TBB will delete all cookies when it is closed
however, in youtube, html5 can be enabled by join the html5 trial through
this page: http://www.youtube.com/html5, which will save a cookie on TBB
can this cookie be kept on TBB?
like configuration file?
thanks
__
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi antispam06,
> Sukhbir, could you make a small tutorial on how to test TorBirdy?
> I'm willing to create one or two free accounts via TBB and do the
> checking, but I have no idea how.
thanks for your offer to test TorBirdy. What are you aiming
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 23:37, Maxim Kammerer wrote:
>> "TRESOR is only compatible with real hardware. Run- ning TRESOR
>> as guest inside a virtual machine is gen- erally insecure as the
>> guest?s registers are stored in the host?s main memory."
>
> This is
On Sat, Oct 6, 2012 at 11:44 PM, wrote:
> "TRESOR is only compatible with real hardware. Run-
> ning TRESOR as guest inside a virtual machine is gen-
> erally insecure as the guest?s registers are stored in the
> host?s main memory."
This is irrelevant to my example.
> Also, the encryption/decr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 22:44, t...@lists.grepular.com wrote:
> From:
> http://www1.informatik.uni-erlangen.de/tresorfiles/tresor.pdf
>
> "TRESOR is only compatible with real hardware. Run- ning TRESOR as
> guest inside a virtual machine is gen- erally insecur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 22:28, Maxim Kammerer wrote:
>> The basic idea being that your keys are shifted from RAM into
>> the debug registers of the CPU on boot, then all future crypto is
>> done directly on the CPU (AES-NI) without the keys re-entering
>> RAM.
On Sat, Oct 6, 2012 at 9:37 PM, wrote:
> The basic idea being that your keys are shifted from RAM into the
> debug registers of the CPU on boot, then all future crypto is done
> directly on the CPU (AES-NI) without the keys re-entering RAM.
Did you check that the volume key (shown with cryptsetu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 20:42, adrelanos wrote:
>> FYI, if you use TRESOR/Trevisor, you can protect your OS
>> encryption keys from cold boot attacks:
> I like the basic idea very much.
>
> Does this patch still work against latest kernel of your distro?
Not
t...@lists.grepular.com:
> On 06/10/12 19:24, grarpamp wrote:
>
>>> *Anyone* with *any* access to the data centers that host the
>>> directory authorities is potentially subject to either a coercive
>>> or subversive
>>>
>>> As you know, I've been digging down the rabbit hole of how to
>>> ensure
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 19:24, grarpamp wrote:
>> *Anyone* with *any* access to the data centers that host the
>> directory authorities is potentially subject to either a coercive
>> or subversive
>>
>> As you know, I've been digging down the rabbit hole of ho
On Sat, Oct 6, 2012, at 14:46, Andreas Krey wrote:
> On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote:
> ...
> > with Pidgin through Tor. In my proxy configuration for the account in
> > Pidgin I left the user and password empty. And it still worked. Am I
> > missing something? Shouldn'
Import from rubberhose dirauth on other list...
> *Anyone* with *any* access to the data centers that host the directory
> authorities is potentially subject to either a coercive or subversive
>
> As you know, I've been digging down the rabbit hole of how to ensure the
> integrity of a remote mach
On Fri, Oct 05, 2012 at 07:28:35PM +0200, Sebastian G. wrote:
> Some questions about Flashproxy regarding the configuration by the one
> that places the badge and what happens to the Proxy in various use cases.
>
> According to the paper:
> "... the badge is highly configurable for different scen
Hi Agree,
there is generally a serious lacks of high usable applications for
application sandboxing from both filesystem and network operations point
of view.
I hate advertising a commercial product, but Handsoff is a very good
example of highly usable/security application for Mac.
If they would
On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote:
...
> with Pidgin through Tor. In my proxy configuration for the account in
> Pidgin I left the user and password empty. And it still worked. Am I
> missing something? Shouldn't the authentication be set to Nothing in
> order to make it
Vidalia -> Settings -> Advanced
TCP Connection. Normally it goes on auto. But I guess it can be set for
each instance. Now the ControlSocket would do exactly the same in an
Unix environment for an app that can use a special file?
Second: authentication. It is set for password. And the password is
On Sat, Oct 6, 2012, at 08:06, Matthew Finkel wrote:
> Depending on the version of TBB you have, Tor will randomly select the
> SOCKS5 port it listens on. I don't know of official documentation off
> hand, but I know there are a couple ways to find it. It is specified in
> Data/Tor/port.conf within
On Sat, Oct 6, 2012, at 08:11, Roger Dingledine wrote:
> On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote:
> > I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> > bundle has been discontinued. So I jumped at using this configuration.
> > I have read that the
On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote:
> I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> bundle has been discontinued. So I jumped at using this configuration.
> I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried
> pushing throu
On 10/05/2012 03:31 PM, antispa...@sent.at wrote:
> I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> bundle has been discontinued. So I jumped at using this configuration.
> I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried
> pushing through it a jabber.org
20 matches
Mail list logo