TOR-Admin (gpfTOR1) schrieb:
or you may try the free SSL-service at
http://cert.startcom.org/
It is accepted by Mozilla browsers by default.
Not anymore, since you have to integrate a so called intermediate
certificates in the servers and clients to fix an CA update issue:
...On the 24th
hi all,
I've just read a couple of interesting blog posts which I like to share
with you. Nothing really new, but they denote a growing interest in the
deanonymizing tor field.
ha.ckers original post:
http://ha.ckers.org/blog/20070926/de-anonymizing-tor-and-detecting-proxies/
Maone followup:
BlueStar88 schrieb:
...On the 24th of December we updated our Intermediate CA certificates
and added a few needed extension to the original certificate. The public
key however did not change and all subscriber certificates are perfectly
valid. Please follow the instructions below to update
On 27.09.2007 10:32:51, Marco Bonetti wrote:
hi all,
I've just read a couple of interesting blog posts which I like to share
with you. Nothing really new, but they denote a growing interest in the
deanonymizing tor field.
ha.ckers original post:
[EMAIL PROTECTED] wrote:
Then after agreeing to the TOS, you are able to connect to tor servers,
but all dns requests go through a library computer IP, such that they
can see and record where you are going. I am not sure if they can see
the TCP content, but the UDP (which I assume is the dns
On Thu, Sep 27, 2007 at 12:32:43AM -0500, [EMAIL PROTECTED] wrote 4.8K bytes in
87 lines about:
I can confidently state that arguing about mailing list etiquette
is a futile pursuit. As someone who lived through The Day when AOLers
were given usenet access in 1994, I understand the breaking of
On 9/27/07, Benjamin Schieder [EMAIL PROTECTED] wrote:
On 27.09.2007 10:32:51, Marco Bonetti wrote:
hi all,
I've just read a couple of interesting blog posts which I like to share
with you. Nothing really new, but they denote a growing interest in the
deanonymizing tor field.
On Thu, 27 Sep 2007 19:52:30 -0500 (CDT), Scott Bennett
[EMAIL PROTECTED] said:
On Thu, 27 Sep 2007 20:35:58 -0400 Watson Ladd
[EMAIL PROTECTED]
wrote:
[EMAIL PROTECTED] wrote:
Then after agreeing to the TOS, you are able to connect to tor servers,=
but all dns requests go
On Thu, 27 Sep 2007 20:35:58 -0400 Watson Ladd [EMAIL PROTECTED]
wrote:
[EMAIL PROTECTED] wrote:
Then after agreeing to the TOS, you are able to connect to tor servers,=
but all dns requests go through a library computer IP, such that they
can see and record where you are going. I am not
PDFs are another example that will leak your real IP address.
An example of this can be found here.
http://www.janusvm.com/goldy/pdf/
Can you check your logs to see if this leaked me?
Pacific daylight time: 9:40 pm
Real IP address (this time, dynamic): 76.175.149.74
Apple Preview, opened
10 matches
Mail list logo