Re: [tor-talk] High-latency hidden services

2014-07-04 Thread Aymeric Vitte
If I understand correctly the question here is not about browsing but fetching something that you don't need immediately for offline reading and that you download with high latency using different circuits. That's easy to do, if you take Peersm again, it's easy to send several random requests

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
I don think is chatbeat. How many inindetifed servers do u have? On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote: See https://chartbeat.com/faq/what-is-ping-chartbeat-net for what I think you are seeing - website analytics. On Thu, Jul 3, 2014, at 11:56 PM, ideas

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread Eugen Leitl
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote: Does the NSA barter this database of suspicious extremists with foreign services? They do, according to Drake. Certainly there are some friendly services eager to get their hands on IP addresses of NSA selected

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/03/2014 07:14 PM, Joe Btfsplk wrote: Perhaps out of fear of legal liability, Tor Project doesn't seem to have what would be very helpful for relay operators - guides, documents - even access to basic legal advice, of how to best avoid legal issues to begin with.

[tor-talk] messing with XKeyScore

2014-07-04 Thread Eugen Leitl
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 Errata Security Advanced persistent cybersecurity Friday, July 04, 2014 Jamming XKeyScore Back in the day there was talk about jamming echelon by adding keywords to email that the echelon system was supposedly looking for. We

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
I don't have any unidentified servers - I don't know what you mean by that. Which webpage are you visiting? Have you compared what happens when visiting with Torbrowser and visiting with normal Firefox over the normal internet? On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote: I don think is

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Visiting the same website with Tor or normal Firefox its gave me the same Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com as an example. While ones repeat themselves in both browsers, others not. One class of unidentifies

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote: Visiting the same website with Tor or normal Firefox its gave me the same So this is nothing to do with Tor. Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread MacLemon
Hi! On 04 Jul 2014, at 15:31, Moritz Bartl mor...@torservers.net wrote: I have talked to multiple lawyers, and this case would be very easy to defend against. William was sadly unable or unwilling to communicate properly, and he's not willing/able to put it to a fight. It is a sad situation

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread Jens Kubieziel
* elrippo schrieb am 2014-07-04 um 20:30 Uhr: Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, how a copy could be downloaded as mp4, divx, ogg or some other format? You can use URL:http://zdfmediathk.sourceforge.net/. -- Jens Kubieziel

Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 10:56 AM, Eugen Leitl eu...@leitl.org wrote: http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 Good work, glad someone had time to really dig in, perhaps even drawing on some comments from others in the early buzz such as

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread elrippo
Am Freitag, 4. Juli 2014, 20:48:09 schrieb Jens Kubieziel: * elrippo schrieb am 2014-07-04 um 20:30 Uhr: Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, how a copy could be downloaded as mp4, divx, ogg or some other format? You can use

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 8:15 AM, Nathan Andrew Fain nat...@squimp.com wrote: Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf the two seem very similar. in

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his exit for illegal stuff, I became interested in his case. But I know it only from the newspapers. The raid

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk
On 7/3/2014 2:23 PM, C B wrote: I agree that collecting stories about why/how I use Tor is useful, but I disagree that any special education or warning should be needed before setting up an exit node. Setting up an exit node is simply providing another IP that can be used for traffic and

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On 7/4/14, grarpamp grarp...@gmail.com wrote: https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget I2P is a tool that likely presents the nearest analog to Tor's hidden services (.i2p) to the user. Usable in much the same way.

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I fully agree with Joe! Running an exit can get you in serious legal trouble, because Tor /and all other anonymity services/ will always be misused for illegal activities. Every interested operator must make his personal moral trade-off and come to a

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Do a Whois lookup of the addreses I gave u before and check that all of this resolve to markmonitor. s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com st http://edge-star-shv-04-gru1.facebook.com just when I was visiting www.lemonde.fr

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski pze...@gmail.com wrote: I2P (aka Invisible Internet Protocol) is designed to be a real undernet Using I2P to acces a standard Internet but in anonymous way is much less Right, in the likely context of the subject exploit, I referred only to the

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Zenaan Harkness
On 7/5/14, no.thing_to-h...@cryptopathie.eu no.thing_to-h...@cryptopathie.eu wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his exit for illegal

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk
On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his exit for illegal stuff, I became interested in

Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread Matthew Finkel
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Eugen Leitl transcribed 5.8K bytes: http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 Errata Security Advanced persistent cybersecurity Friday, July 04, 2014

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/04/2014 10:56 PM, Joe Btfsplk wrote: *No*, we aren't aware of anyone being sued or prosecuted in the United States just for running a Tor relay. Further, we believe that running a Tor relay --- including an exit relay that allows people to anonymously send and receive traffic --- is