On Thu, Jul 3, 2014 at 12:52 AM, Roman wrote:
On Thu, 3 Jul 2014 04:15:37 -
Paul wrote:
It appears to me that xxx is blocking access to its site by users
using TOR.
On an unrelated note, yesterday a user reported they can't access a blog on
livejournal.com via Tor. Even not trying to
Confirmed. One of many that provides the same error message:
Access Denied
You don't have permission to access http://www.visa.com/; on this server.
Reference #xxx (not shown)
HTMLHEAD TITLEAccess Denied/TITLE /HEADBODY H1Access Denied/H1
You don't have permission
When Edith Windsor approached Roberta Kaplan to take her case after she had
been forced to pay $363,053 in estate taxes only because she had been married
to a woman, instead of a man, she offered to pay for the defense, and Roberta
immediately agreed to take the case and immediately said, no we
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/03/2014 05:12 PM, grarpamp wrote:
High-latency web browsing is actually a great use case and could
benefit from the extra security.
Apps like Pocket (http://getpocket.com/) work as a read it
later queue, downloading things for offline
Maybe one day, something like Peersm combined with [1] in order to
follow/or use [2] and [3] (don't focus on google developing this here,
these concepts are the only way to really secure a web page)
Basically you fetch the web page with something like Peersm, then
retarget it in a sandboxed
MacLemon:
German language Austrian Legalese background:
Austrian E-Commerce Law §15: Ausschluss der Verantwortlichkeit bei
Zwischenspeicherungen http://j.mp/1iYdg4L
§ 15. Ein Diensteanbieter, der von einem Nutzer eingegebene
Informationen in einem Kommunikationsnetz übermittelt, ist für
Hi there,
I used the TorDNSEL to verify an ip address of an exit node whether
I can sent some kind of traffic through that node and found
something is weired. First the information of the node can be found
in the cached consensus file on my system with running a tor client.
Hi there,
I used the TorDNSEL to verify an ip address of an exit node whether
I can sent some kind of traffic through that node and found
something is weired. First the information of the node can be found
in the cached consensus file on my system with running a tor client.
On Thursday 03 July 2014 11:06:15 Bron Taylor wrote:
p accept 25,110,119,143,443,465,995
252.94.2.188.25.27.196.125.74.ip-port.exitlist.torproject.org. 1799 IN
A 127.0.0.2 from Google Public DNS. Moreover, the answer from TorDNSEL
told that the node with the ip address 188.2.94.252 is an
request for more (english speaking) details on QUELLCODE part of XKeyScore(XKS)
http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html
specifically subsequent tasking associated with selected anonyms...
--
tor-talk mailing list -
Hi,
On 7/3/14, coderman coder...@gmail.com wrote:
request for more (english speaking) details on QUELLCODE part of
XKeyScore(XKS)
http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html
specifically subsequent tasking associated with
On 14-07-02 10:59 PM, Seth David Schoen wrote:
ideas buenas writes:
Why is markmonitor.com and its derivates in my TBB? How can I do to delete
this ? Are they watching me?
Hi,
Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
Enable/Disable Rules menu?
The same thing happened to Yahoo and AOL users in tor-relays:
https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
To summarize, your only practical remedy at this time is to use an email
address not on Yahoo or AOL.
On 14-07-01 04:41 PM, Bobby Brewster wrote:
What does this
++ 03/07/14 04:39 + - scarp:
Most attacks about breaking out of a VM rely on you installing the
guest tools, so never do that.
What are guest tools in this context?
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP
Bobby Brewster:
What are the benefits of running TBB in a VM?
AIUI, there are two advantages.
1.If malware infects the VM, then just the VM is compromised. If your
Windows/Mac/Linux system is infected, then your entire system is affected
(yes, I realise that it should be only the
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl mor...@torservers.net wrote:
On 07/02/2014 11:00 PM, Anders Andersson wrote:
Unfortunately he doesn't seem to want to take this further, so the
ruling will stand. It's his choice, but it could be a very bad
deterrent to other potential exit node
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl mor...@torservers.net
wrote:
On 07/02/2014 11:00 PM, Anders Andersson wrote:
Unfortunately he doesn't seem to want to take this further, so the
ruling will stand. It's his choice, but it could be a very bad
deterrent to other potential exit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On which station can we watch the story on German TV today?
On 03. Juli 2014 14:01:15 MESZ, Jacob Appelbaum ja...@appelbaum.net wrote:
Hi,
On 7/3/14, coderman coder...@gmail.com wrote:
request for more (english speaking) details on QUELLCODE part
* Elrippo schrieb am 2014-07-03 um 16:22 Uhr:
On which station can we watch the story on German TV today?
Will be broadcasted on ARD at 21:45 (9:45 pm, 20:45 UTC).
URL:http://daserste.ndr.de/panorama/archiv/2014/Quellcode-entschluesselt-Beweis-fuer-NSA-Spionage-in-Deutschland,nsa224.html
--
BlueStar88:
On Wed, 02 Jul 2014 09:15:47 +
Patrick Schleizer adrela...@riseup.net wrote:
BlueStar88:
37lnq2veifl4kar7.onion:6697 is up and running fine.
Who runs that server? Inoffical one?
I was more looking for a scalable, robust solution rather than
individual quick fix.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/3/2014 4:16 PM, Anders Andersson wrote:
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl
mor...@torservers.net wrote:
On 07/02/2014 11:00 PM, Anders Andersson wrote:
Unfortunately he doesn't seem to want to take this further, so
the ruling will
On Thu, Jul 3, 2014 at 8:13 AM, -John j...@johnlgrubbs.net wrote:
I thought JY at cryptome.org was already doing what you suggest.
i presume you mean as below:
(more a translation than additional QUELLCODE info though ;)
---
http://cryptome.org/2014/07/nsa-tor-de.htm
Donate for the
(Thread start:
https://lists.torproject.org/pipermail/tor-talk/2014-July/033573.html
)
On 7/3/14, Anders Andersson pipat...@gmail.com wrote:
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl mor...@torservers.net wrote:
On 07/02/2014 11:00 PM, Anders Andersson wrote:
Unfortunately he doesn't seem
On 7/3/14, coderman coder...@gmail.com wrote:
On Thu, Jul 3, 2014 at 8:36 AM, coderman coder...@gmail.com wrote:
...
i presume you mean as below:
(more a translation than additional QUELLCODE info though ;)
Here is some of the source code:
On Thu, Jul 3, 2014 at 8:36 AM, coderman coder...@gmail.com wrote:
...
i presume you mean as below:
(more a translation than additional QUELLCODE info though ;)
detailed technical info via J. Appelbaum, A. Gibson, J. Goetz, V.
Kabisch, L. Kampf, L. Ryge
---
On Thu, Jul 3, 2014 at 9:11 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
...
Here is some of the source code:...
merci beaucoup :)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
On Thu, 3 Jul 2014 16:11:39 +
Jacob Appelbaum ja...@appelbaum.net allegedly wrote:
On 7/3/14, coderman coder...@gmail.com wrote:
On Thu, Jul 3, 2014 at 8:36 AM, coderman coder...@gmail.com wrote:
...
i presume you mean as below:
(more a translation than additional QUELLCODE info
On 7/3/2014 10:34 AM, Zenaan Harkness wrote:
Agreed, great news.
In hindsight, it is clear that we as a community have an interest to
build a resource of amicus curiae briefs - friend of the court briefs.
So PLEASE make moves in the direction of contributing and collecting
documents which may
On Jul 3, 2014 9:57 AM, Jacob Appelbaum ja...@appelbaum.net wrote:
On 7/3/14, coderman coder...@gmail.com wrote:
On Thu, Jul 3, 2014 at 8:36 AM, coderman coder...@gmail.com wrote:
...
i presume you mean as below:
(more a translation than additional QUELLCODE info though ;)
Here is
Jacob Appelbaum writes:
On 7/3/14, Eugen Leitl eu...@leitl.org wrote:
http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
/kraut
Here is our larger story (in English) which includes excerpts of
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
Alexander Volynkin / Michael McCord
[...]
Looking for the IP address of a Tor user? Not a problem. Trying to
uncover the location of a Hidden Service? Done. We know because we
tested it, in the wild...
In this talk, we
++ 03/07/14 16:11 + - Jacob Appelbaum:
Here is some of the source code:
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
Can you tell us something about the source of this code? The articles of
the ARD do not mention any source at all, while other outlets mentioned
Snowden whenever
On Thu, 7/3/14, Tempest temp...@bitmessage.ch wrote:
Subject: Re: [tor-talk] Benefits of Running TBB in a VM?
To: tor-talk@lists.torproject.org
Date: Thursday, July 3, 2014, 5:48 AM
Bobby Brewster:
What are the benefits of running TBB in a
I agree that collecting stories about why/how I use Tor is useful, but I
disagree that any special education or warning should be needed before setting
up an exit node. Setting up an exit node is simply providing another IP that
can be used for traffic and nothing else. It is useful to provide
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
On Thu, Jul 3, 2014 at 2:05 PM, grarpamp grarp...@gmail.com wrote:
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
Alexander Volynkin / Michael
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
Apps like Pocket (http://getpocket.com/) work as a read it later
queue, downloading things for offline reading. While you're reading
an offline article, you can also follow links and click to add
I admit I have installed more extensions to TBB. Only FSF approved
licenses, mind you ;-) I have no flash, no java, only the add-ons.
When I browse Wikipedia some of the images are messed up. Meaning there
is another image, most of the time a detail from a larger picture in
place. You can see the
I got worried yesterday when instead of the Wikipedia logo on the
top-left corner there was the picture of a nazi (army) guy with a
Is this reproducible?
To successfully (without error) insert into an HTTPS connection you must be
trusted by the client .. would need list of CAcerts from
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
--
Christopher Booth
From: grarpamp grarp...@gmail.com
To: tor-talk@lists.torproject.org
Cc: cypherpu...@cpunks.org
Sent: Thursday, July
On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen sch...@eff.org wrote:
...
Does anyone have theories about this part right at the bottom? ..
/**
* Placeholder fingerprint for Tor hidden service addresses.
* Real fingerpritns will be fired by the plugins
*
Spam 06 writes:
I admit I have installed more extensions to TBB. Only FSF approved
licenses, mind you ;-) I have no flash, no java, only the add-ons.
When I browse Wikipedia some of the images are messed up. Meaning there
is another image, most of the time a detail from a larger picture in
Michael O Holstein:
I got worried yesterday when instead of the Wikipedia logo on the
top-left corner there was the picture of a nazi (army) guy with a
Is this reproducible?
In this instance of TBB, yes. But I haven't tried on a second computer.
To successfully (without error) insert into
I'm not referring to this.I'm talking of a lot of URI that appears when I
try to link to any site. Every one of those Remote Address start with a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net .
On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen
Another example is this s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com OR
ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to
markmonitor.com
On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote:
I'm not referring to this.I'm
Seth David Schoen:
Can you right-click on the image and Inspect Element? If so, does it
reference
style=background-image:
url(//upload.wikimedia.org/wikipedia/en/b/bc/Wiki.png);
http://s4.postimg.org/u8lb1dv7x/Screenshot_from_2014_07_03_23_15_59_1.png
The source does not point to other
The addon list is:
* Adblock Plus 2.6.3
* Adblock Plus Pop-up Addon 0.9.2
* DownThemAll! 2.0.17
* DownThemAll! AntiContainer 1.3
* Flash and Video Download 1.58
* GrabMyBooks 1.8
* HTTPS-Everywhere 3.5.3
* Internote 3.0.2
* Mozilla Archive Format 3.0.2
* NoScript 2.6.8.31
* Self-Destructing
On 14-07-03 02:05 PM, grarpamp wrote:
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
Alexander Volynkin / Michael McCord
if they have followed a responsible disclosure process, tor developers
should already be working on remedies...
--
tor-talk mailing list -
The Doctor writes:
On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
Apps like Pocket (http://getpocket.com/) work as a read it later
queue, downloading things for offline reading. While you're reading
an offline article, you can also follow links and click to add them
to your queue.
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois
On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote:
Another example is this s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com OR
Best guess, many client side and web app attacks Tor can't do much about.
(My talk at Defcon will cover a bunch of folks that got Deanonymized, but
in every case it was not Tor that was really broke)
Adrian
On Thu, Jul 3, 2014 at 5:49 PM, krishna e bera k...@cyblings.on.ca wrote:
On 14-07-03
Adrian Crenshaw writes:
Best guess, many client side and web app attacks Tor can't do much about.
(My talk at Defcon will cover a bunch of folks that got Deanonymized, but
in every case it was not Tor that was really broke)
The description on the Black Hat site refers a handful of powerful
i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1
for decript not workanyone and someone have encript key anyone and someone
encript and send to user via torthe user have decript keyand receive the code
encript via torand decrypt they
i search open source and look
On 07/03/2014 04:16 PM, Seth David Schoen wrote:
The Doctor writes:
On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
Apps like Pocket (http://getpocket.com/) work as a read it later
queue, downloading things for offline reading. While you're reading
an offline article, you can also follow
Can anyone from the Tor Project jump in to say whether these guys have
reached out or not?
We should be concerned about another CCC-style 0-day presentation where
they find a legitimate vulnerability that could have been patched prior,
but are using it as a PR stunt to boost book sales as opposed
On 07/03/2014 16:17, Adrian Crenshaw wrote:
Best guess, many client side and web app attacks Tor can't do much about.
(My talk at Defcon will cover a bunch of folks that got Deanonymized, but
in every case it was not Tor that was really broke)
This actually depends on what to mean by Tor. If
It also has to be a hollow claim. To actually deanonymize someone would mean
making a list of every website that was visited by that client. Not just
identify one client that visited one website. And how many clients were you
planning on doing that with? It would take an NSA size budget not a
56 matches
Mail list logo