[tor-talk] How to use globe to find obfs2/3 bridges for me to use?

2014-03-07 Thread Hongyi Zhao
Hi all, I noticed that the following website: https://globe.torproject.org/ On the above site, it has the some descriptions like this: Globe is an application that helps you find and explore Torrelays and bridges. So I want to use this tool to find obfs2/3 bridges

Re: [tor-talk] TIMB - Tor Instant Messaging Bundle

2014-03-07 Thread Arlo Breault
On Wednesday, March 5, 2014 at 4:39 AM, M. Ziebell wrote: > If have a question to the TIMB Project, > I'm not sure if this is the correct mailing list, if not I'm sorry. > > In this Roadmap/summary: > > https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/notes/Roadma

Re: [tor-talk] Current attack of TOR to break anonymity

2014-03-07 Thread Paul Syverson
On Fri, Mar 07, 2014 at 11:29:22AM +, Miguel Regala wrote: > There are some interesting papers on TOR anonymity, not really sure if all > of them have been addressed. > > Some: > http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6407715&queryText%3Dtor > http://ieeexplore.ieee.org

Re: [tor-talk] Current attack of TOR to break anonymity

2014-03-07 Thread Miguel Regala
There are some interesting papers on TOR anonymity, not really sure if all of them have been addressed. Some: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6407715&queryText%3Dtor http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6132443&queryText%3Dtor+cell The cell

Re: [tor-talk] Current attack of TOR to break anonymity

2014-03-07 Thread Martin Kepplinger
Am 2014-03-07 11:32, schrieb Maimun Rizal: > Dear All, > > is there any attack can be break anonymity in TOR network? if so, how? > > I assume, if I want to break anonymity in the TOR network, I should take > control all of relays which are used by sender and destination as a > transmission media

[tor-talk] Current attack of TOR to break anonymity

2014-03-07 Thread Maimun Rizal
Dear All, is there any attack can be break anonymity in TOR network? if so, how? I assume, if I want to break anonymity in the TOR network, I should take control all of relays which are used by sender and destination as a transmission media. with this assumption, It is easy to show the difference

Re: [tor-talk] Advice on XMPP as a hidden service

2014-03-07 Thread Cypher
On Mar 6, 2014, at 3:44, Mike Cardwell wrote: * on the Thu, Mar 06, 2014 at 02:02:50AM -0600, Cypher wrote: 1. Let's say my hidden service is xxxcf.onion. What would the users final JID be? Would they still be u...@chat.cpunk.us or would the onion address come into play? Depends. When some