defcon wrote:
so what do you all suggest if I must authenticate to a non ssl
connection? How do I do it anonymously and safely?
Apply the same security measures necessary to authenticate a non-SSL
connection without the use of Tor.
Why do you think it would be embarrassing? I'm fairly certain that some
exit nodes have been setup as research projects.
On Thu, 2008-06-05 at 21:49 -0700, Wesley Kenzie wrote:
snip
Or BostonUCompSci? It would be kind of embarrassing to Boston
University wouldn't it, if they were found to
Hi,
I'm reading the tor code and (if I've understood it) it looks like the
tor binary is sufficient for running either a relay or exit node.
i.e. tor-resolve is simply an extra utility for the end user to do DNS
resolution via tor rather than via one's DNS server as defined in
/etc/resolv.conf.
Hi,
dante wrote:
I'm reading the tor code and (if I've understood it) it looks like the
tor binary is sufficient for running either a relay or exit node.
i.e. tor-resolve is simply an extra utility for the end user to do DNS
resolution via tor rather than via one's DNS server as defined in
Hi!
I am using Gmail at https://mail.google.com/ with tor.
When I am at login, browser will state that the connection is only
partially secure, ie. some items (I do not know what) are not
encrypted. However, once I untor, I am able to get into the fully
secure Gmail login page.
I tried this for
Hi!
I am using Gmail at https://mail.google.com/ with tor.
When I am at login, browser will state that the connection is only
partially secure, ie. some items (I do not know what) are not
encrypted. However, once I untor, I am able to get into the fully
secure Gmail login page.
I tried
Man Man schrieb:
Hi!
Aloha!
I am using Gmail at https://mail.google.com/ with tor.
When I am at login, browser will state that the connection is only
partially secure, ie. some items (I do not know what) are not
encrypted. However, once I untor, I am able to get into the fully
secure
dante [EMAIL PROTECTED] wrote:
I'm reading the tor code and (if I've understood it) it looks like the
tor binary is sufficient for running either a relay or exit node.
Correct.
i.e. tor-resolve is simply an extra utility for the end user to do DNS
resolution via tor rather than via one's
I'm trying to implement the Tor Desktop as shown at freehaven on a Xubuntu
VMWare install. First, is this project dead? Secondly, how can I tell if
this is working. I'm a noob in Linux so any help is good. I didn't want to
use the Virtual Privacy Machine on metropipe as it seems too integrated
[Second try, now with a subscribed address ...]
Man Man [EMAIL PROTECTED] wrote:
I am using Gmail at https://mail.google.com/ with tor.
When I am at login, browser will state that the connection is only
partially secure, ie. some items (I do not know what) are not
encrypted. However, once
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
defcon @ 2008/06/06 02:20:
for http connections im worried about cookie sidejacking as well since
some sites only authenticate via https and set a cookie, what can we do
in this regard?
there's nothing to do in this case either. you have to
It also depends on what you are using Tor for.
If you are checking your e-mail (or whatever) that is associated with your
real identity, then use only HTTPS.
But if you are checking a different e-mail account that you have (1) setup
over Tor and (2) only use for anonymous purposes, then you run a
On Fri, Jun 06, 2008 at 10:30:21AM -0400, [EMAIL PROTECTED] wrote 1.3K bytes in
24 lines about:
: I'm trying to implement the Tor Desktop as shown at freehaven on a Xubuntu
: VMWare install. First, is this project dead? Secondly, how can I tell if
Perhaps you mean Tor at
No, I mean the project at:
http://wiki.noreply.org/noreply/VirtualPrivacyMachine. It uses TOR but
allows you to have a separate machine using QEMU or something like (i.e.
VMWare, VirtualBox, etc). So does this mean that no one knows?
Thanks,
Chris
On Fri, Jun 6, 2008 at 9:38 PM, [EMAIL
why would u need a seperate tor machine, when all you need is tor and some
firefox extensions?
On Fri, Jun 6, 2008 at 7:56 PM, Chris Burge [EMAIL PROTECTED] wrote:
No, I mean the project at:
http://wiki.noreply.org/noreply/VirtualPrivacyMachine. It uses TOR but
allows you to have a separate
On Fri, Jun 6, 2008 at 8:58 PM, defcon [EMAIL PROTECTED] wrote:
why would u need a seperate tor machine, when all you need is tor and some
firefox extensions?
The idea is to prevent any unknown security breeches from compromising
your anonymity. If, say, Firefox has a zero day exploit that
Here are a few other virtual anonymity machines:
- JanusVM [http://www.vmware.com/appliances/directory/392],
- xB Machine [http://xerobank.com/software.php],
I may be wrong but I thought one of the major problems with someone creating
a anonymity virtual machine has been keeping them up to date
17 matches
Mail list logo