On Fri, Oct 4, 2013 at 8:44 AM, defcon <[email protected]> wrote: > ... We need to focus more on secure browsers and tools that work over TOR > since they are relying on browser exploits and hacking services on TOR.
"p7 Tor Project and friends Recent Activity" http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity """ Tails: ... Adds Severe CNE misery to the equation ... """ good news everybody; defense is depth is effective and practical! this has been a subject of discussion on the Qubes devel list as well, in the content of Whonix, Tails and other Tor packagings. http://theinvisiblethings.blogspot.com/2011/09/playing-with-qubes-networking-for-fun.html https://www.whonix.org/wiki/Comparison_with_Others qubes devel threads of interest: "Qubes + Whonix" https://groups.google.com/forum/#!topic/qubes-devel/2vnGqsoM9p0 "QuebesOS - Secure Against Spying?" https://groups.google.com/forum/#!topic/qubes-devel/UfmWWiq9-_U "Disposable VM versus local forensics?" https://groups.google.com/forum/#!topic/qubes-devel/QwL5PjqPs-4 best regards, -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
