Re: [tor-talk] Routing Jitsi through Tor

2013-06-30 Thread Van Gegel
Jitsi now cann't route RTP through Tor becouse not supported RTP over TCP. Only Skype, Mumble and my forks of PGPFone and SpeekFrealy, and maybe some other rare apps can use TCP as a transport layer for voice. It makes no sense to use Tor to connect to the XMPP server only. All the same, the

Re: [tor-talk] Routing Jitsi through Tor

2013-06-30 Thread grarpamp
over 9050. The only thing that didn't happen was issuing a NEWNYM command. But would that have stopped the connection from happening? Maybe, sometimes Tor gets a little stuck, or the exit packetfilter's things after Tor finds a path. Using MAPADDRESS can help with testing exits. Also, a quick

Re: [tor-talk] Identify requests made by the same user

2013-06-30 Thread Katya Titov
Andrew F: krishna, Tor minimizes the variables that can Identify you via fingerprinting techniques, but a dedicated team can still track you with enough effort. I know form personal experience Andrew, I'm interested in any more light you can shine on this. I don't expect full details, but:

Re: [tor-talk] Binary patch downloads (for updating TBB)?

2013-06-30 Thread Cool Hand Luke
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/29, Mike Perry wrote: David Balažic: In that light, are there patches available to update between releases? It might reduce load on the servers too. We hope to support the Firefox updater in TBB soon. After some Tor Launcher cleanup,

[tor-talk] Secure email with limited usable metadata

2013-06-30 Thread alice-tor
everyone is tooting about pgp these. pgp encryption doesnt solve the problem of tla surveillance. pgp encryption does not touch metadata (recipent, sender). how to secure mail communication? i was thinking about pointing the mx record of the tld to a mail server that is shared with other

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Anthony Papillion
I would think that simply finding a mail server that doesn't log ANYTHING (like what StartMail is about to offer) and encrypting everything should be enough. Of course, you'd need to trust that the service really isn't logging anything but that could be solved by accessing it via Tor. So

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Jimmy Chen
This poses a really interesting question. Another solution would be to use already existing remailers, and doubling the encryption together with the TO: email in the inline plaintext. The question is how to properly do a dual encryption. My proposed solution is the following: Plaintext message

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread mirimir
On 06/30/2013 03:52 PM, alice-...@safe-mail.net wrote: everyone is tooting about pgp these. pgp encryption doesnt solve the problem of tla surveillance. pgp encryption does not touch metadata (recipent, sender). how to secure mail communication? There's an easy solution. Only communicate

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread alice-tor
I would think that simply finding a mail server that doesn't log ANYTHING (like what StartMail is about to offer) and encrypting everything should be enough. Of course, you'd need to trust that the service really isn't logging anything but that could be solved by accessing it via Tor. So

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread AK
That's why I'm setting up my own mail server at home. And also plan to access it via web interface if using someone else's machine (like at home). I would only allow web access via SSL and password, and only show the emails of the last week (not more). Trying postfix, dovecot, and SquirrelMail.

Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread AK
edit: someone one's else machine *like at work On Sun, Jun 30, 2013 at 6:18 PM, AK aka...@gmail.com wrote: That's why I'm setting up my own mail server at home. And also plan to access it via web interface if using someone else's machine (like at home). I would only allow web access via SSL