Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread Lunar
AntiTree: > If I were a betting person, a beer says that they will be summarizing the > current issues with hidden services, and as Adrian said, doing a client > side disbanding attack (e.g. Java + DNS) My own speculations is that they have used the attacks on guard relays described in the followi

Re: [tor-talk] [MLUG] Linux users targeted for surveillance

2014-07-03 Thread Zenaan Harkness
> A general FYI. > > http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance >> the NSA are interested in Linux > > Send those resumes in. NSA - the largest group of extremists in one organisation that the world has ever seen. -- tor-t

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread C B
It also has to be a hollow claim. To actually "deanonymize" someone would mean making a list of every website that was visited by that client. Not just identify one client that visited one website. And how many clients were you planning on doing that with? It would take an NSA size budget not a

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread Yuri
On 07/03/2014 16:17, Adrian Crenshaw wrote: Best guess, many client side and web app attacks Tor can't do much about. (My talk at Defcon will cover a bunch of folks that got Deanonymized, but in every case it was not Tor that was really broke) This actually depends on what to mean by "Tor". If

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread AntiTree
Can anyone from the Tor Project jump in to say whether these guys have reached out or not? We should be concerned about another CCC-style "0-day" presentation where they find a legitimate vulnerability that could have been patched prior, but are using it as a PR stunt to boost book sales as oppose

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-03 Thread Mirimir
On 07/03/2014 07:06 AM, Rejo Zenger wrote: > ++ 03/07/14 04:39 + - scarp: >> Most attacks about breaking out of a VM rely on you installing the >> guest tools, so never do that. > > What are "guest tools" in this context? In VirtualBox, they're called "Guest Additions". In VMware, they're cal

[tor-talk] use gpg or fork in tor

2014-07-03 Thread raiogam mestri
i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1 for decript not workanyone and someone have encript key anyone and someone encript and send to user via torthe user have decript keyand receive the code encript via torand decrypt they i search "open source" and loo

Re: [tor-talk] High-latency hidden services

2014-07-03 Thread Mirimir
On 07/03/2014 04:16 PM, Seth David Schoen wrote: > The Doctor writes: > >> On 07/02/2014 04:18 PM, Helder Ribeiro wrote: >> >>> Apps like Pocket (http://getpocket.com/) work as a "read it later" >>> queue, downloading things for offline reading. While you're reading >>> an offline article, you ca

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread Seth David Schoen
Adrian Crenshaw writes: > Best guess, many client side and web app attacks Tor can't do much about. > (My talk at Defcon will cover a bunch of folks that got Deanonymized, but > in every case it was not Tor that was really broke) The description on the Black Hat site refers "a handful of powerful

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread Adrian Crenshaw
Best guess, many client side and web app attacks Tor can't do much about. (My talk at Defcon will cover a bunch of folks that got Deanonymized, but in every case it was not Tor that was really broke) Adrian On Thu, Jul 3, 2014 at 5:49 PM, krishna e bera wrote: > On 14-07-03 02:05 PM, grarpamp

Re: [tor-talk] (no subject)

2014-07-03 Thread Geoff Down
See https://chartbeat.com/faq/what-is-ping-chartbeat-net for what I think you are seeing - website analytics. On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote: > Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check > this,please. Nor in Whois > > > On Thu, Jul 3, 2014 at 9:27

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check this,please. Nor in Whois On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas wrote: > Another example is this s3-website-eu-west-1.amazonaws.comOR > edge-star-shv-08-gru1.facebook.com OR > ec2-54-225-215-244.compute-1.amazona

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service

2014-07-03 Thread Seth David Schoen
The Doctor writes: > On 07/02/2014 04:18 PM, Helder Ribeiro wrote: > > > Apps like Pocket (http://getpocket.com/) work as a "read it later" > > queue, downloading things for offline reading. While you're reading > > an offline article, you can also follow links and click to add them > > to your

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread krishna e bera
On 14-07-03 02:05 PM, grarpamp wrote: > You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget > Alexander Volynkin / Michael McCord if they have followed a responsible disclosure process, tor developers should already be working on remedies... -- tor-talk mailing list - to

Re: [tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Spam 06
The addon list is: * Adblock Plus 2.6.3 * Adblock Plus Pop-up Addon 0.9.2 * DownThemAll! 2.0.17 * DownThemAll! AntiContainer 1.3 * Flash and Video Download 1.58 * GrabMyBooks 1.8 * HTTPS-Everywhere 3.5.3 * Internote 3.0.2 * Mozilla Archive Format 3.0.2 * NoScript 2.6.8.31 * Self-Destructing Cookie

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas wrote: > I'm not referring to this.I'm talking of a lot of UR

Re: [tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Spam 06
Seth David Schoen: > Can you right-click on the image and Inspect Element? If so, does it > reference > > style="background-image: > url(//upload.wikimedia.org/wikipedia/en/b/bc/Wiki.png);" http://s4.postimg.org/u8lb1dv7x/Screenshot_from_2014_07_03_23_15_59_1.png The source does not point to o

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen wrot

Re: [tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Spam 06
Michael O Holstein: >> I got worried yesterday when instead of the Wikipedia logo on the >> top-left corner there was the picture of a nazi (army) guy with a > > Is this reproducible? In this instance of TBB, yes. But I haven't tried on a second computer. > To successfully (without error) inser

Re: [tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Seth David Schoen
Spam 06 writes: > I admit I have installed more extensions to TBB. Only FSF approved > licenses, mind you ;-) I have no flash, no java, only the add-ons. > > When I browse Wikipedia some of the images are messed up. Meaning there > is another image, most of the time a detail from a larger picture

Re: [tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread coderman
On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen wrote: > ... > Does anyone have theories about this part right at the bottom? .. >/** > * Placeholder fingerprint for Tor hidden service addresses. > * Real fingerpritns will be fired by the plugins > * 'anonymizer/tor/plugin/oni

Re: [tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Michael O Holstein
>I got worried yesterday when instead of the Wikipedia logo on the >top-left corner there was the picture of a nazi (army) guy with a Is this reproducible? To successfully (without error) insert into an HTTPS connection you must be trusted by the client .. would need list of CAcerts from firefo

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread C B
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget     -- Christopher Booth From: grarpamp To: tor-talk@lists.torproject.org Cc: cypherpu...@cpunks.org Sent: Thursday, July 3, 2014 2:05 PM Su

[tor-talk] Funny, but not amusing browsing

2014-07-03 Thread Spam 06
I admit I have installed more extensions to TBB. Only FSF approved licenses, mind you ;-) I have no flash, no java, only the add-ons. When I browse Wikipedia some of the images are messed up. Meaning there is another image, most of the time a detail from a larger picture in place. You can see the

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service

2014-07-03 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07/02/2014 04:18 PM, Helder Ribeiro wrote: > Apps like Pocket (http://getpocket.com/) work as a "read it later" > queue, downloading things for offline reading. While you're reading > an offline article, you can also follow links and click to ad

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread Matthew Kaufman
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget On Thu, Jul 3, 2014 at 2:05 PM, grarpamp wrote: > You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget > Alexander Volynkin / Michael McCord > > [...] > L

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread C B
I agree that collecting stories about "why/how I use Tor" is useful, but I disagree that any special education or warning should be needed before setting up an exit node. Setting up an exit node is simply providing another IP that can be used for traffic and nothing else. It is useful to provide

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-03 Thread Bobby Brewster
On Thu, 7/3/14, Tempest wrote: Subject: Re: [tor-talk] Benefits of Running TBB in a VM? To: tor-talk@lists.torproject.org Date: Thursday, July 3, 2014, 5:48 AM Bobby Brewster: > What are the benefits of running TBB in a VM? > > AIUI, there

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Rejo Zenger
++ 03/07/14 16:11 + - Jacob Appelbaum: >Here is some of the source code: > > http://daserste.ndr.de/panorama/xkeyscorerules100.txt Can you tell us something about the source of this code? The articles of the ARD do not mention any source at all, while other outlets mentioned Snowden wheneve

[tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-03 Thread grarpamp
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget Alexander Volynkin / Michael McCord [...] Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild... In this talk, we dem

Re: [tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Seth David Schoen
Jacob Appelbaum writes: > On 7/3/14, Eugen Leitl wrote: > > > > http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html > > > > Here is our larger story (in English) which includes excerpts of source code: >

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Watson Ladd
On Jul 3, 2014 9:57 AM, "Jacob Appelbaum" wrote: > > On 7/3/14, coderman wrote: > > On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote: > >> ... > >> i presume you mean as below: > >> (more a translation than additional QUELLCODE info though ;) > > > > Here is some of the source code: > > http:/

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Joe Btfsplk
On 7/3/2014 10:34 AM, Zenaan Harkness wrote: Agreed, great news. In hindsight, it is clear that we as a community have an interest to build a resource of amicus curiae briefs - friend of the court briefs. So PLEASE make moves in the direction of contributing and collecting documents which may b

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread mick
On Thu, 3 Jul 2014 16:11:39 + Jacob Appelbaum allegedly wrote: > On 7/3/14, coderman wrote: > > On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote: > >> ... > >> i presume you mean as below: > >> (more a translation than additional QUELLCODE info though ;) > > > > Here is some of the source

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread coderman
On Thu, Jul 3, 2014 at 9:11 AM, Jacob Appelbaum wrote: > ... > Here is some of the source code:... merci beaucoup :) -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Jacob Appelbaum
On 7/3/14, coderman wrote: > On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote: >> ... >> i presume you mean as below: >> (more a translation than additional QUELLCODE info though ;) > Here is some of the source code: http://daserste.ndr.de/panorama/xkeyscorerules100.txt Happy hacking, Jacob

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread coderman
On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote: > ... > i presume you mean as below: > (more a translation than additional QUELLCODE info though ;) detailed technical info via J. Appelbaum, A. Gibson, J. Goetz, V. Kabisch, L. Kampf, L. Ryge --- http://daserste.ndr.de/panorama/aktuell/NSA-tar

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Zenaan Harkness
(Thread start: https://lists.torproject.org/pipermail/tor-talk/2014-July/033573.html ) On 7/3/14, Anders Andersson wrote: > On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl wrote: >> On 07/02/2014 11:00 PM, Anders Andersson wrote: >>> Unfortunately he doesn't seem to want to take this further, so th

Re: [tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Jacob Appelbaum
On 7/3/14, Eugen Leitl wrote: > > http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html > Here is our larger story (in English) which includes excerpts of source code: http://daserste.ndr.de/panorama/aktu

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread coderman
On Thu, Jul 3, 2014 at 8:13 AM, -John wrote: > I thought JY at cryptome.org was already doing what you suggest. i presume you mean as below: (more a translation than additional QUELLCODE info though ;) --- http://cryptome.org/2014/07/nsa-tor-de.htm Donate for the Cryptome archive of files

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 7/3/2014 4:16 PM, Anders Andersson wrote: > On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl > wrote: >> On 07/02/2014 11:00 PM, Anders Andersson wrote: >>> Unfortunately he doesn't seem to want to take this further, so >>> the ruling will stand. It's

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-03 Thread Jens Kubieziel
* Elrippo schrieb am 2014-07-03 um 16:22 Uhr: > On which station can we watch the story on German TV today? Will be broadcasted on ARD at 21:45 (9:45 pm, 20:45 UTC). http://daserste.ndr.de/panorama/archiv/2014/Quellcode-entschluesselt-Beweis-fuer-NSA-Spionage-in-Deutschland,nsa224.html> -- Jens

Re: [tor-talk] OTFC IRC issues - new Tor friendly IRC network?

2014-07-03 Thread Patrick Schleizer
BlueStar88: > On Wed, 02 Jul 2014 09:15:47 + > Patrick Schleizer wrote: > >> BlueStar88: >>> >>> 37lnq2veifl4kar7.onion:6697 is up and running fine. >> >> Who runs that server? Inoffical one? >> >> I was more looking for a scalable, robust solution rather than >> individual quick fix. > > He

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-03 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On which station can we watch the story on German TV today? On 03. Juli 2014 14:01:15 MESZ, Jacob Appelbaum wrote: >Hi, > >On 7/3/14, coderman wrote: >> request for more (english speaking) details on QUELLCODE part of >> XKeyScore(XKS) >> >> >http

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Geoff Down
> On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl > wrote: > > On 07/02/2014 11:00 PM, Anders Andersson wrote: > >> Unfortunately he doesn't seem to want to take this further, so the > >> ruling will stand. It's his choice, but it could be a very bad > >> deterrent to other potential exit node opera

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Anders Andersson
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl wrote: > On 07/02/2014 11:00 PM, Anders Andersson wrote: >> Unfortunately he doesn't seem to want to take this further, so the >> ruling will stand. It's his choice, but it could be a very bad >> deterrent to other potential exit node operators in Austr

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-03 Thread Tempest
Bobby Brewster: > What are the benefits of running TBB in a VM? > > AIUI, there are two advantages. > > 1.If malware infects the VM, then just the VM is compromised. If your > Windows/Mac/Linux system is infected, then your entire system is affected > (yes, I realise that it should be only

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-03 Thread Rejo Zenger
++ 03/07/14 04:39 + - scarp: >Most attacks about breaking out of a VM rely on you installing the >guest tools, so never do that. What are "guest tools" in this context? -- Rejo Zenger E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl T @rejozenger | J r...@zenger.nl OpenPGP

[tor-talk] Yahoo bounces Re: Fw: confirm [whatever]

2014-07-03 Thread krishna e bera
The same thing happened to Yahoo and AOL users in tor-relays: https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html To summarize, your only practical remedy at this time is to use an email address not on Yahoo or AOL. On 14-07-01 04:41 PM, Bobby Brewster wrote: > What does this

Re: [tor-talk] (no subject) HTTPS Everywhere

2014-07-03 Thread krishna e bera
On 14-07-02 10:59 PM, Seth David Schoen wrote: > ideas buenas writes: > >> Why is markmonitor.com and its derivates in my TBB? How can I do to delete >> this ? Are they watching me? > > Hi, > > Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere > Enable/Disable Rules men

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-03 Thread Jacob Appelbaum
Hi, On 7/3/14, coderman wrote: > request for more (english speaking) details on QUELLCODE part of > XKeyScore(XKS) > > http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html > > specifically subsequent tasking associated with selected anonyms.

[tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-03 Thread coderman
request for more (english speaking) details on QUELLCODE part of XKeyScore(XKS) http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html specifically subsequent tasking associated with selected anonyms... -- tor-talk mailing list - tor-talk@lis

Re: [tor-talk] Does an Exit Node will be tagged with an "Exit" flag?

2014-07-03 Thread ra
On Thursday 03 July 2014 11:06:15 Bron Taylor wrote: > p accept 25,110,119,143,443,465,995 > "252.94.2.188.25.27.196.125.74.ip-port.exitlist.torproject.org. 1799 IN > A 127.0.0.2" from Google Public DNS. Moreover, the answer from TorDNSEL > told that the node with the ip address "188.2.94.252" is

[tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-03 Thread Eugen Leitl
http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html All accesses (several 100 k/day) to Tor directory authorities (at least some IPs hardcoded, Sebastian Hahn one of the targets) intercepted and logged, T

[tor-talk] Does an Exit Node will be tagged with an "Exit" flag?

2014-07-03 Thread Bron Taylor
Hi there, I used the TorDNSEL to verify an ip address of an exit node whether I can sent some kind of traffic through that node and found something is weired. First the information of the node can be found in the cached consensus file on my system with running a tor client. The

[tor-talk] Does an Exit Node will be tagged with an "Exit" flag?

2014-07-03 Thread Bron Taylor
Hi there, I used the TorDNSEL to verify an ip address of an exit node whether I can sent some kind of traffic through that node and found something is weired. First the information of the node can be found in the cached consensus file on my system with running a tor client. The

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread Lunar
MacLemon: > German language Austrian Legalese background: > Austrian E-Commerce Law §15: Ausschluss der Verantwortlichkeit bei > Zwischenspeicherungen http://j.mp/1iYdg4L > > § 15. Ein Diensteanbieter, der von einem Nutzer eingegebene > Informationen in einem Kommunikationsnetz übermittelt, ist fü

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service

2014-07-03 Thread Aymeric Vitte
Maybe one day, something like Peersm combined with [1] in order to follow/or use [2] and [3] (don't focus on google developing this here, these concepts are the only way to really secure a web page) Basically you fetch the web page with something like Peersm, then retarget it in a sandboxed co

Re: [tor-talk] High-latency hidden services (was: Re: Secure Hidden Service

2014-07-03 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07/03/2014 05:12 PM, grarpamp wrote: >> High-latency web browsing is actually a great use case and could >> benefit from the extra security. >> >> Apps like Pocket (http://getpocket.com/) work as a "read it >> later" queue, downloading things

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-03 Thread C B
When Edith Windsor approached Roberta Kaplan to take her case after she had been forced to pay $363,053 in estate taxes only because she had been married to a woman, instead of a man, she offered to pay for the defense, and Roberta immediately agreed to take the case and immediately said, no we