On 22 Nov 2013, at 15:56, and...@torproject.is wrote:
On Fri, Nov 22, 2013 at 07:04:00PM +0600, r...@romanrm.net wrote 2.5K bytes
in 0 lines about:
: On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
: https://pogoplug.com/safeplug
Out of all the concerns about how they
* on the Mon, Nov 25, 2013 at 11:27:43PM +, Jacob Appelbaum wrote:
You shouldn't just route people through Tor without their knowledge.
They need to understand the risks and adapt their use accordingly.
And what is the risk of barebacking with a network?
When your traffic comes out of
On Tue, 26 Nov 2013 10:54:58 +
Mike Cardwell t...@lists.grepular.com allegedly wrote:
If I, as a random geek, wanted to mess around with MITM attacks to see
what information I could steal, I have a few options: I could do it
on my LAN at home, targetting friends and family. I could do it
On 2013-11-23 19:38, Philipp Winter wrote:
On Sat, Nov 23, 2013 at 02:22:48PM +, Mark McCarron wrote:
How about a certification program? A company can donate some
funds to have their product evaluated and if successful gain
TOR Certified status. It would stop all this nonsense and
provide
On Mon, Nov 25, 2013 at 01:25:37PM +, Gibson, Aaron wrote:
On 2013-11-23 19:38, Philipp Winter wrote:
On Sat, Nov 23, 2013 at 02:22:48PM +, Mark McCarron wrote:
How about a certification program? A company can donate some
funds to have their product evaluated and if successful gain
Mike Cardwell:
* on the Fri, Nov 22, 2013 at 06:17:24PM +, Jacob Appelbaum wrote:
You shouldn't just route people through Tor without their knowledge.
They need to understand the risks and adapt their use accordingly.
And what is the risk of barebacking with a network?
When your
On Fri, Nov 22, 2013 at 09:48:57PM -0500, grif...@cryptolab.net wrote 1.4K
bytes in 0 lines about:
: Perhaps your most pressing concern should be about whether or not it
: protects its users, given that it's using Tor as the vehicle to attempt
: that. And any failure to do so would have the
wants to become a gatekeeper, but ensuring the
integrity of the underlying platform is critical.
Date: Sat, 23 Nov 2013 13:46:40 +
From: and...@torproject.is
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Safeplug
On Fri, Nov 22, 2013 at 09:48:57PM -0500, grif
On Sat, Nov 23, 2013 at 02:22:48PM +, Mark McCarron wrote:
How about a certification program? A company can donate some
funds to have their product evaluated and if successful gain
TOR Certified status. It would stop all this nonsense and
provide everyone the opportunity to request
* on the Fri, Nov 22, 2013 at 06:17:24PM +, Jacob Appelbaum wrote:
You shouldn't just route people through Tor without their knowledge.
They need to understand the risks and adapt their use accordingly.
And what is the risk of barebacking with a network?
When your traffic comes out of a
Some more information from [1]
- users can whitelist certain sites so that their use is not run through Tor.
- Users can also set up Safeplug to work on a per-browser basis, so for
example Firefox may always run through Tor while Chrome won’t.
- users can also set themselves up as Tor nodes
Gordon Morehouse has been spending a lot of time getting the Pi to run as
Tor relay: https://github.com/gordon-morehouse/cipollini
I've been running a BeagleBone Black relay on a home network for over 2
months now: http://datko.net/2013/09/13/update_bbb_tor/
Josh
On Fri, Nov 22, 2013 at 5:43
On 11/22/2013 16:53, Red Sonja wrote:
How can one be sure that firmware that is running on the router is
built from this particular source code and not from some modified
version or different revision?
Hashes?
The ability to build it from sources?
If you search you can find a few other
On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
http://www.cnx-software.com/2013/11/22/49-safeplug-tor-router-let-you-browse-the-net-anonymously/
)
I think these kind of devices configured
I very rarely (if ever) comment on this list (I like to read and
learn). That said, I've been looking into building a TOR router using
Pi. This is because I have elements within my home that are
technically inept and thus are a danger to themselves and everyone
else (ageing parents...what can
On Fri, 22 Nov 2013 06:25:33 -0500
Sean Alexandre s...@alexan.org wrote:
On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
On Fri, Nov 22, 2013 at 07:04:00PM +0600, r...@romanrm.net wrote 2.5K bytes in
0 lines about:
: On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
: https://pogoplug.com/safeplug
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds
On Fri, 22 Nov 2013 10:56:55 -0500
and...@torproject.is wrote:
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds more clients to the network without
giving back in the form of relays or bridges.
If these are all real people using and getting
On 22/11/2013 4:50 AM, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
http://www.cnx-software.com/2013/11/22/49-safeplug-tor-router-let-you-browse-the-net-anonymously/
)
I too would be interested in seeing how this actually works.
* on the Fri, Nov 22, 2013 at 08:38:40AM -0500, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most of their
Mike Cardwell:
* on the Fri, Nov 22, 2013 at 08:38:40AM -0500, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most
On 11/22/2013 05:38, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most of their
internet use will be much slower
On Fri, 22 Nov 2013 10:45:35 -0800
Yuri y...@rawbw.com wrote:
Also, without the device being open source (and how can it really be?)
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design level, but
they could post source-code for the firmware with the instructions
On 2013-11-22 15:56, and...@torproject.is wrote:
On Fri, Nov 22, 2013 at 07:04:00PM +0600, r...@romanrm.net wrote 2.5K
bytes in 0 lines about:
: On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
: https://pogoplug.com/safeplug
Out of all the concerns about how they implemented
On 11/22/2013 11:35, Roman Mamedov wrote:
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design level, but
they could post source-code for the firmware with the instructions to build
and flash it, and since most likely this contains at least the Linux kernel
and some
I bought an early pogoplug device.
It was advertised as a means to provide safe and secure file access.
This model allowed connecting one's external hard drive via a USB port
and connecting via ethernet to WAN thru their infrastructure which
ostensibly provided authentication and access
Yuri:
How can one be sure that firmware that is running on the router is
built from this particular source code and not from some modified
version or different revision?
Hashes?
The ability to build it from sources?
If you search you can find a few other solutions.
Also how can one be
and...@torproject.is wrote:
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds more clients to the network without
giving back in the form of relays or bridges. Or at least, none of
their documentation mentions the ability to share freedom and
28 matches
Mail list logo