On Fri, Oct 4, 2013 at 8:44 AM, defcon <[email protected]> wrote:
> ... We need to focus more on secure browsers and tools that work over TOR
> since they are relying on browser exploits and hacking services on TOR.

"p7 Tor Project and friends Recent Activity"
http://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity

""" Tails: ... Adds Severe CNE misery to the equation ...
  """

good news everybody; defense is depth is effective and practical!


this has been a subject of discussion on the Qubes devel list as well,
in the content of Whonix, Tails and other Tor packagings.

  
http://theinvisiblethings.blogspot.com/2011/09/playing-with-qubes-networking-for-fun.html
  https://www.whonix.org/wiki/Comparison_with_Others


 qubes devel threads of interest:

"Qubes + Whonix"
  https://groups.google.com/forum/#!topic/qubes-devel/2vnGqsoM9p0

"QuebesOS - Secure Against Spying?"
  https://groups.google.com/forum/#!topic/qubes-devel/UfmWWiq9-_U

"Disposable VM versus local forensics?"
  https://groups.google.com/forum/#!topic/qubes-devel/QwL5PjqPs-4


best regards,
-- 
tor-talk mailing list - [email protected]
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to