[tor-talk] txsocksx, Tor Browser and Windows: How to fix?

2014-06-27 Thread Mateus Meyer Jiacomelli
https://trac.torproject.org/projects/tor/ticket/12381 I can't wait for the next Tor version, so I need a solution. I tried inserting the txsocksx files into the obfsproxy.zip: I got a advance: It doesn't throws up any error, but it stays in "Estabilishing an encrypted...". Do I forgot something

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-27 Thread coderman
On Fri, Jun 27, 2014 at 11:38 AM, Juan wrote: > ... Tor, by design, is useless against > governments that can do traffic analysis. For instance, the US > government. last but not least, passive confirmation attacks are passe; the best attacks active. "From a Trickle to a Flood:

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-27 Thread Mark McCarron
We also need to consider that some unidentified flaws exist in the code, but I agree with you traffic analysis is certainly the major problem at present. Traffic obfuscation will not work against the NSA and it would cause problems with the network. The only option is to offer hosting within t

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-27 Thread coderman
On Fri, Jun 27, 2014 at 11:38 AM, Juan wrote: >... > And so we have amusing tor lackeys like ¨coderman¨ > parroting propaganda that not even the tor developers > themselves believe. this is amusing! explain to me where i've said Tor resists traffic analysis? :) my point i

Re: [tor-talk] hardware acceleration OK or not?

2014-06-27 Thread coderman
On Fri, Jun 27, 2014 at 11:27 AM, Joe Btfsplk wrote: > Hardware acceleration is unchecked by default it Torbrowser. > > Other than some machines might not support it, is there a reason not to > enabled it? the only reason you may have wanted to not enabled hardware acceleration was fixed last yea

[tor-talk] hardware acceleration OK or not?

2014-06-27 Thread Joe Btfsplk
Hardware acceleration is unchecked by default it Torbrowser. Other than some machines might not support it, is there a reason not to enabled it? Some fingerprinting or other issue? The dev manual (stable) just has this to say: */"HardwareAccel* *0*|*1* If non-zero, try to use built-in (stat

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-27 Thread Juan
On Fri, 27 Jun 2014 10:53:46 +0100 Mark McCarron wrote: > Well, I think this is settling down into a proper discussion. Whilst > the hypothesis is untested, leveraging illegal activity, especially > reviled illegal activity, as a metric for the quality of anonymity > and security provided by Tor

Re: [tor-talk] Bad Exit Nodes.

2014-06-27 Thread tor
You must assume that some of this is happening anyway, because we know that certain intelligence agencies (+ who knows who else) can gain backdoor access to the usual gear that sits upstream of the exit nodes (IE: the routers and switches of certain major hardware manufacturers). The traffic

Re: [tor-talk] Bad Exit Nodes.

2014-06-27 Thread Philipp Winter
On Fri, Jun 27, 2014 at 04:26:30AM -0700, Bobby Brewster wrote: > How could a person who is sniffing / stripping exit traffic be detected? We recently did some work on that: Long story short: Active attacks such as sslstripping are easy to detect be

Re: [tor-talk] How does DNS work with .onion addresses?

2014-06-27 Thread Mike Cardwell
* on the Fri, Jun 27, 2014 at 12:48:27PM +0100, Steven Murdoch wrote: >> I know that when the TBB connects to a 'normal' .com or .org or >> whatever address then the DNS resolution is done by the exit node. >> There is no need anymore (not for several years now) for the client >> to set-up DNS man

Re: [tor-talk] Bad Exit Nodes.

2014-06-27 Thread Joe Btfsplk
On 6/27/2014 6:26 AM, Bobby Brewster wrote: /What is to stop someone from setting up an exit node and a) sniffing all traffic or specifically non-SSL usernames and passwords and b) using SSLStrip to access SSL usernames and passwords?/ Nothing, if they're not encrypted. Common precaution is do

Re: [tor-talk] How does DNS work with .onion addresses?

2014-06-27 Thread Steven Murdoch
On 26 Jun 2014, at 19:38, Bobby Brewster wrote: > I know that when the TBB connects to a 'normal' .com or .org or whatever > address then the DNS resolution is done by the exit node. There is no need > anymore (not for several years now) for the client to set-up DNS manually (as > used to be t

[tor-talk] Bad Exit Nodes.

2014-06-27 Thread Bobby Brewster
I recently watched the video by Adrian Crenshaw (IronGeek) on Youtube about how to use darknets and Tor effectively. One of his concerns was about the individuals or organisations that are running exit nodes. What is to stop someone from setting up an exit node and a) sniffing all traffic or s

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-06-27 Thread Mark McCarron
Well, I think this is settling down into a proper discussion. Whilst the hypothesis is untested, leveraging illegal activity, especially reviled illegal activity, as a metric for the quality of anonymity and security provided by Tor is a sound strategy. As mentioned before, the 'canary' is dea

Re: [tor-talk] unregister exit relay - how to

2014-06-27 Thread Lunar
Luca: > Few days ago I have tried to setup an exit relay on my home laptop .. > with great success :) > > The bad part is after seeing my external ip address published to the > world on atlas or globe I have discovered I cannot access anymore to > some site with my payed premium login credential b

Re: [tor-talk] SPDYv3 [WAS:You could use ModX to create .onion sites, ]

2014-06-27 Thread shm...@riseup.net
Georg Koppen: > SPDY has some nice tracking features we don't want and which we need to > cope with first: > > https://www.torproject.org/projects/torbrowser/design/ > > "However, because SPDY can store identifiers and has extremely long > keepalive duration, it is disabled through the Firefox