ficial Tor Browser binaries'
behavior.
More info here:
http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/SecBrowser
The usual warnings about "this isn't endorsed by The Tor Project" apply.
Cheers,
--
-Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob
Jeremy Rand:
> Hi Tor community!
>
> As we all know, onion services have rather unwieldy randomly derived
> base32-encoded names. This is, of course, a reasonable design, given
> the design constraints that onion services have to deal with. And it
> works pretty well, all
amecoin.org/resources/presentations/36C3/Adventures_and_Experiments_Adding_Namecoin_to_Tor_Browser_36C3_CDC.pdf
36C3 CDC Video: https://youtu.be/mc51zyflpa8?t=22638
Cheers!
--
-Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
Send non-security-c
Tor Browser, last I checked, has a transproxy mode (enabled via an
environment variable) that I suspect would make it work fine without
Tor. No idea if it's documented properly; I've only seen it mentioned
on the Whonix wiki (in the "disable stream isolation" docs).
Cheers,
--
-
ith the start of
> 2020?
>
> thanks,
> nusenu
I signed into TweetDeck with Tor Browser today with no issues. So,
there are probably some additional variables at play here.
Cheers,
--
-Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile Op
situations) where the Tor daemon and the application are in
separate trust domains, and in those threat models, there is an
advantage to using TLS combined with onion (compared to only onion),
because TLS is terminated in the application rather than the Tor daemon.
Cheers,
--
-Jeremy Rand
Lead Application
UX issues that caused Flash Proxy to be deprecated.)
(Full disclosure: I'm not super familiar with the details of Snowflake,
so maybe I've made errors in the above. Anyone who's more knowledgeable
about Snowflake is encouraged to correct any errors in what I stated, if
there are any,)
Cheers,
--
-Jer
in the Trac thread would harm the
signal-to-noise ratio there.
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643 C13B B40F B0FD 5854 B007 A32D AB44 3D9C
Send non-security-critical things to my Mobile with OpenPGP.
Pl
ood experience with cock.li so far (been using them for
about a year). A little bit of occasional downtime every now and
then, but I can't say I expect a service run by one guy for fun to be
as reliable as Gmail.
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: je
being exchanged?
Some Googling didn't yield anything, other than this unanswered
StackExchange question:
https://tor.stackexchange.com/questions/760/what-is-the-reasoning-behind
- -keeping-hidden-service-onion-rsa-keys-at-1024-lengt
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
I will explore this idea to see if it
> would work for my usecase.
>
> Is there any comments on the way Whonix gateway and TBB work
> together?
You might find this documentation on Whonix with physical isolation
interesting:
https://www.whonix.org/wiki/Dev/Build_Documentation/Phy
test (and therefore make it difficult to
tell whether any additional leaks were made undetectable by the change
in program behavior caused by the initial leak being blocked).
Hope I'm making sense, and apologies if my initial post was unclear.
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at
curious if someone
has already tried to tackle this, or if there's a better way.
(H/t to pabouk at https://tor.stackexchange.com/a/118 for the idea of
using strace.)
Cheers,
- --
- -Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile OpenPGP: 2158 0643
is the path to improving it.
>
> //Sidju
It wasn't obvious to me whether OP intends to give their analysis to the
Tor Browser devs (seems ethical) or instead keep it for proprietary
purposes (seems unethical).
Can OP clarify on this point?
Cheers,
--
-Jeremy Rand
Lead Application En
owser from connecting to Tor (which would presumably
be 127.0.0.1:9150).
I wouldn't expect this to be caused by Tor being unable to talk to the
Internet.
Cheers,
--
-Jeremy Rand
Lead Application Engineer at Namecoin
Mobile email: jeremyrandmob...@airmail.cc
Mobile PGP: 2158 0643 C13B B40F B0FD 5
hi...@safe-mail.net:
> https://duckduckgo.com has become increasingly better lately. Only during
> the past 6 months or so, their search results have become almost on par
> with the big ones, like Google, Bing, etc.
>
> In regards to Google, it all comes down to censorship and anti-privacy.
Alec Muffett:
> In my previous e-mail I suggested removing Tor from Debian precisely
> because of this future-staleness problem.
>
> I still believe that this is a decent idea, because stale code sucks.
>
> Another possible solution would be creation of a "Tor Server Bundle" -
> designed and
Andreas Krey:
> Hi there,
>
> is there anybody else using tweetdeck via tor?
>
> I have the strange phenomenon that I get a
> '... Something went wrong. Please try again.'
> on the initial tweetdeck.twitter.com screen,
> and, while I can log into twitter.com, tweetdeck
> itself won't work. The
Jeremy Rand:
> Alec Muffett:
>> Irregardless of the political and privacy issues there are also technical
>>> benefits to using Tor for day to day traffic.
>>
>>
>> Totally. So many people are fixated on "anonymity" and completely ignore
>> the
mity isn't desired, and
that all we want is the integrity/authencitity/encryption properties
that .onion gives you, wouldn't .tlsexplicit be a lot more efficient and
a lot less complex?
Cheers,
-Jeremy Rand
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.
Joe Btfsplk:
> On 9/26/2016 11:57 PM, Jeremy Rand wrote:
>> If it matters, I usually have Tor Browser in Medium-High security level,
>> so Javascript is enabled for HTTPS sites (including Google Translate).
>>
>> Cheers,
>> -Jeremy
>>
> Yep, mine can
Joe Btfsplk:
>
>
> On 9/25/2016 12:15 AM, Jeremy Rand wrote:
>> hi...@safe-mail.net:
>>> You can't use Google Translate at all with most Tor exit nodes, while
>>> there are no sane reaons why they would block Tor users from just
>>> translating text.
>
being blocked from it due to
coming from a Tor exit. I wonder why your experience differs from mine.
Cheers,
-Jeremy Rand
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
whether Bitmessage is a protocol that makes sense from an
engineering perspective is an entirely orthogonal issue, which I've
heard concerns raised about, but which I'm probably not qualified to
make any statements on.
Cheers,
-Jeremy Rand
signature.asc
Description: OpenPGP digital signature
--
tor
grarpamp:
> On 8/13/16, Jeremy Rand <jeremyr...@airmail.cc> wrote:
>> #zeronet IRC
>> I've obtained permission to post a partial chatlog.
>
> It's a public channel, on an insecure server, plugged into clearnet.
> Do you have any idea how many users, publicly accessi
), that would be greatly
appreciated.
Cheers,
-Jeremy Rand
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
t of these
> technologies I would opt for.
>
> What else is around?
AFAIK ZeroNet doesn't rely on Bitcoin's PoW for anything. It only
relies on Namecoin's PoW as an optional naming system. Freenet
doesn't have a decentralized naming system at all, so ZeroNet isn't
any wors
?
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXfTzoAAoJEAHN/EbZ1y06dPkQAJJ3vHUBLXeUZcdLdZw5ow+l
23M0DSIvIOSptFEydB8mCBBSR8BTwAcDZK6CKmzOgs8BcYgE7gLPInjsdNu8WfgS
q0LqT1tBMPE38oOOd5WIUd89g5j02gUrjNjeCfcQ+cP7RwJJzjxaavMVJWXbLZL3
PMF4PIY2++rX9dt6sO1IrYdRULLcEW8RIAfnBLpdq8N
ns, but it is sometimes worthwhile.
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXaOKqAAoJEAHN/EbZ1y06jQQQAMTMCMXAum1wl5haUZ5TXQtS
yq9rEZ6K0G+SzV8td2xHMg2kNm3B/Z9iE5HR/60gxaNspjI5Ad8wwIDlJ0nYMABO
QYrh2U1+hx8t5SD/Nj7493tpOXvO6xVLUxH6P51hz7rKwivLue/yUK8
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/18/2016 10:28 PM, Jonathan Wilkes wrote:
>> If I recall correctly, Mike Perry considered pressure on
>> individual
> developers to be sufficiently threatening that it was a major
> reason why he set up reproducible builds. (I believe he said
at his CCC
talk.)
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXPS0CAAoJEAHN/EbZ1y06gK4QAIYJPkT4/w1akaPZX+j2z7Au
aoPBN3FcVMMSHlUfPCmuMNt+CYpexjoSOTFU6maxXPMxqIJsEyK/Y6JUcwIjmVeJ
NwihmFAlgMHmgP+CjTCVPj6EK2w5XisqDHYyT8JHo5Bzk/TnuRL6S2Z9p8Sd
Firefox for Android is not sufficient for good anonymity. Something like Orfox
or Orweb is probably much safer.
(Sorry for top post, I'm on a phone.)
On February 24, 2016 3:18:14 PM CST, libertyinpe...@riseup.net wrote:
>Did a factory reset on the droid tablet. Was finally able to properly
ake tracking less effective without resorting to a blacklist [1], so
in theory you don't need a blacklist anyway.
Cheers,
- -Jeremy Rand
[1] Of course, Tor Browser is imperfect in this area, so it is at
least plausible that a blacklist might help in some limited
circumstances. I doubt tha
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/19/2016 01:44 AM, CANNON NATHANIEL CIOTA wrote:
> On 2016-02-19 01:40, Jeremy Rand wrote: On 02/19/2016 01:37 AM,
> CANNON NATHANIEL CIOTA wrote:
>>>>
>>>> That chat program you are referring to would
jumped from 4 to 60000 in the past day or two.
>
> That chat program you are referring to would be ricochet IM
>
Well, there was something called TorChat which fits that description,
but TorChat hasn't gotten any security updates or maintenance in
years, so Ricochet is
me, GoldBug falsely claimed to be
a project of EFF and CCC. It would be wise to assume that BitMail is
malware or backdoored unless proven otherwise. As with all other
software hosted by SourceForge these days.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJWrJSbAAoJ
ent
to prove that I received such an email.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJWfI8CAAoJEAHN/EbZ1y06NDsP/0bGwLD/cfuiOzLiJCO3JFGj
f9MqK6QNbTICgeT0i4vGgRYfXzxtzk0zevGzTA+FjBsmDyrDqpj7hcSY/sjYA7Um
w/fgpA28r0ManKEaKYJvrlUkLnWJP6V3y5FvqivqzgACvgB5Ctr3xedEZK481
, which the
TorBrowser devs seem to be doing a good job on.
Cheers,
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJWBvWBAAoJEAHN/EbZ1y06EoQP/2s4V0dsGFyism2rSSpsd6fo
gt0a40kLdIBb2wegtYbpWtjdL2N9hvc6HWgcobwrN0e8gxgMdTNrUtd5Ert71/0n
Lfwb9M1WN4s6Q
soon.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJVxakaAAoJEAHN/EbZ1y069k8P/RjJjAyb8MSZS/ubkcF2/xAT
PfgNGgw5mXSbMNFJtqKVBUKfapaR9HemGt2MGwDoT2jfxra4AiGRgF5OV16Q6iv1
JC6ueEVi3yRXGKvus+qCZbR8XZqnl3sn1UdDaBoPdQUHJ2Ona+lQSCkfGr4LLh5z
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/09/2015 01:04 AM, Seth David Schoen wrote:
Jeremy Rand writes:
It's theoretically possible to use naming systems like Namecoin
to specify TLS fingerprints for connections to Tor hidden
services, which would eliminate the need for a CA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello,
I'm interested in having a SOCKS proxy sitting between the end user
and the Tor-provided SOCKS proxy, which can do really simple stuff
like redirect from one host to another. (Just on the level of the
host requested via SOCKS, not HTTP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 06:21 AM, Tom van der Woerdt wrote:
Hi Jeremy,
After reading your message I wonder whether a simple TCP proxy is
what you want. Maybe have a look at haproxy?
Tom
Hi Tom,
The intention is to have end user applications like
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 08:54 AM, l.m wrote:
Hi,
Is the Socks-to-Socks proxy absolutely necessary? This could be
done as a browser plugin couldn't it? You might find the work of
the FreeSpeechMe team interesting. They have the objective of
integration
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 06:42 AM, s7r wrote:
Hi Jeremy
Why do you want this and why do you think this is a good idea?
What are you trying to solve? The socks5 which Tor open is not a
simple socks5 protocol implementation, it has some customizations
and
to go digging through the bill, here's what I
think is the relevant text:
http://www.parl.gc.ca/HousePublications/Publication.aspx?Language=EMode=1DocId=5697419File=72
Look for 41.25 and 41.26
The usual I'm not a lawyer thing applies.
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/30/2014 05:28 PM, coderman wrote:
On 9/27/14, Jeremy Rand biolizar...@gmail.com wrote:
... Namecoin would make this pretty easy. Last I checked the
current Namecoin domain name spec only supports round-robin DNS
for IPv4/IPv6 and not Tor
also give you human-readable names.
(Also Namecoin isn't anonymous, which might or might not be a problem
depending on the use case.)
- -Jeremy Rand
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
iQEcBAEBAgAGBQJUJ6RLAAoJEFgMI9bDV/9qmzEH/3vKGI2nzbwNYmf8x+VwC7vT
nxuInsXSIXG7ox5aNSD8MGJMANYPnXpJXikdV
better
trust properties than trusting a quorum of 3 random relays, and
doesn't use much storage or bandwidth.
Any questions, feel free to ask -- we're more than interested in
working with the Tor community to make DNS for .onion usable.
Cheers,
-Jeremy Rand
--
tor-talk mailing list - tor-talk
On 06/23/2014 12:11 PM, Joe Btfsplk wrote:
I noticed there are at least 2 different references in Torbrowser for
useragent over ride strings.
The Panopticlick site picks up this one: /Mozilla/5.0 (Windows NT 6.1;
rv:24.0) Gecko/20100101 Firefox/24.0/, though there's another shown in
Not correct; Namecoin supports mapping names to Tor hidden services, as
well as I2P and Freenet sites. Obviously you need to use a Namecoin
implementation that's a proxy instead of a DNS server, but that's not a
big deal (nmcsocks already implements this).
On 2/24/2012 3:22 PM, Andreas Krey
50 matches
Mail list logo