Re: [tor-talk] Tor Speculated Broken by FBI Etc - Freedom Hosting, MITTechReview - Magneto

2020-02-09 Thread Felix

Hi everybody

Am 2020-02-09 um 12:40 PM schrieb grarpamp:

Given the variety of known weaknesses, exploits, categories
of papers, and increasing research efforts against tor and
overlay networks in general, and the large number of these
"mystery gaps" type of articles (some court cases leaving hardly
any other conclusion with fishy case secrecy, dismissals, etc)...
the area of speculative brokeness and parallel construction
seems to deserve serious investigative fact finding project of
global case collation, interview, analysis to better characterize.

...

Early on August 2 or 3, 2013, some of the users noticed “unknown
Javascript” hidden in websites running on Freedom Hosting. Hours
later, as panicked chatter about the new code began to spread, the
sites all went down simultaneously. The code had attacked a Firefox
vulnerability that could target and unmask Tor users—even those using
it for legal purposes such as visiting Tor Mail—if they failed to
update their software fast enough.

While in control of Freedom Hosting, the agency then used malware that
probably touched thousands of computers. The ACLU criticized the FBI
for indiscriminately using the code like a “grenade.”

The FBI had found a way to break Tor’s anonymity protections, but the
technical details of how it happened remain a mystery.


https://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/

A malicious route around Tor was/is solvable by keeping the system
updated or by the use of techniques like Whonix or Tails.

--
Cheers, Felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] German court drains traffic data retention law

2017-06-22 Thread Felix
Should be the highest court in this case. space.net did it. Good for 
freedom of internet and communication.


https:// 
www.heise.de/newsticker/meldung/Oberverwaltungsgericht-Vorratsdatenspeicherung-ist-europarechtswidrig-3753179.html


10 days were left - so right in time :)

--
Cheers, Felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Manual Update of Tor-Network-Components in Tor-Browser

2015-12-06 Thread Felix

Hello,


I use an older Version of Tor-Browser on an old Linux-machine.

Tor seems to use a list of "initial Tor-Nodes to contact" when I 
establish a connection to the Tor-Network (i.e. turtles.fscked.org). 
Some entries in this list (i.e. the IP-Adresse 212.112.245.170) seem 
not to be valid anymore and cannot be contacted. Is it possible to 
update this list without updating the Tor-Browser-Package?


Or ist this Node (212.112.245.170) still valid and do I have a 
Network-Problem?


Thanks, regards

Felix




--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Manual Update of Tor-Network-Components in Tor-Browser

2015-12-01 Thread Felix

Hello,

I use an older Version of Tor-Browser on an old Linux-machine.

Tor seems to use a list of "initial Tor-Nodes to contact" when I 
establish a connection to the Tor-Network (i.e. turtles.fscked.org). 
Some entries in this list (i.e. the IP-Adresse 212.112.245.170) seem not 
to be valid anymore and cannot be contacted. Is it possible to update 
this list without updating the Tor-Browser-Package?


Or ist this Node (212.112.245.170) still valid and do I have a 
Network-Problem?


Thanks, regards

Felix


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How can I verify that this "Onionshare" program is indeed the one intended for me to get?

2015-11-15 Thread Felix Eckhofer

Hey.

Am 15.11.2015 11:28, schrieb Qaz:

How do I do the hashing? Sorry really ignorant about it. Do I just type
sha256sum  ? Or what?


Hashing the deb is most likely not going to work. Having a build process 
that results in a bit-wise identical binary is a hard problem (search 
for "reproducible build" if you're interested). You should use the 
verification tools provided, that is the detached signature for 
pre-built binaries and the signed commits when building from source (see 
my other mail).



Regards
felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How can I verify that this "Onionshare" program is indeed the one intended for me to get?

2015-11-14 Thread Felix Eckhofer

Hi.

Am 14.11.2015 15:00, schrieb Qaz:
If you guys don't mind, could someone tell me how I can verify that 
this

Onionshare program is indeed the one intended for me to get? I haven't
seen anything or instructions like verification unlike on Macs and
Windows.
https://github.com/micahflee/onionshare/blob/master/BUILD.md#gnulinux


The release tags for onionshare in Git are signed, so to verify the 
current version use:


$ git tag --verify 0.7.1

If you are happy with the result, checkout the release

$ git checkout 0.7.1

and then continue with building your package.


Regards
felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question Regarding Routing of Network-Traffic using Tor-Browser

2015-11-01 Thread Felix

Hello,

I read the linked Page and understand most of the ideas behind the 
concept of using only a few number of Entry-Guadrs. However, as I 
understand Entry Guards are chosen by Parameters like Response-Time or 
Network-Bandwidth.


If  i.e North Corea. would like to control the Tor-Network in NC, NC 
would have to do the following things:


1. Slow down (or disable) the rest of the Internet from outside NC 
extremely.

2. Setup some fast Tor-Servers (Primary Entry Guards) inside NC.
3. Provide fast Tor-Relays (inside NC) that are accessible from these 
Entry Guards (other Tor-Relays are slow from or inaccessible these Entry 
Guards)

4. Provide (fast) Exit-Nodes inside NC.

In this scenario the fast Primary Entry Guards would proably the chosen 
for almost any Network-Traffic using Tor, and I could at least see which 
IP-Source-Adresse would bei using Tor.


If the rest of the Tor-Network would rely on Performance-Data for 
Routing the Traffic, NC could proably also see the Tor-Relays (and maybe 
even the Exit-Nodes) - so Tor would be (somehow) useless.


So in my opinion it would be at least a good (configurable) option to 
provide dynamic switching of the Entry-Guards - as this would at least 
make it more difficult to trace every move of a Tor-User.


Regards,

Felix



Am 01.11.2015 02:24, schrieb Harmony:

Felix:

Hello,

I am from Germany and I use the Tor-Browser very often. I think Tor is a
great product.

I have a question regarding the connection from my Tor-Browser to the
Tor-Network.

I noticed, that Tor tends to always connect to the same Tor-Relays on
the internet. I can observe this when I monitor the connections using
Netstat on my Linux-machine - even after restart of the Tor-Browser or
even after a reboot of the Linux-machine.

So my initial Idea was to delete the "cached*-files" in the
/Data/Tor-Directory before each start - but this does not help - Tor
always connects basically to the same Tor-Nodes all the time. I think
this is probably due to an internal "ranking" in the Tor-Network.

So my question is, would´nt it be better (or more secure) for the
End-User, if the Tor-Browser (or the Onion-Router) would change the used
Tor-Relays i.e. every 5 minutes. As the Tor-Browser connects to more
than one Tor-Relay, this could be staged, Drop Tor-Relay 1 after
connection to Tor-Relay 3 has been established i.e.

Are there any plans to enhance the Tor-Network / the Tor-Browser in this
direction?

Hello Felix,

https://www.torproject.org/docs/faq#EntryGuards

This is in fact a safety mechanism that Tor uses, as explained in the
above link. If your browser connected to new 'first-hop' relays every
time, there would be a greater chance that one day all the relays in
your circuit are attacking you. By picking one (or a few) guards only
and cycling them rarely, it is that much more tedious for anyone who is
waiting until you pick their bad relay in order to attack you.

Tor certainly did at one stage change its circuits after ten minutes, as
you suggest, but for various reasons this was altered, and in any case
Tor Browser itself manages circuits in a different way to the core Tor
program. It's a much-discussed question and no one yet has the perfect
answer.

If for some reason you really do need to change the guards that your
browser is using, the file to delete is called 'state', and it is under
Browser/TorBrowser/Data/Tor (on Linux). Generally, however, you should
not do that.

[I am not an expert on any of the above.]

Thanks,


Thank you very much.

Regards,

Felix


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question Regarding Routing of Network-Traffic using Tor-Browser

2015-11-01 Thread Felix
O.K., I found a workaround, I edited the File start-tor_browser and
inserted a command at the beginning, that deletes the State-File in
/Data/Tor.

Thank you, Harmony...


Am 01.11.2015 11:12, schrieb Tom van der Woerdt:
> Felix,
>
> Guards' network speeds are assessed based on the view of the network, not the 
> client. What this means for your North Korea example is that the government 
> couldn't affect path selection by slowing down the network, as Tor will still 
> pick the same guards. 
>
> Tom
>
>
>> On 01 Nov 2015, at 11:10, Felix <felix.wiedenr...@gmx.de> wrote:
>>
>> Hello,
>>
>> I read the linked Page and understand most of the ideas behind the concept 
>> of using only a few number of Entry-Guadrs. However, as I understand Entry 
>> Guards are chosen by Parameters like Response-Time or Network-Bandwidth.
>>
>> If  i.e North Corea. would like to control the Tor-Network in NC, NC would 
>> have to do the following things:
>>
>> 1. Slow down (or disable) the rest of the Internet from outside NC extremely.
>> 2. Setup some fast Tor-Servers (Primary Entry Guards) inside NC.
>> 3. Provide fast Tor-Relays (inside NC) that are accessible from these Entry 
>> Guards (other Tor-Relays are slow from or inaccessible these Entry Guards)
>> 4. Provide (fast) Exit-Nodes inside NC.
>>
>> In this scenario the fast Primary Entry Guards would proably the chosen for 
>> almost any Network-Traffic using Tor, and I could at least see which 
>> IP-Source-Adresse would bei using Tor.
>>
>> If the rest of the Tor-Network would rely on Performance-Data for Routing 
>> the Traffic, NC could proably also see the Tor-Relays (and maybe even the 
>> Exit-Nodes) - so Tor would be (somehow) useless.
>>
>> So in my opinion it would be at least a good (configurable) option to 
>> provide dynamic switching of the Entry-Guards - as this would at least make 
>> it more difficult to trace every move of a Tor-User.
>>
>> Regards,
>>
>> Felix
>>
>>
>>
>> Am 01.11.2015 02:24, schrieb Harmony:
>>> Felix:
>>>> Hello,
>>>>
>>>> I am from Germany and I use the Tor-Browser very often. I think Tor is a
>>>> great product.
>>>>
>>>> I have a question regarding the connection from my Tor-Browser to the
>>>> Tor-Network.
>>>>
>>>> I noticed, that Tor tends to always connect to the same Tor-Relays on
>>>> the internet. I can observe this when I monitor the connections using
>>>> Netstat on my Linux-machine - even after restart of the Tor-Browser or
>>>> even after a reboot of the Linux-machine.
>>>>
>>>> So my initial Idea was to delete the "cached*-files" in the
>>>> /Data/Tor-Directory before each start - but this does not help - Tor
>>>> always connects basically to the same Tor-Nodes all the time. I think
>>>> this is probably due to an internal "ranking" in the Tor-Network.
>>>>
>>>> So my question is, would´nt it be better (or more secure) for the
>>>> End-User, if the Tor-Browser (or the Onion-Router) would change the used
>>>> Tor-Relays i.e. every 5 minutes. As the Tor-Browser connects to more
>>>> than one Tor-Relay, this could be staged, Drop Tor-Relay 1 after
>>>> connection to Tor-Relay 3 has been established i.e.
>>>>
>>>> Are there any plans to enhance the Tor-Network / the Tor-Browser in this
>>>> direction?
>>> Hello Felix,
>>>
>>> https://www.torproject.org/docs/faq#EntryGuards
>>>
>>> This is in fact a safety mechanism that Tor uses, as explained in the
>>> above link. If your browser connected to new 'first-hop' relays every
>>> time, there would be a greater chance that one day all the relays in
>>> your circuit are attacking you. By picking one (or a few) guards only
>>> and cycling them rarely, it is that much more tedious for anyone who is
>>> waiting until you pick their bad relay in order to attack you.
>>>
>>> Tor certainly did at one stage change its circuits after ten minutes, as
>>> you suggest, but for various reasons this was altered, and in any case
>>> Tor Browser itself manages circuits in a different way to the core Tor
>>> program. It's a much-discussed question and no one yet has the perfect
>>> answer.
>>>
>>> If for some reason you really do need to change the guards that your
>>> browser is using, the file to delete is called 'state', and it is under
>>> Browser/TorBrowser/Data/Tor (on Linux). Generally, however, you should
>>> not do that.
>>>
>>> [I am not an expert on any of the above.]
>>>
>>> Thanks,
>>>
>>>> Thank you very much.
>>>>
>>>> Regards,
>>>>
>>>> Felix
>> -- 
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question Regarding Routing of Network-Traffic using Tor-Browser

2015-11-01 Thread Felix
O.K., so if the Guards that are used are based on the view of the
network, this means NC knows which Entry-Guards are accessed from users
within NC, so the next approach would be to fake these Entry-Guards
(IPs) from within the country (Lets setup a Tor-Node inside NC, that
uses the same IP as the Tor-Node that would be accessed from outside NC)...

Isn´t Kim Jong-UN a smart guy somehow? ;-)

Am 01.11.2015 11:12, schrieb Tom van der Woerdt:
> Felix,
>
> Guards' network speeds are assessed based on the view of the network, not the 
> client. What this means for your North Korea example is that the government 
> couldn't affect path selection by slowing down the network, as Tor will still 
> pick the same guards. 
>
> Tom
>
>
>> On 01 Nov 2015, at 11:10, Felix <felix.wiedenr...@gmx.de> wrote:
>>
>> Hello,
>>
>> I read the linked Page and understand most of the ideas behind the concept 
>> of using only a few number of Entry-Guadrs. However, as I understand Entry 
>> Guards are chosen by Parameters like Response-Time or Network-Bandwidth.
>>
>> If  i.e North Corea. would like to control the Tor-Network in NC, NC would 
>> have to do the following things:
>>
>> 1. Slow down (or disable) the rest of the Internet from outside NC extremely.
>> 2. Setup some fast Tor-Servers (Primary Entry Guards) inside NC.
>> 3. Provide fast Tor-Relays (inside NC) that are accessible from these Entry 
>> Guards (other Tor-Relays are slow from or inaccessible these Entry Guards)
>> 4. Provide (fast) Exit-Nodes inside NC.
>>
>> In this scenario the fast Primary Entry Guards would proably the chosen for 
>> almost any Network-Traffic using Tor, and I could at least see which 
>> IP-Source-Adresse would bei using Tor.
>>
>> If the rest of the Tor-Network would rely on Performance-Data for Routing 
>> the Traffic, NC could proably also see the Tor-Relays (and maybe even the 
>> Exit-Nodes) - so Tor would be (somehow) useless.
>>
>> So in my opinion it would be at least a good (configurable) option to 
>> provide dynamic switching of the Entry-Guards - as this would at least make 
>> it more difficult to trace every move of a Tor-User.
>>
>> Regards,
>>
>> Felix
>>
>>
>>
>> Am 01.11.2015 02:24, schrieb Harmony:
>>> Felix:
>>>> Hello,
>>>>
>>>> I am from Germany and I use the Tor-Browser very often. I think Tor is a
>>>> great product.
>>>>
>>>> I have a question regarding the connection from my Tor-Browser to the
>>>> Tor-Network.
>>>>
>>>> I noticed, that Tor tends to always connect to the same Tor-Relays on
>>>> the internet. I can observe this when I monitor the connections using
>>>> Netstat on my Linux-machine - even after restart of the Tor-Browser or
>>>> even after a reboot of the Linux-machine.
>>>>
>>>> So my initial Idea was to delete the "cached*-files" in the
>>>> /Data/Tor-Directory before each start - but this does not help - Tor
>>>> always connects basically to the same Tor-Nodes all the time. I think
>>>> this is probably due to an internal "ranking" in the Tor-Network.
>>>>
>>>> So my question is, would´nt it be better (or more secure) for the
>>>> End-User, if the Tor-Browser (or the Onion-Router) would change the used
>>>> Tor-Relays i.e. every 5 minutes. As the Tor-Browser connects to more
>>>> than one Tor-Relay, this could be staged, Drop Tor-Relay 1 after
>>>> connection to Tor-Relay 3 has been established i.e.
>>>>
>>>> Are there any plans to enhance the Tor-Network / the Tor-Browser in this
>>>> direction?
>>> Hello Felix,
>>>
>>> https://www.torproject.org/docs/faq#EntryGuards
>>>
>>> This is in fact a safety mechanism that Tor uses, as explained in the
>>> above link. If your browser connected to new 'first-hop' relays every
>>> time, there would be a greater chance that one day all the relays in
>>> your circuit are attacking you. By picking one (or a few) guards only
>>> and cycling them rarely, it is that much more tedious for anyone who is
>>> waiting until you pick their bad relay in order to attack you.
>>>
>>> Tor certainly did at one stage change its circuits after ten minutes, as
>>> you suggest, but for various reasons this was altered, and in any case
>>> Tor Browser itself manages circuits in a different way to the core Tor
>>> program. It's a much-discussed question and no one 

[tor-talk] Question Regarding Routing of Network-Traffic using Tor-Browser

2015-10-31 Thread Felix

Hello,

I am from Germany and I use the Tor-Browser very often. I think Tor is a 
great product.


I have a question regarding the connection from my Tor-Browser to the 
Tor-Network.


I noticed, that Tor tends to always connect to the same Tor-Relays on 
the internet. I can observe this when I monitor the connections using 
Netstat on my Linux-machine - even after restart of the Tor-Browser or 
even after a reboot of the Linux-machine.


So my initial Idea was to delete the "cached*-files" in the 
/Data/Tor-Directory before each start - but this does not help - Tor 
always connects basically to the same Tor-Nodes all the time. I think 
this is probably due to an internal "ranking" in the Tor-Network.


So my question is, would´nt it be better (or more secure) for the 
End-User, if the Tor-Browser (or the Onion-Router) would change the used 
Tor-Relays i.e. every 5 minutes. As the Tor-Browser connects to more 
than one Tor-Relay, this could be staged, Drop Tor-Relay 1 after 
connection to Tor-Relay 3 has been established i.e.


Are there any plans to enhance the Tor-Network / the Tor-Browser in this 
direction?


Thank you very much.

Regards,

Felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TIMB vs TextSecure

2014-03-02 Thread Felix Eckhofer

Ted,

Am 01.03.2014 19:12, schrieb Ted Smith:
For text messaging, anonymity in the Tor sense doesn't make sense. 
Phone

numbers are the only identifier you have for obvious reasons.


not really. There are plans for a desktop client with email as 
identifier. Also, opting out of out-discovery of contacts (i.e. sending 
your whole address book to the push server) is both planned and 
necessary.


Other than that I agree - the Tor use-case is a different one.


felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TIMB vs TextSecure

2014-03-01 Thread Felix Eckhofer

Hey.

Am 01.03.2014 08:23, schrieb Gordon Morehouse:

With the news hitting some tech sites about TIMB, I went digging
around briefly to find the reasoning for rolling something anew rather
than backing e.g. TextSecure. (I know there are serious questions
about the security of Telegram.)

I'm sure there is a good reason, but what is it?


Using Tor gives you a few properties that no other instant messaging 
solution can currently provide.


 - The IM server can not learn your IP.
 - A network observer can not learn that you are using IM (just that you 
are using Tor).

 - You cannot block the IM service without blocking Tor.

Furthermore, there are (in my opinion) still some serious problems with 
TextSecure, most importantly:


 - Only phone numbers as identifiers.
 - Sends your address book to the server in full (hashed, but that 
doesn't mean anything for phone numbers). No opt-out if you want to use 
the push transport.

 - Requires Google Play to be installed and uses GCM for notifications.

Though moxie has plans to address these problems, they currently exist.


felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Using HTTPS Everywhere to redirect to .onion

2014-02-27 Thread Felix Eckhofer

Hey.

Am 27.02.2014 00:27, schrieb fortasse:

My question is does this have more potential than being a weird
(rather effective) hack? Could we make an onion Everywhere as it
were to help solve the difficult-to-remember onion names? Or is this
just another layer of confusion that further increases the barrier of
entry on successful Tor use?


That seems like a dangerous idea. Anyone could easily set up a 
transparent proxy behind a .onion domain. If I can convince your project 
to include that .onion (which sounds easy given that most site owners 
will not know about it) I now have active MITM capability against anyone 
using that extension.
You would have to make it very clear that it is a censorship-resistance 
tool, not a privacy tool.



felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Verifying node operator identity (was: New paper : Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries)

2013-10-17 Thread Felix Eckhofer

Joe,

Am 17.10.2013 02:42, schrieb Joe Btfsplk:

What about somehow getting a better handle on who actually runs the
nodes?


tried very hard to find any suggestion on how this might work in your 
mail to no avail. Are you actually suggesting extensive personal 
interviews, background checks, giving polygraph tests, injecting sodium 
pentathol to those wanting to run nodes and expect some form of serious 
feedback?



felix
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk