Re: How does Gmail know my local time zone (therefore ignoring the time zone of the Tor exit node) and what else can it see?

2010-09-07 Thread Jan Weiher
If Gmail can get the time zone via JavaScript (when the client is using Tor) then why can it not get the real IP also via JavaScript (when the client is using Tor)? I don't think it can get the real IP since I have used various tests including http://www.decloak.net/ and Tor with JavaScript

Re: Virtual Machines - what is their use?

2010-10-12 Thread Jan Weiher
Hello, I think there are two useful usecases for a vm in combination with tor: For Hidden Services: If you run your HS inside a VM, it is harder for a imaginary attacker to gather the location / identity of the HS. For a simple User: If you run all the applications inside a vm, it is easier for

Re: Hints and Tips for Whistleblowers - their comments on Tor and SSL - I don't understand.

2010-10-27 Thread Jan Weiher
Hi, I don't understand, too and in my opinion, this is utter nonsense. I'm not aware of any negative impacts on privacy due to the usage of https://, but without, there is the danger of eavesdropping at the exit node. best regards, Jan Am 27.10.2010 20:19, schrieb Matthew: Hello, There

Re: Hints and Tips for Whistleblowers - their comments on Tor and SSL - I don't understand.

2010-10-27 Thread Jan Weiher
Hi, Am 27.10.2010 20:55, schrieb Joe Btfsplk: On 10/27/2010 1:19 PM, Matthew wrote: Hello, There is a Hints and Tips for Whistleblowers Guide available at http://ht4w.co.uk/. Thanks for the link. I'm not sure this is a good ressource, due to the misinformation it is spreading. Don't

Re: Hints and Tips for Whistleblowers - their comments on Tor and SSL - I don't understand.

2010-10-27 Thread Jan Weiher
Am 27.10.2010 21:04, schrieb Andrew Lewman: On Wed, 27 Oct 2010 19:19:02 +0100 Matthew pump...@cotse.net wrote: There is a Hints and Tips for Whistleblowers Guide available at http://ht4w.co.uk/. The first problem is the content is actually served up by hostingprod.com and not

Re: Crypto for hidden services [was: TorFaq on https]

2010-10-29 Thread Jan Weiher
Hi, just wanted to add one thing: There is no real reason not to use another layer of cryptography on top of Tor hidden services. Using HTTPS, and convincing users to use HTTPS, is far harder than merely using another layer of cryptography, and provides no real benefit. And (from a user

Re: Debian/Ubuntu tor users, please check for core files

2010-11-25 Thread Jan Weiher
Hi, no core files on my Ubuntu 8.04 relay. regards, Jan Am 25.11.2010 04:29, schrieb Walt Mankowski: On Wed, Nov 17, 2010 at 03:17:41PM -0500, Roger Dingledine wrote: Hi folks, If you use our debs on Debian or Ubuntu, can you please do ls -la /var/lib/tor/core* as root, and let us know

Re: geeez...

2011-01-12 Thread Jan Weiher
Am 12.01.2011 09:32, schrieb Timo Schoeler: thus Mike Perry spake: Some of us are also compiling abuse response templates. The goal for abuse responses is to inform people about Tor, and to suggest solutions for their security problems that involve improving their computer security for

Re: Tor relay on vserver exeeding numtcpsock

2011-01-13 Thread Jan Weiher
2011/1/13 Olaf Selke olaf.se...@blutmagie.de: On 12.01.2011 22:02, coderman wrote: On Wed, Jan 12, 2011 at 7:57 AM, Klaus Layer klaus.la...@gmx.de wrote: ... Error creating network socket: No buffer space available errors. The numtcpsocks parameter limit is set to 550 on the vserver. Before

Re: exit node config for egypt IP range

2011-01-28 Thread Jan Weiher
Am 28.01.2011 19:13, schrieb Moritz Bartl: According to some Twitter users, only DNS is down. Third party DNS (or Tor) work. This differs from ISP to ISP, it looks like they tried to f*ck up the net as much as possible. A lot of routes to egyptian ISPs just disappeared from the global routing

Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher
Hi, while scrolling through the tor status page (torstatus.blutmagie.de), I stumpled upon the following node (the reason why it came to my eye was the long uptime): gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2 2A70 654D 3B92 This node looks suspicious to me, because there is no contact info

Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher
Am 29.01.2011 20:13, schrieb Jon: On Sat, Jan 29, 2011 at 12:46 PM, Jan Weiher j...@buksy.de wrote: Hi, while scrolling through the tor status page (torstatus.blutmagie.de), I stumpled upon the following node (the reason why it came to my eye was the long uptime): gatereloaded 550C C972

Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher
Am 29.01.2011 21:27, schrieb Gitano: On 2011-01-29 19:46, Jan Weiher wrote: while scrolling through the tor status page (torstatus.blutmagie.de), I stumpled upon the following node (the reason why it came to my eye was the long uptime): gatereloaded 550C C972 4FA7 7C7F 9260 B939 89D2

Re: Is gatereloaded a Bad Exit?

2011-01-29 Thread Jan Weiher
Am 29.01.2011 21:44, schrieb Andrew Lewman: On Sat, 29 Jan 2011 19:46:20 +0100 Jan Weiher j...@buksy.de wrote: This node looks suspicious to me, because there is no contact info given and the exit policy allows only unencrypted traffic: It hasn't shown up in any of the exit scans

Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Jan Weiher
At some point, we intend to shrink exit policies further as Tor scales to more decentralized schemes. Those exit policies will likely be represented as bits representing subsets of ports. When that time comes, we will very likely combine encrypted and unencrypted versions of ports together,

Re: Is gatereloaded a Bad Exit?

2011-01-30 Thread Jan Weiher
I'm aware of the fact that it is not recommended to use tor without additional encryption, but some users do. And I dont see any reason for only allowing unencrypted traffic than snooping? [...] I don't see why any of this really matters. Anyone running tor should have the good sense to

Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Jan Weiher
Assuming the worse, and disregarding volunteer exit bandwidth without some proper investigation, doesn't sound like a good approach to me... Nobody does that, but I think its fair to say that if you want that somebody can contact you about your node, you publish your contact details in the

Re: Is gatereloaded a Bad Exit?

2011-01-31 Thread Jan Weiher
You make it sound as though running an Exit node is a privilege and that people who run them somehow owe the Tor project? They're volunteering bandwidth, for the benefit of the network. This was not my intention. But I think it should be possible to ask a volunteer about what he is doing?

Re: What are email risks?

2011-02-02 Thread Jan Weiher
In email, what are anonymity risks? Header contains sender domain (maybe IP) but what else? Probably the whole header. But except from the obvious I would especially look for the received: lines, the date (because it might contain your timezone) and the X-Mailer header (shows your user

Re: cease and desist from my vps provider...

2011-02-03 Thread Jan Weiher
Interesting. Hetzner is officially down on anything which causes them trouble (benji said so himself, repeatedly), so they're effectively accepting of a Tor middleman, but Tor exits are probably going to be pretty short-lived in Hetzner space. If you got your own IP space with own ripe