Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-26 Thread coderman
On Thu, Jun 26, 2014 at 11:49 AM, grarpamp wrote: >> ... >> the original argument is based on faulty assumptions. > > Rather, it presents untested hypotheses. As in the past with > these sorts of sites, the operator perhaps got vanned for reasons > other than any particular weakness of tor itself,

Re: [tor-talk] Downloading Programs with TBB - dangerous???

2014-06-26 Thread Joe Btfsplk
On 6/26/2014 1:34 PM, Bobby Brewster wrote: /Let's say I download a PDF with Tor. I get the warning that I might download it outside Tor./ That used to be the norm, but I believe the message was changed in later TB versions. Which version are you using? I'm not sure I've seen that warning lat

Re: [tor-talk] Downloading Programs with TBB - dangerous???

2014-06-26 Thread anonazombie
Not every file you download is a bad file, but this is just a warning to tell you that they exist and that 'doxing' code can be hidden into various file types. When you open those files it looks like any normal document, but also sends a call back to the owner with various bits of information about

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-26 Thread grarpamp
In re: Mark McCarron wrote: On Thu, Jun 26, 2014 at 2:00 AM, coderman wrote: > On Wed, Jun 25, 2014 at 10:09 PM, Mirimir wrote: >> ... >> As far as I know, no hidden service site has ever been compromised >> through an inherent weakness of Tor. Am I wrong in saying that? > > i am only aware of on

[tor-talk] How does DNS work with .onion addresses?

2014-06-26 Thread Bobby Brewster
Hello, I know that when the TBB connects to a 'normal' .com or .org or whatever address then the DNS resolution is done by the exit node.  There is no need anymore (not for several years now) for the client to set-up DNS manually (as used to be the case with Polipo or Privoxy). However, how do

[tor-talk] Downloading Programs with TBB - dangerous???

2014-06-26 Thread Bobby Brewster
Let's say I download a PDF with Tor. I get the warning that I might download it outside Tor. What is the liklihood of that actually happening?  Are there some dangerous file types that one should not download. Please note that I am talking about the downloading itself. I'm not talking about do

[tor-talk] Vidalia as stand-alone client???

2014-06-26 Thread Bobby Brewster
Hello, Many years ago Vidalia used to be part of the TBB (I think - or was it a stand-alone program)? Anyhow, it was helpful to see the browsing speed. I realise Vidalia can be installed as a stand-alone program: https://www.torproject.org/docs/debian-vidalia.html.en However, I'm wondering if

[tor-talk] routing Pure Data messages over Tor

2014-06-26 Thread Jonathan Wilkes
Hi list, I'm experimenting with sending messages over Tor using the program Pure Data.  Pure Data (or Pd) is a graphical programming environment.  It typically runs two processes-- a tk GUI process, and the "main" process.  The two communicate over the loopback device 127.0.0.1.  (Can't rem

Re: [tor-talk] Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...)

2014-06-26 Thread coderman
> the list goes on, and on, ... https://code.google.com/p/pentest-bookmarks/ https://code.google.com/p/pentoo/wiki/BookmarksList -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] unregister exit relay - how to

2014-06-26 Thread cbr...@hush.com
Assuming seperate modem, WAN IP changes when MAC of first device after (either router or regular computer) changes. Some router firmwares allow you to change the WAN side MAC which of course results in another IP address being assigned; bear in mind if you do this a modem reboot is required.

Re: [tor-talk] unregister exit relay - how to

2014-06-26 Thread grarpamp
kill dhcpd, change mac, start dhcpd. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...)

2014-06-26 Thread coderman
On Wed, Jun 25, 2014 at 11:50 PM, Tor Talker wrote: > > More to the point, do you have specific concerns regarding the > Linux/Tor/Apache/Perl stack we are using? We do sanitize error messages to > prevent Apache from leaking system information, but that's really the only > special effort

Re: [tor-talk] unregister exit relay - how to

2014-06-26 Thread Luca
Yes you are right, now I know. My ip is dynamic but is changed quite rarely, and reboot the router 99% of the times doesn't affect it. That's is why I'm looking for a different approach. thanks Luca On 26 June 2014 14:14, cbr...@hush.com wrote: > This is why it is recommended that you not commi

Re: [tor-talk] unregister exit relay - how to

2014-06-26 Thread cbr...@hush.com
This is why it is recommended that you not commingle the tor exit relay data and your personal traffic on the same IP. Do you have a static or dynamic IP address? Please also consider the possible consequences of running an exit relay from your house... On 06/26/2014 at 4:01 AM, "Luca" wrote:Hi t

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-26 Thread Spam 06
Haleluja brothers and sisters! Brother McCarron has step up to say something to us! I say preach it brother! Mark McCarron: > I have been examining How? > the number Can you say the number, oh brother? > of what would Would like you're not sure of the healing power of the Holy Spirit? > no

Re: [tor-talk] SPDYv3 [WAS:You could use ModX to create .onion sites, ]

2014-06-26 Thread Georg Koppen
shm...@riseup.net: > > > Mike Cardwell: >> SPDY is currently supported by Firefox, Chromium and Opera. A few >> examples of sites that already have SPDY enabled: Google.com+mail, >> Facebook, Twitter, Wordpress.com. Apache has a module for it: >> https://code.google.com/p/mod-spdy/ and the latest

Re: [tor-talk] Secure Hidden Service

2014-06-26 Thread Dedalo Galdos
Hi, I made a very basic python script to help people setup their hidden service. Maybe this could be useful for some people. https://github.com/Dedal0/Tosc El jun 26, 2014 3:12 AM, "Mirimir" escribió: > On 06/26/2014 12:50 AM, Tor Talker wrote: > > On 25 Jun 2014, at 11:09 PM, Mirimir wrote: >

Re: [tor-talk] SPDYv3 [WAS:You could use ModX to create .onion sites, ]

2014-06-26 Thread shm...@riseup.net
Mike Cardwell: > SPDY is currently supported by Firefox, Chromium and Opera. A few > examples of sites that already have SPDY enabled: Google.com+mail, > Facebook, Twitter, Wordpress.com. Apache has a module for it: > https://code.google.com/p/mod-spdy/ and the latest versions of Nginx > have it

[tor-talk] unregister exit relay - how to

2014-06-26 Thread Luca
Hi to all, Few days ago I have tried to setup an exit relay on my home laptop .. with great success :) The bad part is after seeing my external ip address published to the world on atlas or globe I have discovered I cannot access anymore to some site with my payed premium login credential because

Re: [tor-talk] Secure Hidden Service

2014-06-26 Thread Mirimir
On 06/26/2014 12:50 AM, Tor Talker wrote: > On 25 Jun 2014, at 11:09 PM, Mirimir wrote: > >> ... any Tor user can host a hidden service. But few people, even >> experienced web engineers, know enough to do it securely enough. >> Also, hidden services are far more vulnerable than Tor users, >> sim

Re: [tor-talk] Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...)

2014-06-26 Thread Andreas Krey
On Thu, 26 Jun 2014 00:50:29 +, Tor Talker wrote: ... > > enough to do it securely enough. Also, hidden services are far more > > vulnerable than Tor users, simply because they serve stuff. ... > What sort of vulnerabilities would you expect to see? Problem: Your hidden server can be made to t

[tor-talk] Secure Hidden Service (was: Re: ... Illegal Activity As A Metric ...)

2014-06-26 Thread Tor Talker
On 25 Jun 2014, at 11:09 PM, Mirimir wrote: > ... any Tor user can host a > hidden service. But few people, even experienced web engineers, know > enough to do it securely enough. Also, hidden services are far more > vulnerable than Tor users, simply because they serve stuff. OK, I'll bite. Are

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-26 Thread coderman
On Wed, Jun 25, 2014 at 10:09 PM, Mirimir wrote: > ... > As far as I know, no hidden service site has ever been compromised > through an inherent weakness of Tor. Am I wrong in saying that? i am only aware of one Tor vulnerability that led to compromised hidden services of affected instances, ba