Hi,
Is it true that email SMTP POP3 hosts (e.g. gmail's servers) can
obtain from SMTP POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
even though its over Tor?
If so, can't these be used to trace a
On 02/06/2011 11:59, Anon Mus wrote:
Is it true that email SMTP POP3 hosts (e.g. gmail's servers) can
obtain from SMTP POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
even though its over Tor?
I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I've been lucky so far, both times police contacted me I just said it was a Tor
exit node and it was ok.
On Jun 1, 2011, at 11:32 PM, Jim wrote:
Nils Vogels wrote:
Took a bunch of envelopes to explain the onion rings, but it worked :)
On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote:
On Wednesday 1 June, 2011 18:41:47 Marsh Ray wrote:
- VirtualBox VM bridged to LAN still must share the LAN class C, and
could potentially monitor internal traffic. (And please don't
quibble with me calling it a class
On Wednesday 1 June, 2011 18:41:47 you wrote:
Don't forget the host-only virtual networking that was suggested too.
The Host-only VM adapter does not mean guests will have Internet access; in
fact, they won't. vboxnet0 does not have a default gateway. To make vboxnet0
also serve queries
On Thursday 02 June 2011 07:24:27 t...@lists.grepular.com wrote:
Not sure. If I wanted to access my email over Tor, but using a proper
client rather than webmail, I'd probably set up fetchmail to fetch the
email using SSL secured POP3 over Tor, and drop it in a local Maildir,
and point
I hate to feed a troll, but many of us run relays that we monitor for
badness... it's hard to tell from your curt messages what exactly your
issue is or what your use case is. I'm certainly sure you're one of
very few people that have alleged Tor is coy about security. Maybe if
you laid your case
On Thu, Jun 2, 2011 at 11:35 AM, Joseph Lorenzo Hall joeh...@gmail.com wrote:
I hate to feed a troll, but many of us run relays that we monitor for
badness... it's hard to tell from your curt messages what exactly your
issue is or what your use case is. I'm certainly sure you're one of
very
I've run tor relays for years (linux) and have never ever had any security
issues. No compromises, no hacks, no nothing. Untouched.
praedor
On Thursday, June 02, 2011 09:51:37 am Geoff Down wrote:
On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote:
On Wednesday 1 June, 2011
t...@lists.grepular.com wrote:
On 02/06/2011 11:59, Anon Mus wrote:
Is it true that email SMTP POP3 hosts (e.g. gmail's servers) can
obtain from SMTP POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
I have faced several websites that exclude Tor users from Sign Up with
them,even configuring torrc to go through low speed ExitNodes(not associated
with spam) it is not possible.They must be using TorDNSEL,or so,and receiving
real time csv lists of ExitNodes and that way it is easy to exclude
On Thursday, June 2, 2011, Javier Bassi javierba...@gmail.com wrote:
What is think he is trying to say is that if someone finds a security
vulnerability in Tor/Vidalia (this has happened in the past) the
attacker can easily have a list of all IPs running relays, and may
compromise all their
does anyone here know of open .onion jabber server?
--
Jerzy Łogiewa -- jerz...@interia.eu
Dzwonki MP3 na telefon. To sa prawdziwe hity!
Pobierz http://linkint.pl/f29c2
___
tor-talk
On Wed, 2011-06-01 at 21:35 -0600, Jim wrote:
and...@torproject.org wrote:
On Wed, Jun 01, 2011 at 05:31:41AM +, krak...@googlemail.com wrote 1.9K
bytes in 45 lines about:
: A few weeks ago, there was one that tried to give me a .bin file
: whenever I tried to visit a non-SSL
On Thu, 2 Jun 2011 12:30:33 -0300
Javier Bassi javierba...@gmail.com wrote:
What is think he is trying to say is that if someone finds a security
vulnerability in Tor/Vidalia (this has happened in the past) the
attacker can easily have a list of all IPs running relays, and may
compromise all
On Thursday 2 June, 2011 09:53:05 Javier Bassi wrote:
On Thu, Jun 2, 2011 at 12:52 PM, t...@lists.grepular.com wrote:
If Tor has vulnerabilities, it might get exploited!
Of course, you can replace Tor with any other application name. Tor is
not special in this regard.
Yeah, thats why
Hi *,
Last year we (student group) did a research project called entry point
distribution in overlay networks. The information in the paper might be
useful in combination with Tor. The paper is available here:
http://pimpmyshell.org/entry_point_distribution_overlay_networks.pdf
regards,
Kevin.
On 02/06/2011 17:55, Anon Mus wrote:
Is it true that email SMTP POP3 hosts (e.g. gmail's servers) can
obtain from SMTP POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
even though its over Tor?
Jerzy Łogiewa wrote :
does anyone here know of open .onion jabber server?
ch4an3siqc436soc.onion:5222
--
Jerzy Łogiewa -- jerz...@interia.eu
___
tor-talk mailing list
tor-talk@lists.torproject.org
--- On Thu, 6/2/11, cac...@quantum-sci.com cac...@quantum-sci.com wrote:
For those interested, so far my best idea is
running the
daemon in a VirtualBox VM running SELinux as
guest, and
bridged to the outside. This should
substantially
solve most problems except membership in the
The Fight Against Browser FingerPrinting Creating New Firefox Release for
Non-Tor usage based on Tor Browser bundle
This post will be cross-posted to the blog where it was stated that Tor
Button will soon merge with the Firefox and it won't be a stand-alone add-on
anymore.
I don't understand
On Fri, Jun 3, 2011 at 10:59 AM, Roger Dingledine a...@mit.edu wrote:
On Fri, Jun 03, 2011 at 10:18:53AM +0800, Fernan Bolando wrote:
In my torrc, in order to use bridges that uses ports other than 80,443
Is it acceptable to simply use
ReachableAddresses *:*
or allowing only specific ports
22 matches
Mail list logo