[tor-talk] how to save html5 cookies on TBB

2012-10-06 Thread esolve esolve
TBB will delete all cookies when it is closed however, in youtube, html5 can be enabled by join the html5 trial through this page: http://www.youtube.com/html5, which will save a cookie on TBB can this cookie be kept on TBB? like configuration file? thanks __

Re: [tor-talk] Testing Documentation for TorBirdy

2012-10-06 Thread tagnaq
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi antispam06, > Sukhbir, could you make a small tutorial on how to test TorBirdy? > I'm willing to create one or two free accounts via TBB and do the > checking, but I have no idea how. thanks for your offer to test TorBirdy. What are you aiming

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/10/12 23:37, Maxim Kammerer wrote: >> "TRESOR is only compatible with real hardware. Run- ning TRESOR >> as guest inside a virtual machine is gen- erally insecure as the >> guest?s registers are stored in the host?s main memory." > > This is

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread Maxim Kammerer
On Sat, Oct 6, 2012 at 11:44 PM, wrote: > "TRESOR is only compatible with real hardware. Run- > ning TRESOR as guest inside a virtual machine is gen- > erally insecure as the guest?s registers are stored in the > host?s main memory." This is irrelevant to my example. > Also, the encryption/decr

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/10/12 22:44, t...@lists.grepular.com wrote: > From: > http://www1.informatik.uni-erlangen.de/tresorfiles/tresor.pdf > > "TRESOR is only compatible with real hardware. Run- ning TRESOR as > guest inside a virtual machine is gen- erally insecur

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/10/12 22:28, Maxim Kammerer wrote: >> The basic idea being that your keys are shifted from RAM into >> the debug registers of the CPU on boot, then all future crypto is >> done directly on the CPU (AES-NI) without the keys re-entering >> RAM.

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread Maxim Kammerer
On Sat, Oct 6, 2012 at 9:37 PM, wrote: > The basic idea being that your keys are shifted from RAM into the > debug registers of the CPU on boot, then all future crypto is done > directly on the CPU (AES-NI) without the keys re-entering RAM. Did you check that the volume key (shown with cryptsetu

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/10/12 20:42, adrelanos wrote: >> FYI, if you use TRESOR/Trevisor, you can protect your OS >> encryption keys from cold boot attacks: > I like the basic idea very much. > > Does this patch still work against latest kernel of your distro? Not

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread adrelanos
t...@lists.grepular.com: > On 06/10/12 19:24, grarpamp wrote: > >>> *Anyone* with *any* access to the data centers that host the >>> directory authorities is potentially subject to either a coercive >>> or subversive >>> >>> As you know, I've been digging down the rabbit hole of how to >>> ensure

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread tor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 06/10/12 19:24, grarpamp wrote: >> *Anyone* with *any* access to the data centers that host the >> directory authorities is potentially subject to either a coercive >> or subversive >> >> As you know, I've been digging down the rabbit hole of ho

Re: [tor-talk] Vidalia Settings

2012-10-06 Thread antispam06
On Sat, Oct 6, 2012, at 14:46, Andreas Krey wrote: > On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote: > ... > > with Pidgin through Tor. In my proxy configuration for the account in > > Pidgin I left the user and password empty. And it still worked. Am I > > missing something? Shouldn'

Re: [tor-talk] [tor-dev] resistance to rubberhose and UDP questions

2012-10-06 Thread grarpamp
Import from rubberhose dirauth on other list... > *Anyone* with *any* access to the data centers that host the directory > authorities is potentially subject to either a coercive or subversive > > As you know, I've been digging down the rabbit hole of how to ensure the > integrity of a remote mach

Re: [tor-talk] Flashproxy questions. (Badge config, user interaction)

2012-10-06 Thread David Fifield
On Fri, Oct 05, 2012 at 07:28:35PM +0200, Sebastian G. wrote: > Some questions about Flashproxy regarding the configuration by the one > that places the badge and what happens to the Proxy in various use cases. > > According to the paper: > "... the badge is highly configurable for different scen

Re: [tor-talk] "Little Snitch" for tor!

2012-10-06 Thread Fabio Pietrosanti (naif)
Hi Agree, there is generally a serious lacks of high usable applications for application sandboxing from both filesystem and network operations point of view. I hate advertising a commercial product, but Handsoff is a very good example of highly usable/security application for Mac. If they would

Re: [tor-talk] Vidalia Settings

2012-10-06 Thread Andreas Krey
On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote: ... > with Pidgin through Tor. In my proxy configuration for the account in > Pidgin I left the user and password empty. And it still worked. Am I > missing something? Shouldn't the authentication be set to Nothing in > order to make it

[tor-talk] Vidalia Settings

2012-10-06 Thread antispam06
Vidalia -> Settings -> Advanced TCP Connection. Normally it goes on auto. But I guess it can be set for each instance. Now the ControlSocket would do exactly the same in an Unix environment for an app that can use a special file? Second: authentication. It is set for password. And the password is

Re: [tor-talk] Tor SOCKS?

2012-10-06 Thread antispam06
On Sat, Oct 6, 2012, at 08:06, Matthew Finkel wrote: > Depending on the version of TBB you have, Tor will randomly select the > SOCKS5 port it listens on. I don't know of official documentation off > hand, but I know there are a couple ways to find it. It is specified in > Data/Tor/port.conf within

Re: [tor-talk] Tor SOCKS?

2012-10-06 Thread antispam06
On Sat, Oct 6, 2012, at 08:11, Roger Dingledine wrote: > On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote: > > I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia > > bundle has been discontinued. So I jumped at using this configuration. > > I have read that the

Re: [tor-talk] Tor SOCKS?

2012-10-06 Thread Roger Dingledine
On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote: > I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia > bundle has been discontinued. So I jumped at using this configuration. > I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried > pushing throu

Re: [tor-talk] Tor SOCKS?

2012-10-06 Thread Matthew Finkel
On 10/05/2012 03:31 PM, antispa...@sent.at wrote: > I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia > bundle has been discontinued. So I jumped at using this configuration. > I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried > pushing through it a jabber.org