RE: Wanted feature / option

2007-05-30 Thread Tony
Spammers use other peoples hacked PCs to send messages and the 'reply to' addresses are faked. So all in all, rather pointless... Regards, Tony. From: [EMAIL PROTECTED] on behalf of Kyle Williams Sent: Wed 30/05/2007 04:54 To: or-talk@freehaven.net Subject

RE: Sampled Traffic Analysis by Internet-Exchange-Level Adversaries

2007-05-29 Thread Tony
Windows has offered over 10 Gigabit throughput on a workstation (running Windows Server 2003) since 2005... http://www.amd.com/us-en/assets/content_type/DownloadableAssets/AMD_10_GbE_Performance_Paper_August05.pdf Regards, Tony. From: [EMAIL PROTECTED

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
No, its just SORBS, thay havnt got a clue. Avoid with long bargepole Tony. From: [EMAIL PROTECTED] on behalf of Karsten N. Sent: Fri 27/04/2007 09:03 To: or-talk@freehaven.net Subject: Re: Tor nodes blocked by e-gold Hi, I have checked a few long

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
SORBS marks TOR servers as zombie spammers I believe. Regards, Tony. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mike Cardwell Sent: 27 April 2007 16:23 To: or-talk@freehaven.net Subject: Re: Tor nodes blocked by e-gold Really? In which one

RE: Tor nodes blocked by e-gold

2007-04-27 Thread Tony
It has changed since SORBS blacklisted my TOR node then. It said it was Trojan infected or a zombie host at the time. I was told that this was triggered by just connecting to certain IRC networks. Maybe they have finally fixed their system. Regards, Tony. -Original Message- From

RE: Tor server web page?

2007-03-02 Thread Tony
Or http://83.245.15.87/ -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian C Sent: 02 March 2007 16:11 To: or-talk@freehaven.net Subject: Re: Tor server web page? Another example of what you're looking for: http://74.0.33.114/ Sam Creasey wrote: I

RE: Norwegian DNS compromized

2007-02-27 Thread Tony
Erm - isn't that censorship? Surely that defeats one of the main objectives of TOR. Once you add the capability to do that the Chinese will be blocking BBC.COM via TOR From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mr. Blue Sent: 27 February 2007 20:05 To:

RE: ISP controlling entry/exti (Low-Resource Routing Attacks Against Anonymous Systems)

2007-02-26 Thread Tony
http://www.brainfuel.tv/wp-content/uploads/2006/06/argue.jpg winmail.dat

RE: Security concerning Tor, BitTorrent and Firewall

2007-02-19 Thread Tony
For basic anonymity for bit torrent leeching try this https://www.relakks.com/ TOR doesn't have the bandwidth to spare. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of a a Sent: 19 February 2007 19:49 To: [EMAIL PROTECTED] Subject: Security concerning

RE: Re: PHP coder needs Tor details

2007-02-13 Thread Tony
Actually Windows does exactly the same thing. e.g. the 'Network Service' and 'Local Service' accounts. See http://www.microsoft.com/technet/security/midsizebusiness/topics/networksecurity/securingaccounts.mspx People seem to forget that the original and worst worm outbreak ever - that

RE: Re: PHP coder needs Tor details

2007-02-13 Thread Tony
@freehaven.net Subject: Re: Re: PHP coder needs Tor details On Tue, Feb 13, 2007 at 10:25:54AM -, Tony wrote: This is offtopic, but... Actually Windows does exactly the same thing. e.g. the 'Network Service' and 'Local Service' accounts. See http://www.microsoft.com/technet/security

RE: Some networking questions

2007-02-01 Thread Tony
1. a) Approx 50 metres. Depends on the environment, the cards, the transmission power and the wireless band / standard being used. b) No it wont extend it. You need a customised router or software that behaves as a wireless extender to do that. 2. See www.sveasoft.com for firmware for routers

RE: Relakks

2006-11-30 Thread Tony
. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of coderman Sent: 30 November 2006 18:29 To: or-talk@freehaven.net Subject: Re: Relakks On 11/30/06, Tony [EMAIL PROTECTED] wrote: If they use Relakks they they can make it much harder for the US governement to watch

RE: Could i use tor to login Paypal?

2006-08-31 Thread Tony
Hi, Paypal evaluate the fraud risks of user transactions for obvious reasons. Using anonymous proxies will be more likely to flag you as a potential fraudulent transaction or stolen account. I had the same issue as the below - once cleared they don't seem to flag it again for the same reason.

RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
: [EMAIL PROTECTED] on behalf of Anothony Georgeo Sent: Thu 08/06/2006 12:02 To: or-talk@freehaven.net Subject: RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc) Hi, --- Tony [EMAIL PROTECTED] wrote: Windows Server 2003 already comes with IIS6 The Tor

RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
-platform (Unix, etc) The other freedom that they don't mention is freedom from backdoors. Since no one can see the MS code and verify that it is free from government intrusion, there is good reason not to use it in an environment where such government intrusion could be detrimental. ...Ken Tony wrote

RE: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc)

2006-06-08 Thread Tony
June 2006 00:08 To: or-talk@freehaven.net Subject: Re: SHTTPD: Windows web-server, light-weight, stand-alone and multi-platform (Unix, etc) And so Code Red never existed? On Jun 8, 2006, at 10:23 AM, Tony wrote: That is simply not true - many people can check and review the source code

RE: Did you see this?

2006-05-19 Thread Tony
Hi. As the RIPA 3 is currently written there seem to be two big holes. 1. Destroy the key and retain proof that you destroyed it - eg microwave the USB key. It seems that the law is only really designed to cope with keys (passphrases) that you can remember. Therefore if you have a physical

RE: Did you see this?

2006-05-19 Thread Tony
2006 17:28 To: or-talk@freehaven.net Subject: Re: Did you see this? On Fri, May 19, 2006 at 03:11:20PM +0100, Tony wrote: :2. Keep multiple keys (e.g. a dummy volume). : :The act specifies that if there is more than one key, you can choose which key to give up! That just means you can revoke

RE: Some legal trouble with TOR in France

2006-05-15 Thread Tony
They send you to prison if you don't give up the information. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matej Kovacic Sent: 15 May 2006 07:57 To: or-talk@freehaven.net Subject: Re: Some legal trouble with TOR in France Hi, Under the British

RE: Some legal trouble with TOR in France

2006-05-15 Thread Tony
Yes apparently it's not in force yet. I'm sure its coming though. Although as currently written there seem to be a few loop holes - e.g. you can give up 'any' key and you can choose which key just so long it meets stated the requirements of the request. There isn't a requirement to give up 'all

RE: Some legal trouble with TOR in France +

2006-05-15 Thread Tony
Please define 'evil activities' -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Nick Mathewson Sent: 15 May 2006 23:59 To: or-talk@freehaven.net Subject: Re: Some legal trouble with TOR in France + On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Not to mention that under Bush, meeting the requirements of US law is not required either. And they have certainly never worried about other countries laws. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Eric H. Jung Sent: 14 May 2006 03:33 To:

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Talking of Microsoft; it is a claimed advantage of the new OS versions coming out such as Longhorn server - they include 'Bitlocker' encryption that is apparently highly secure and integrates with motherboard chipsets (TPM modules) to provide end to end code authentication and hardware security.

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
] On Behalf Of Lionel Elie Mamane Sent: 14 May 2006 14:58 To: or-talk@freehaven.net Subject: Re: Some legal trouble with TOR in France On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote: On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote: So if for instance they take your disks away

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Not if you didn't have them prior to receiving the notice and can prove it. e.g. after taking away your PC and realising it is encrypted they return with a notice. You then hand over token and say by the way I previously destroyed the data on it so I don't have the keys. You have met your legal

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
Nb - an interesting question arises with the use of TrueCrypt, etc. that have passkeys that can unlock different levels of data. If you have dummy volumes and provide the passkeys to just those have you met your legal requirements? The implication under the RIP act is that you have. (2) A

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
The whole point is that you ensure any keys are destroyed before you receive a formal request. It not 'evidence' until its requested by the authorities. It is believed there is code in all major manufacturer colour copiers and high end printers that can identify the printer serial number. It is

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
. In terms of using checksums to ensure your system hasn't been tampered with, the computer hardware could have a defense system against that such as trusted computing. Ringo Kamens On 5/14/06, Mike Zanker [EMAIL PROTECTED] wrote: On 14/5/06 15:10, Tony wrote: Nb- failure

RE: Some legal trouble with TOR in France

2006-05-14 Thread Tony
implemented a back-door for governments. They could store the private keys and passwords in videocard memory or in the boot sector or something like that. On 5/14/06, Tony [EMAIL PROTECTED] wrote: 2. The restrictions on encryption were removed some years ago. The best encryption software comes