Technically, the most effective way of avoiding TOR Exit nodes snooping in
on you is not using TOR in the first place. This is a genuine answer, I'm
not being sarcastic.
But you open yourself up to communications sniffing, wiretaps, mass
surveillance and other NSA operations vs the option of 2% of
Do governments already have a 1M bit Quantum Annealer (like the DWave),
capable of breaking RSA and ECC?
Well, there's an open source implementation, NTRU, which is not known to be
susceptible to Shor's algorithm (and by extension Quantum Computation),
being lattice-based.
http://sourceforge.net/
On Mon, 01 Jul 2013 22:18:06 +, coderman wrote:
...
> you should assume this number will always approach anything greater
> than zero; and how do you handle a reduction? axe clients without
> prejudice?
Put new clients into the next instance of this service, formally
operated by someone else?
On Mon, Jul 1, 2013 at 4:12 PM, Praedor Tempus wrote:
> Sounds like for Germany and like countries/laws such servers should be
> limited to no more than 10k users each to prevent that invasion.
you should assume this number will always approach anything greater
than zero; and how do you handle a
On Mon, Jul 1, 2013 at 1:04 PM, wrote:
>> Thank you for raising this topic once again. Toying with the idea of
>> "better" email for quite some time,...
>> ...
>> I'd like to see a full design for it first, and then the components, and
>> the configuration for each component, so this is easy to s
On 13-07-02 12:04 AM, Andrew F wrote:
> How about we eliminate the issue by pushing a campaign for every website to
> offer an ssl option. It really should be the standard.
>
> Anyone a marketing Guru or PR specialist?
Please do support EFF in this initiative!
https://www.eff.org/encrypt-the-web
How about we eliminate the issue by pushing a campaign for every website to
offer an ssl option. It really should be the standard.
Anyone a marketing Guru or PR specialist?
On Tue, Jul 2, 2013 at 3:47 AM, Jimmy Chen wrote:
> I never said properly and ethically certified, did I.
> On Jul 1, 20
I never said properly and ethically certified, did I.
On Jul 1, 2013 8:25 PM, "adrelanos" wrote:
> What happens if JonDo certified mixes do things forbidden by certification?
>
> Jimmy Chen:
> > If you want your exit nodes to be certified, it's probably best at this
> > time, to use JAP instead o
What happens if JonDo certified mixes do things forbidden by certification?
Jimmy Chen:
> If you want your exit nodes to be certified, it's probably best at this
> time, to use JAP instead of TOR.
Or combine both, tunnel JonDo through Tor (user -> Tor -> JonDo). (Not
saying it's necessarily a goo
There are malicious TOR Nodes, and you can't stop that from happening. But
it is up to the service providers to enable encryption on their servers,
removing the possibility that such data can be intercepted. You shouldn't
trust your information to be sent through a plaintext protocol to begin
with,
> I have a concern regarding exit nodes in Tor. In my mind it is possible for
> an attacker to run a malicious exit server that gathers information at the
> exit point. Of course, this does not compromise anonymity per se, but it
> still can reveal sensitive data to malicious people. I think the Jo
Hi there,
I have a concern regarding exit nodes in Tor. In my mind it is possible
for an attacker to run a malicious exit server that gathers information
at the exit point. Of course, this does not compromise anonymity per se,
but it still can reveal sensitive data to malicious people. I think
Sounds like for Germany and like countries/laws such servers should be limited
to no more than 10k users each to prevent that invasion.
From: Moritz Bartl
To: tor-talk@lists.torproject.org
Sent: Monday, July 1, 2013 10:41 AM
Subject: Re: [tor-talk] Secure emai
> Thank you for raising this topic once again. Toying with the idea of
> "better" email for quite some time, I think there's direct and practical
> things you can offer,
>
> > i was thinking about pointing the mx record of the tld to a mail
> > server that is shared with other individuals. the se
Hi,
Thank you for raising this topic once again. Toying with the idea of
"better" email for quite some time, I think there's direct and practical
things you can offer,
> i was thinking about pointing the mx record of the tld to a mail
> server that is shared with other individuals. the server
>
In the case of access to e-mail from untrusted computer is convenient and
reliable to use one-time password authentication using e-codebook - mobile
Java applet for your phone. A one-time password is generated in response to
RAND, generated by the mail server. QR-code can be used. For example s
Yesterday evening the German TV magazine "ttt" showed a
program about the darknet and Tor. Online there is a
recording available:
http://is.gd/eofnVF
Unfortunately only in German. But the page also provides a
German transcript of the TV program.
Regards,
Torland
___
* on the Sun, Jun 30, 2013 at 06:18:01PM -0600, AK wrote:
> That's why I'm setting up my own mail server at home. And also plan to
> access it via web interface if using someone else's machine (like at
> home). I would only allow web access via SSL and password, and only
> show the emails of the l
18 matches
Mail list logo