On 01.09.2011 13:24, Roger Dingledine wrote:
> Several people have asked us on irc about recent news articles like
> http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
>
> Apparently the Dutch police exploited vulnerabilities in the webservers
> reacha
On 08.09.2011 21:23, Matthew wrote:
>
> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
>
>
>
>
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-ta
On Thursday 08 September 2011 22:02:56 Andre Risling wrote:
> - Who stores the MAC address of the computer you're using? The ISP? An
> Webmail service?
On IPv4, a MAC address goes only as far as the local network (the MAC address
my router has on the WAN side goes to my ISP). On IPv6, if you ru
Andre Risling writes:
> I've some questions about MAC address and changing it
>
> - Why would someone want to change ("spoof") their MAC address?
The MAC address usually identifies a particular physical computer
to a local area network. If someone doesn't want their physical
computer to be reco
On Fri, Sep 9, 2011 at 12:11 AM, SpookFX wrote:
> Hi all,
> I am trying to create an app that allows you to choose a location for your
> end point, to that end I'm trying to get the location and fingerprint of
> endpoints from a torstatus server. I'd like to use something like curl or
> wget to ge
--
andr...@fastmail.fm
On Thursday, September 08, 2011 7:32 PM, "Seth David Schoen"
wrote:
> Andre Risling writes:
>
> > I've some questions about MAC address and changing it
> >
> > - Why would someone want to change ("spoof") their MAC address?
>
> The MAC address usually identifies
I've some questions about MAC address and changing it
- Why would someone want to change ("spoof") their MAC address?
- Is a computers MAC address sent out whenever you connect to the web?
-If it is, how often is it sent out?
- Who stores the MAC address of the computer you're using? The IS
> Very disturbing. I wonder if its possible to hide encrypted traffic as
> seemingly unencrypted http traffic in much the same way as a gpg key is
> rendered as ascii armored, or stenographically inside images. Although
> such methods may be inefficient, they may be good enough for some purpose
From: "Anthony G. Basile"
> On 09/08/2011 05:23 PM, Matthew wrote:
>>
>> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
>>
>>
>
> Very disturbing. I wonder if its possible to hide encrypted traffic as
> seemingly unencrypted http traffic in much the same way as a
Hi all,
I am trying to create an app that allows you to choose a location for your
end point, to that end I'm trying to get the location and fingerprint of
endpoints from a torstatus server. I'd like to use something like curl or
wget to get the data.
I'm open to suggestion, and ideas on how best
http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 09/08/2011 05:23 PM, Matthew wrote:
>
> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
>
>
Very disturbing. I wonder if its possible to hide encrypted traffic as
seemingly unencrypted http traffic in much the same way as a gpg key is
rendered as ascii armored
On 08/09/11 15:20, Joe Btfsplk wrote:
> My point was (& I think Julian's) was, aside from certificate issues,
> various practices of many sites where security is vitally important,
> their WORDS "~ we take customers' security & online safety very
> seriously & use high security standards...," and t
On Thu, Sep 8, 2011 at 7:40 AM, wrote:
> ...
> new laptop has the AES-NI CPU instruction set. I added this to my torrc:
>
> HardwareAccel 1
> AccelName aesni
>
> And now when I start Tor I get this:
>
> [notice] Using OpenSSL engine Intel AES-NI engine [aesni] for AES
nice! glad to know this
On 9/7/2011 3:42 PM, Marsh Ray wrote:
On 09/07/2011 03:19 PM, Julian Yon wrote:
My bank forces me to enter part of my password using unobscured
dropdowns "for security". Sure, it avoids keyloggers, but what about
*someone standing behind me*?
Do they have a gun? Otherwise, cover the screen wi
Hi,
I was just reading through the tor man page, and I came across the
HardwareAccel and AccelName options. This peaked my interest because my
new laptop has the AES-NI CPU instruction set. I added this to my torrc:
HardwareAccel 1
AccelName aesni
And now when I start Tor I get this:
[notic
On 09/08/2011 04:21 AM, Indie Intel wrote:
> The more I research this, the more it seems this sort of ``research''
> is more common than not. Wikileaks, Jacob Appelbaum, Adrian Lamo,
> Moxie Marlinspike... who else? Iran?!
>
> The Tor Project needs to shed some light on this or it will have a
> se
On Wed, Sep 07, 2011 at 07:21:21PM -0700, Indie Intel wrote:
> ``Moxie Marlinspike, probably the smartest guy in the world right now
>on SSL issues, did a study a few years ago on how many Tor users ??? not
>even regular users, but Tor users, clearly concerned about their privacy
>and possessed wit
On 9/7/2011 10:22 PM, Andrew Lewman wrote:
> On Wednesday, September 07, 2011 19:24:56 M Robinson wrote:
>> How do ID the 'no installation' packages?
>
> if you mean tor browser, then
>
> https://archive.torproject.org/tor-package-archive/torbrowser/
>
Thanks, again.
--
GnuPG is Free Software
On 08/09/11 03:21, Indie Intel wrote:
> The more I research this, the more it seems this sort of
> ``research''is more common than not. Wikileaks, Jacob Appelbaum,
> Adrian Lamo, Moxie Marlinspike... who else? Iran?!
You become good at implementing security by understanding how to break
it. Som
Thus spake Greg Kalitnikoff (kalitnik...@privatdemail.net):
> Andrew Lewman wrote:
> > Moxie is a smart guy, his answer to the CA issues, and therefore his own
> > sslsniff/sslstrip attack is currently http://convergence.io/. I think
> > Moxie's
> > on the list, he can reply as well.
>
> Do y
21 matches
Mail list logo