Praedor Atrebates:
> On 07/13/2012 06:22 PM, antispa...@sent.at wrote:
>> On Fri, Jul 13, 2012, at 22:14, proper wrote:
>>> My non-offical project supports [1] that. Java and Flash do not leak IP
>>> or DNS.
>> Even without leaking IP, they have far too much power for a far too
>> small benefit. Th
antispa...@sent.at:
> On Fri, Jul 13, 2012, at 22:14, proper wrote:
>> My non-offical project supports [1] that. Java and Flash do not leak IP
>> or DNS.
>
> Even without leaking IP, they have far too much power for a far too
> small benefit. The ability to write or read the disk beyond the powers
antispa...@sent.at:
> On Fri, Jul 13, 2012, at 16:38, Praedor Atrebates wrote:
>> My main interest in emulators and/or VMs is to be able to use tor
>> browser but also leave some of the add-ons activated (javascript, flash)
>> and STILL defeat tracking. Tor gives you ip X and the VM provides a
On 07/13/2012 06:22 PM, antispa...@sent.at wrote:
On Fri, Jul 13, 2012, at 22:14, proper wrote:
My non-offical project supports [1] that. Java and Flash do not leak IP
or DNS.
Even without leaking IP, they have far too much power for a far too
small benefit. The ability to write or read the dis
On 07/13/2012 06:13 PM, antispa...@sent.at wrote:
On Fri, Jul 13, 2012, at 16:38, Praedor Atrebates wrote:
My main interest in emulators and/or VMs is to be able to use tor
browser but also leave some of the add-ons activated (javascript, flash)
and STILL defeat tracking. Tor gives you ip X and
On Fri, Jul 13, 2012, at 22:14, proper wrote:
> My non-offical project supports [1] that. Java and Flash do not leak IP
> or DNS.
Even without leaking IP, they have far too much power for a far too
small benefit. The ability to write or read the disk beyond the powers
of the browser. Leaking font
On Fri, Jul 13, 2012, at 16:38, Praedor Atrebates wrote:
> My main interest in emulators and/or VMs is to be able to use tor
> browser but also leave some of the add-ons activated (javascript, flash)
> and STILL defeat tracking. Tor gives you ip X and the VM provides a
> totally bogus IP addres
Praedor Atrebates:
> On 07/13/2012 02:15 PM, antispa...@sent.at wrote:
>> On Fri, Jul 13, 2012, at 13:41, Praedor Atrebates wrote:
>>> Would not cpu/system data get hidden if you ran tor browser inside an
>>> emulator?
>> Yes, an emulator with Tails. But, why should people have to do all that
>> an
On 07/13/2012 02:15 PM, antispa...@sent.at wrote:
On Fri, Jul 13, 2012, at 13:41, Praedor Atrebates wrote:
Would not cpu/system data get hidden if you ran tor browser inside an
emulator?
Yes, an emulator with Tails. But, why should people have to do all that
and install so many packages just to
On Fri, Jul 13, 2012, at 18:15, proper wrote:
> antispa...@sent.at:
> > In the sense that each extension should be combed for functions that
> > interact with the non–local or that no developer has a wish to inhibit
> > extensions from chatting with the exterior?
>
> Yes, but its even more. Also s
On Fri, Jul 13, 2012, at 13:41, Praedor Atrebates wrote:
> Would not cpu/system data get hidden if you ran tor browser inside an
> emulator?
Yes, an emulator with Tails. But, why should people have to do all that
and install so many packages just to fix a Hole in the browser?
On Fri, Jul 13, 2012, at 15:41, krugar wrote:
> the way the TBB creates anonymity may not be very intuitive, but it does
> work. at least as long as you do not identify yourself to a website that
> will link your voluntarily given identity to the series of throw-away
> cookies TBB leaves with track
Praedor Atrebates:
> Would not cpu/system data get hidden if you ran tor browser inside an
> emulator?
Depends on virtualizing platform and settings.
For Virtual Box...
try:
cat /proc/cpuinfo
Power off VM. Restart VM. Then run:
VBoxManage modifyvm "VMname" --synthcpu on
check again:
cat /proc/c
antispa...@sent.at:
> On Fri, Jul 13, 2012, at 15:02, proper wrote:
>> antispa...@sent.at:
>>> I remember reading about installing more extensions as a bad
>>> thing as it might identify a Tor configuration from another. But
>>> can't this be hidden?
>>
>> Maybe. Would require development which no
Would not cpu/system data get hidden if you ran tor browser inside an
emulator?
On 07/13/2012 01:34 PM, antispa...@sent.at wrote:
On Fri, Jul 13, 2012, at 15:02, proper wrote:
antispa...@sent.at:
I remember reading about installing more extensions as a bad
thing as it might identify a Tor c
On Fri, Jul 13, 2012, at 15:02, proper wrote:
> antispa...@sent.at:
> > I remember reading about installing more extensions as a bad
> > thing as it might identify a Tor configuration from another. But
> > can't this be hidden?
>
> Maybe. Would require development which no one wants to take.
In t
the way the TBB creates anonymity may not be very intuitive, but it does
work. at least as long as you do not identify yourself to a website that
will link your voluntarily given identity to the series of throw-away
cookies TBB leaves with trackers (ohai facebook, i guess).
popular securtiy/privac
antispa...@sent.at:
> I remember reading about installing more extensions as a bad
> thing as it might identify a Tor configuration from another. But
> can't this be hidden?
Maybe. Would require development which no one wants to take.
> I know extensions can answer javascript
> requests. Is it po
I remember reading about installing more extensions as a bad
thing as it might identify a Tor configuration from another. But
can't this be hidden? I know extensions can answer javascript
requests. Is it possible to have a generic option to stop them
from answering to these external requests?
Also,
Jerzy Łogiewa:
> maybe a new one could be made!
>
> it is not hard to imagine some kickstarter.com project:
>
> "secure + protecting anonymity email client" and nice video talk by you and
> others telling why.
>
> maybe also for torbrowser really.
>
I appreciate your confidence in my abilitie
20 matches
Mail list logo