Re: [tor-talk] Tor Project Corporate Document FOI Request

2016-07-31 Thread Paul Syverson
On Sun, Jul 31, 2016 at 01:35:19PM -0400, grarpamp wrote: > On 7/21/16, grarpamp wrote: > > [doc request[ > > Since this seems to have been ignored by Tor Project Inc for more > than a week, and people have indicated further interest, it has now > been lodged as a formal

Re: [tor-talk] Practical deanonymization using CPU load covert channels

2016-07-31 Thread bancfc
Thanks Ethan for your research. We've been discussing which mitigation technique to use. In a virtualized context disabling c-states is only possible from the host. Thats ok since all it means is we need to package it for users to install it there. We prefer the idea of not using the kernel

Re: [tor-talk] tor browser graphics only updating when move mouse over window

2016-07-31 Thread dewaj
On Sun, 31 Jul 2016 03:54:47 +0100 (BST) wrote: > Hello, > > My TOR browser exhibits the following symptom. The graphics on its > window  don't update unless I move the mouse pointer over it. > > Is this happening to anyone else? > > Tor browser is 6.0.2, based on

Re: [tor-talk] noscript on youtube

2016-07-31 Thread dewaj
thus spake krishna e bera: > > When trying to login to Youtube from TBB, NoScript blocks a bunch > > of stuff seemingly related to fonts (see screenshot at > > https://postimg.org/image/c0sfrf2kh/41fa1875/ ), and i cannot > > proceed (the Sign In button doesnt work. Otherwise Youtube works > >

Re: [tor-talk] Tor Project Corporate Document FOI Request

2016-07-31 Thread grarpamp
On 7/21/16, grarpamp wrote: > [doc request[ Since this seems to have been ignored by Tor Project Inc for more than a week, and people have indicated further interest, it has now been lodged as a formal ticket. Requests to update comment #1 regarding doc list and date ranges

Re: [tor-talk] Practical deanonymization using CPU load covert channels

2016-07-31 Thread Spencer
Hi, Ethan White: Ping latency decreases when CPU usage is high an adversary can influence CPU usage to transmit data I can confirm that disabling c-states does completely prevent this attack. Dope. providing an option in Tails to disable c-states, perhaps in the form of a GRUB entry