[tor-talk] problems with the update

2013-04-04 Thread Gerardo Rodríguez
Hi, I downloaded the last update of the TBB (tor-browser-2.3.25-6_en-US.exe), and it keeps on telling it needs to be updated. I tried every thing (in the about:config the version is the right one, re-install it, re-download it, etc.). Is someone else having the same problem? Further more,

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Paul Syverson
*sigh* at the risk that I am feeding a troll rather than helping someone wellmeaning but misinformed and the hope that some will find these points useful despite their having been made many times before: 1. Tor not TOR (See https://www.torproject.org/docs/faq.html.en#WhyCalledTor ) 2. was cre

[tor-talk] OT: Tor mentioned in "The Following" TV show

2013-04-04 Thread georgeofthejungle
Hi, In case anyone is interested, I was watching this week's The Following, episode titled "Whips and Regret," and Tor was mentioned very quickly in passing, verbatim: Bad lady that runs online pron sites says at minute 13:34 to 14:50: "I have some foreign clients, they're into the hardcore ille

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Jacob Henner
Could the government spider .onions just as Google spiders the web? Of course. But the assertion that hidden services have been compromised as a concept is plain wrong. Jacob Henner On 04/04/2013 01:55 PM, Gregory Disney wrote: > Just saying TOR was created by the Naval Research Laboratory a part

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Christopher Walters
On Wed, 03 Apr 2013 23:38:40 -0400 cmeclax wrote: > http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 > If the NSA intercepted all Tor traffic, how fast could they decrypt > it? What are they up against when trying to break Tor? Wouldn't this question be more appropriate for a cryp

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread mirimir
On 04/04/2013 08:25 PM, Christopher Walters wrote: > On Wed, 03 Apr 2013 23:38:40 -0400 > cmeclax wrote: > >> http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 >> If the NSA intercepted all Tor traffic, how fast could they decrypt >> it? What are they up against when trying to break

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread grarpamp
> Guys, if you are in trouble with NSA, or other US governmentals agency, > you're screwed. Physically. Don't mind your electronical com'. Very good calibration sir :) And come to think of it, being in such trouble might not be so bad, you might find yourself with a lucrative job offer you can't r

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread grarpamp
> ill really try not to go conspiracy crazy... but that is always a risk ... > there is also a video on youtube from a recent con about the feasibility of > factoring them, <"fast hacks" or something like that> There are always rational analyses that can be made. Many analysts think of the availa

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Gregory Disney
Just saying TOR was created by the Naval Research Laboratory a part of DARPA. Since it's inception they could index, spider and track the dark net. On Thu, Apr 4, 2013 at 1:08 PM, grarpamp wrote: > > Guys, if you are in trouble with NSA, or other US governmentals agency, > > you're screwed. Phy

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
One thing i forgot.. The last vpn/ssh tunnel need to be totally secure. Basically, you need your personnal anon server to do that. If you can't handle your own service, you'll better stay with tor as the last system in the pile. 2013/4/4 Alexandre Guillioud > I'm in a hurry so, i describe a lit

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
Why not using some exotic scramble of keys/method to encrypt the whole message ? The only way to hide/protect us from something we don't know, is putting a mess in protocols. A big mess. The point is : How can we unscramble it at the end without revealing the secret necessary to scramble it ? Guy

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread george torwell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 i wasnt going to, but now i have to... i dont know what tech or knowledge they have. but i imagine that if you angered them, and they wanted your keys, they would come and get them. physically or electronically. so lets not speculate :) i have a l

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
I'm in a hurry so, i describe a little scenario : + Launch a vpn/ssh tunnel service, and secure bind privoxy/proxifier into it. (this one is for scrambling, linearising data) + Launch a system like Privoxy and/or Proxifier ++ Bind several linked proxy (your data will pass thru each of them) + Laun

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Ivan Sipka
On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud < guillioud.alexan...@gmail.com> wrote: > So, if you're paranoïd, or doing something where paranoïd behavior is > requested, use a vpn inside and outside tor. > Use linked proxy's on top of this. You'll be fine. > could you elaborate on this a b

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
So, if you're paranoïd, or doing something where paranoïd behavior is requested, use a vpn inside and outside tor. Use linked proxy's on top of this. You'll be fine. 2013/4/4 Alexandre Guillioud > I may be wrong, but i take for true that NSA as 10 to 30 years advance on > maths and cryptographi

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread cmeclax
On Thursday, April 04, 2013 10:51:50 Bernard Tyers wrote: > Hi, > > Is there a reason 1024 bit keys, instead of something higher is not used? Do > higher bit keys affect host performance, or network latency? Are you talking about the onion key or the identity key? What about the key exchange use

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
I may be wrong, but i take for true that NSA as 10 to 30 years advance on maths and cryptographic méthod. Le jeudi 4 avril 2013, George Torwell a écrit : > i may be wrong but: > - we are talking about keys of every node along the path. how can you > increase that just locally? > - keep in mind t

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
One ask triggering another : How do you do a timing attack ? What are the necessary steps to be successfull in such a thing ? Where can i find some documented timing attack scenario ? 2013/4/4 Alexandre Guillioud > My guess is that the Key size is configured right into the node's source > code.

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Nick Mathewson
On Thu, Apr 4, 2013 at 5:51 AM, Bernard Tyers wrote: > Hi, > > Is there a reason 1024 bit keys, instead of something higher is not used? Do > higher bit keys affect host performance, or network latency? Because in 2003/2004, when we were designing Tor, 1024-bit keys seemed like they would probab

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread George Torwell
i may be wrong but: - we are talking about keys of every node along the path. how can you increase that just locally? - keep in mind that we dont know if factoring such a key is likely, if i remember correctly that talk mentioned huge amounts of computation power and electricity. something like

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Bernard Tyers
That's what I was thinking, I just didn't know if there was another reasons. I guess the key size is configured on the Tor node? I haven't found it anywhere in the configuration (I'm using TBB on OS X). Is it possible to increase the size of the key, if say I've got a big server running as a no

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
My guess is that the Key size is configured right into the node's source code. If you apply multiple key size accross the network, you're exposed with the smallest encryption key of the circuit. Except for one thing : if somebody can break one of the circuit's key, depending of the node number into

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Bernard Tyers
Hi, Is there a reason 1024 bit keys, instead of something higher is not used? Do higher bit keys affect host performance, or network latency? Thanks, Bernard Written on my small electric gadget. Please excuse brevity and (probable) misspelling. George Torwell wrote: a second guess wo

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Alexandre Guillioud
The bigger the key is, the longer (cpu cycle) it take to encrypt/decrypt ? Le jeudi 4 avril 2013, Bernard Tyers a écrit : > Hi, > > Is there a reason 1024 bit keys, instead of something higher is not used? > Do higher bit keys affect host performance, or network latency? > > > Thanks, > Bernard >

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread George Torwell
ill really try not to go conspiracy crazy... but that is always a risk when discussing the NSA on this list :) if they intercepted everything, there wont be much of a need to decrypt it. they could watch it going in plaintext to the exit nodes, and use timing attacks and get a pretty good sense

[tor-talk] NSA supercomputer

2013-04-04 Thread cmeclax
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 If the NSA intercepted all Tor traffic, how fast could they decrypt it? What are they up against when trying to break Tor? ___ tor-talk mailing list tor-talk@lists.torproject.org https://li