faster.
If you want to use TOR alone without Privoxy(not recommended, less
secure),
Name it TOR(No Privoxy), address is localhost:9050, speed is
faster.

To use it, go to options, proxy, then select the proxy you want
to use.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of [EMAIL PROTECTED]
Sent: Tuesday, November 14, 2006 7:28 AM
To: or-talk@freehaven.net
Subject: Re: Help! Tor With Maxthon Web Browser

On Tue, Nov 14, 2006 at 10:22:00AM +, [EMAIL PROTECTED]
wrote
2.2K bytes in 94 lines about:
: How do I configure Tor to work with Maxthon web browser?

What's a maxthon browser?  Does it have options for SOCKS5?
Have you tried wrapping it with freecap?

: Tor recently tried sending out email messages which my anti-virus
: program kept spotting and I kept blocking.
: Am I supposed to do that?

Tor doesn't send emails.  If you have Tor configured as a
server, your anti-virus program is probably seeing someone
else's mail traffic.

: Is there a .exe program that I can use with my e-mail readers
currently
: Mozilla Thunderbird?

Use freecap, or setup Thunderbird to use Tor as a SOCKS
server.
I believe someone wrote up how to do this on the wiki.

--
Andrew
fortune: dd if=/dev/zero of=/dev/hda to test your performances of
hda ...

- Samuel Maftoul giving some sane advice

  






Re: Is tor the right choice?

2006-11-15 Thread WikiLeaks dot Org

We use something similar to freenet for the file store. Tor is only
one actor in the play. We've put a lot of thought into it how to make
it scalable and accessible and secure.

On 11/15/06, Watson Ladd [EMAIL PROTECTED] wrote:

WikiLeaks dot Org wrote:
 We seek volunteers to run tor gateway software on stable IPs with good
 connectivity.

 The political and legal risks are probably small compared to that of a
 full exit server. The bandwidth
 requirements are smaller too, but we ask that all nodes have at least
 1mbps up/down to aid responsiveness.

 WikiLeaks.org is a wikimedia project for the large scale dispersal of
 leaked documents.

 Thanks,
 Lucky

 ---
 FF6B 1C07 CB9A E501 F579  2020 E50E 8F25 1101 5F80

Considering that you want to publish leaked documents, I would suspect
that Freenet would be a better choice then a Tor hidden service.
Sincerely,

Watson Ladd

--
They who would give up essential Liberty to purchase a little temporary
Safety, deserve neither Liberty or Safety
--Benjamin Franklin





Storage of connection data committed by law for Tor servers in Germany?

2006-11-15 Thread Joerg Maschtaler
Hi,

today the Department of Justice in Germany announced a draft which
commits a provider of anonymization services to store data of
connections for the last six month.

A german version of the draft is available at
http://www.humanistische-union.de/fileadmin/hu_upload/doku/vorratsdaten/de-recht/bmj_2006.11.pdf
(22 MB)

An german article about that draft ist available at
http://www.heise.de/ct/hintergrund/meldung/81061


Maybe someone whos english is better than mine can translate important
parts or knows an english version of the draft?

regards,
joerg


Re: Storage of connection data committed by law for Tor servers in Germany?

2006-11-15 Thread Enigma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
I'm currently creating an article about this subject in English and
German language, I can post the link here once it's complete.

Sincerely,
Enigma

Joerg Maschtaler schrieb:
 Hi,

 today the Department of Justice in Germany announced a draft which
 commits a provider of anonymization services to store data of
 connections for the last six month.

 A german version of the draft is available at
 http://www.humanistische-union.de/fileadmin/hu_upload/doku/vorratsdaten/de-recht/bmj_2006.11.pdf
 (22 MB)

 An german article about that draft ist available at
 http://www.heise.de/ct/hintergrund/meldung/81061


 Maybe someone whos english is better than mine can translate important
 parts or knows an english version of the draft?

 regards,
 joerg



- --
German Tor mailing list / surveillance and anonymity:
http://www.anti1984.com

GPG key ID: 4096R/602492EA
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.5 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
 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=SgA4
-END PGP SIGNATURE-



Re: Anonymous Blogging

2006-11-15 Thread Ringo Kamens
Also, it would be more logical instead of having this convoluted camera
setup (which can be defeated by editing the contents of the tape) to
get a very cheap laptop to do all your questionable work on. Then, you
can always have it with you to ensure that the data isn't modified. I
would also like to add that I read somewhere that the power
fluctuations when the laptop charger draws power from the wall can be
read and turned into characters (which is just as effective as a
keylogger). You might also want to think about using a faraday cage to
protect from tempest attacks. Sound like overkill, it is and most of
these strategies are. My point here is that there isn't a bulletproof
way to keep your government from finding you. The best suggestion I
have is to find out about their abilities and always change your security procedures so that they can't predict what you will do. Best of luck comrade!
On 11/15/06, Fabian Keil [EMAIL PROTECTED] wrote:
RMS [EMAIL PROTECTED] wrote: Thanks for all the reply. I will consider using some of the mentioned techniques, maybe a live-cd to defeat key logger.
Remember that a LiveCD doesn't protect you against hardware key loggers. I am currently using Privoxy with Tor on Windows XP to make my connection anonymous. As I do not wish to filter my web browsing, I
 cleared the following three files so only Main Configuration has some parameters in it. Default Actions User Actions Filters Will this actions affect my anonymous status or it still remains the same?
If you don't enable hide-forwarded-for-headers you are sending yourclient's IP address to the web server. If you aren't using NAT,this will obviously affect your anonymity.This is probably the biggest issue, but of course most of Privoxy's
features are intended to make user tracking harder; if you disablethem you will be worse off then before, unless you find browser pluginswhich do the same.If you haven't already, you also might want to read Privoxy FAQ
4.8. Can Privoxy guarantee I am anonymous?:http://www.privoxy.org/faq/misc.html#AEN772Fabian--
http://www.fabiankeil.de/


Re: Anonymous Blogging

2006-11-15 Thread RMS

 If you don't enable hide-forwarded-for-headers you are sending your
 client's IP address to the web server. If you aren't using NAT,
 this will obviously affect your anonymity.

If you're running Privoxy on the machine you are using to browse, and
you're connecting using the address 127.0.0.1, the Forwarded-For
header should read 127.0.0.1, so there's no real threat.


I cannot find the parameter hide-forwarded-for-headers. Is it in one
of the files I had cleared?

Anyway, my masked IP was tested to be a Tor node from the detector.
Can I conclude that the 3 files can be safely cleared without
compromising on my anonymity?


Regards


Re: Anonymous Blogging

2006-11-15 Thread Fabian Keil
RMS [EMAIL PROTECTED] wrote:

   If you don't enable hide-forwarded-for-headers you are sending your
   client's IP address to the web server. If you aren't using NAT,
   this will obviously affect your anonymity.
 
  If you're running Privoxy on the machine you are using to browse, and
  you're connecting using the address 127.0.0.1, the Forwarded-For
  header should read 127.0.0.1, so there's no real threat.
 
 I cannot find the parameter hide-forwarded-for-headers. Is it in one
 of the files I had cleared?

It's usually in default action.
 
 Anyway, my masked IP was tested to be a Tor node from the detector.
 Can I conclude that the 3 files can be safely cleared without
 compromising on my anonymity?

You can use:
http://config.privoxy.org/show-request
to see how Privoxy is changing the request headers.

If you are using the setup jgt described (which is the default),
Privoxy should indeed only send 127.0.0.1. While this isn't enough
to compromise your anonymity by itself, it would still make user
tracking easier.

Fabian
-- 
http://www.fabiankeil.de/


signature.asc
Description: PGP signature