On Fri, Jul 30, 2010 at 12:32:43PM -0700, Seth David Schoen wrote:
The simplest threat scenario for Tor users would be when an
attacker in a position to observe a particular user's traffic,
but not any exit node traffic, hypothesizes that the user is
likely to visit a particular site and
On Wed, Mar 25, 2009 at 02:24:28PM -0400, Ringo Kamens wrote:
This sounds like it could be a cool project. You might look into running
it all inside a virtual machine with Qemu or VMWare. Damn Small Linux or
Knoppix would probably be a good distro to run in the virtual machine.
One constraint
On Sat, Jan 17, 2009 at 09:28:20PM +, mikel.ander...@juno.com wrote:
I understand and agree about getting too close to the bleeding-edge.
I look forward to TBB w/FF3, with anticipation. Thank you for all
your hard work.
Tor Browser Bundle 1.1.8 now includes Firefox 3 (3.0.5 to be
On Sun, Sep 28, 2008 at 12:27:11PM +, The23rd Raccoon wrote:
This post performs some basic analysis of the utility of timing
correlation attacks against a moderately used anonymous network,
specifically with respect to the Base Rate Fallacy[1] of Bayesian
statistics. Via that same
On Sun, Feb 03, 2008 at 02:36:10AM -0500, Silivrenion wrote:
I did notice torbrowser was in the directory format that is friendly with
PortableApps format applications, so props on that.
Interesting take, taking what Portable Tor http://portabletor.sf.net has
done and bringing it to an all
On Sun, Feb 03, 2008 at 10:19:54PM +0100, Michael Schmidt wrote:
Steven, i suggest to make it hardcoded default and a Must, that each user,
using this browser, is as well running an tor **exit** node,
tit for tat. like emule partials: upload is a MUST.
I don't think this is likely in the near
Recently I have been working on creating a distribution of Tor which
includes a pre-configured browser -- the Tor Browser Bundle. It is
intended for being run off an USB flash drive, but will probably also
be helpful to users who want an easy-to-setup packaging of Tor.
More information and
On Tue, Dec 11, 2007 at 03:59:59PM +0100, kazaam wrote:
I dunno how public it is but I found today this dissertation by
Steven Murdoch about attacking the tor-network via covert- and
sidechannels: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf
This results discussed aren't actually
8 matches
Mail list logo