A few questions and potential answers:

2010-09-20 Thread David Bennett
Bad Guys == Anyone blocking or monitoring a persons access to knowledge Q: What is to stop operatives working for the bad guys from running tor proxies from 3rd party locations? Granted, they would only be able to sample a portion of the traffic, but traffic that they did sample could lead to

Re: The best way to run a hidden service: one or two computers?

2010-09-20 Thread Robert Ransom
On Sun, 19 Sep 2010 07:11:21 -0400 hi...@safe-mail.net wrote: Robert Ransom: The VM is optional *if* and *only if* an attacker cannot possibly get root on your hidden service. How do external attackers get root access on a Linux system, and how do they then communicate with the system

Re: A few questions and potential answers:

2010-09-20 Thread Aplin, Justin M
On 9/20/2010 4:22 AM, David Bennett wrote: Bad Guys == Anyone blocking or monitoring a persons access to knowledge Granted. Q: What is to stop operatives working for the bad guys from running tor proxies from 3rd party locations? Granted, they would only be able to sample a portion of the

Re: The best way to run a hidden service: one or two computers?

2010-09-20 Thread hikki
Robert Ransom: If your web server and all of the interpreters and programs it runs are competently written, there is no way for an attacker to get root access, or even run a shell command. Web applications and the special-purpose interpreters they run on are often incompetently written.

Re: The best way to run a hidden service: one or two computers?

2010-09-20 Thread Gregory Maxwell
On Fri, Sep 17, 2010 at 10:41 PM, Robert Ransom rransom.8...@gmail.com wrote: If your hidden service really needs to be annoying to find, run it: * using only well-written, secure software, * in a VM with no access to physical network hardware, * on a (physical) computer with no non-hidden

Re: The best way to run a hidden service: one or two computers?

2010-09-20 Thread Robert Ransom
On Mon, 20 Sep 2010 09:58:14 -0400 hi...@safe-mail.net wrote: Robert Ransom: If your web server and all of the interpreters and programs it runs are competently written, there is no way for an attacker to get root access, or even run a shell command. Web applications and the

Privoxy doesn't start on booting

2010-09-20 Thread James Brown
OS - Ubuntu 9.10 on a laptop Privoxy version 3.0.13 Tor version 0.2.1.26 I have installed tor and privoxy and now I have the next problem. When I boot my system privoxy does not start as daemon and I need to start it manually (/etc/init.d/privoxy start). I have files with privoxy skripts in my

Re: Privoxy doesn't start on booting

2010-09-20 Thread Gitano
On 2010-09-20 19:39, James Brown wrote: OS - Ubuntu 9.10 on a laptop Privoxy version 3.0.13 Tor version 0.2.1.26 I have installed tor and privoxy and now I have the next problem. When I boot my system privoxy does not start as daemon and I need to start it manually (/etc/init.d/privoxy

Re: A few questions and potential answers:

2010-09-20 Thread Roger Dingledine
On Mon, Sep 20, 2010 at 03:22:57AM -0500, David Bennett wrote: Q: What is to stop operatives working for the bad guys from running tor proxies from 3rd party locations? Granted, they would only be able to sample a portion of the traffic, but traffic that they did sample could lead to