Jacob,
What are the issues with Hardware cypto?
Have you addressed this in a talk? If so would
pass on a link? Youtube I assume?
Thanks
On Thu, Jul 18, 2013 at 4:55 AM, Jacob Appelbaum ja...@appelbaum.netwrote:
Andrew Lewman:
Anyone used one of these ninja stik usb drives?
On Thu, Jul 18, 2013 at 10:45:27AM +, Andrew F wrote:
What are the issues with Hardware cypto?
Hardware is not inspectable, unless open, and
verified to function by an audit.
The sad reality of USB drive encryption:
Andrew F:
Jacob,
What are the issues with Hardware cypto?
Have you addressed this in a talk? If so would
pass on a link? Youtube I assume?
Thanks
Hardware crypto is difficult to verify on a number of different levels.
I don't even trust these write protected switches but at least those can
Amazing..
Thanks
Eugen
Jacob
On Thu, Jul 18, 2013 at 1:29 PM, Jacob Appelbaum ja...@appelbaum.netwrote:
Andrew F:
Jacob,
What are the issues with Hardware cypto?
Have you addressed this in a talk? If so would
pass on a link? Youtube I assume?
Thanks
Hardware crypto is difficult
Andrew,
The real question is about flash. They say that flash sites, including
youtube and other tube sites work.
Do you no of a way to use flash safely with tor and Ubuntu?
I don't.
On Wed, Jul 17, 2013 at 3:07 AM, Andrew Lewman and...@torproject.is wrote:
Anyone used one of these ninja
Sure. Only in a vm like Whonix. Not elegant by any means.
If the site using flash breaks tor anonymity, all it gets is a bogus ip and
bogus mac address.
Sent from my NOOK
Andrew F andrewfriedman...@gmail.com wrote:
Andrew,
The real question is about flash. They say that flash sites,
On 17.07.2013 13:54, ra wrote:
Virtual Machines can be used to use Flash with Tor securely IMHO.
Flash may be used to compute a unique fingerprint of a surfer IMHO.
It does not break the anonymity by self if it was correct proxyfied, but
it may help to break the anonymity.
Best regards
Karsten
On Wednesday 17 July 2013 15:19:20 Karsten N. wrote:
Flash may be used to compute a unique fingerprint of a surfer IMHO.
It does not break the anonymity by self if it was correct proxyfied, but
it may help to break the anonymity.
Many attributes can be used to compose a unique fingerprint.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/16/2013 11:07 PM, Andrew Lewman wrote:
The first question is why people think we produce it at all.
It seems to be common that, if it involves Tor somehow, the Tor
Project was somehow behind it. I don't know how that thought process
would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/17/2013 06:30 AM, Andrew F wrote:
The real question is about flash. They say that flash sites,
including youtube and other tube sites work.
Uhhh
Does anyone know where an image of one of the NinjaStiks could be
acquired? It would be
On 13-07-17 12:47 PM, The Doctor wrote:
On 07/16/2013 11:07 PM, Andrew Lewman wrote:
The first question is why people think we produce it at all.
It seems to be common that, if it involves Tor somehow, the Tor
Project was somehow behind it. I don't know how that thought process
would go,
Andrew Lewman:
Anyone used one of these ninja stik usb drives?
http://www.ninjastik.com
It seems to be stock ubuntu with tor installed. People keep coming
to me asking how come we called it ninja stik and why we used ubuntu
when we have tails.
The first question is why people think we
Anyone used one of these ninja stik usb drives?
http://www.ninjastik.com
It seems to be stock ubuntu with tor installed. People keep coming
to me asking how come we called it ninja stik and why we used ubuntu
when we have tails.
The first question is why people think we produce it at all.
--
13 matches
Mail list logo