AntiTree:
> If I were a betting person, a beer says that they will be summarizing the
> current issues with hidden services, and as Adrian said, doing a client
> side disbanding attack (e.g. Java + DNS)
My own speculations is that they have used the attacks on guard relays
described in the followi
> A general FYI.
>
> http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance
>> the NSA are interested in Linux
>
> Send those resumes in.
NSA - the largest group of extremists in one organisation
that the world has ever seen.
--
tor-t
It also has to be a hollow claim. To actually "deanonymize" someone would mean
making a list of every website that was visited by that client. Not just
identify one client that visited one website. And how many clients were you
planning on doing that with? It would take an NSA size budget not a
On 07/03/2014 16:17, Adrian Crenshaw wrote:
Best guess, many client side and web app attacks Tor can't do much about.
(My talk at Defcon will cover a bunch of folks that got Deanonymized, but
in every case it was not Tor that was really broke)
This actually depends on what to mean by "Tor". If
Can anyone from the Tor Project jump in to say whether these guys have
reached out or not?
We should be concerned about another CCC-style "0-day" presentation where
they find a legitimate vulnerability that could have been patched prior,
but are using it as a PR stunt to boost book sales as oppose
On 07/03/2014 07:06 AM, Rejo Zenger wrote:
> ++ 03/07/14 04:39 + - scarp:
>> Most attacks about breaking out of a VM rely on you installing the
>> guest tools, so never do that.
>
> What are "guest tools" in this context?
In VirtualBox, they're called "Guest Additions". In VMware, they're
cal
i'm a devif tor not use it is nsa can spy torif not 2 key 1 for encript and 1
for decript not workanyone and someone have encript key anyone and someone
encript and send to user via torthe user have decript keyand receive the code
encript via torand decrypt they
i search "open source" and loo
On 07/03/2014 04:16 PM, Seth David Schoen wrote:
> The Doctor writes:
>
>> On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
>>
>>> Apps like Pocket (http://getpocket.com/) work as a "read it later"
>>> queue, downloading things for offline reading. While you're reading
>>> an offline article, you ca
Adrian Crenshaw writes:
> Best guess, many client side and web app attacks Tor can't do much about.
> (My talk at Defcon will cover a bunch of folks that got Deanonymized, but
> in every case it was not Tor that was really broke)
The description on the Black Hat site refers "a handful of powerful
Best guess, many client side and web app attacks Tor can't do much about.
(My talk at Defcon will cover a bunch of folks that got Deanonymized, but
in every case it was not Tor that was really broke)
Adrian
On Thu, Jul 3, 2014 at 5:49 PM, krishna e bera wrote:
> On 14-07-03 02:05 PM, grarpamp
See https://chartbeat.com/faq/what-is-ping-chartbeat-net
for what I think you are seeing - website analytics.
On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
> Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
> this,please. Nor in Whois
>
>
> On Thu, Jul 3, 2014 at 9:27
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois
On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas wrote:
> Another example is this s3-website-eu-west-1.amazonaws.comOR
> edge-star-shv-08-gru1.facebook.com OR
> ec2-54-225-215-244.compute-1.amazona
The Doctor writes:
> On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
>
> > Apps like Pocket (http://getpocket.com/) work as a "read it later"
> > queue, downloading things for offline reading. While you're reading
> > an offline article, you can also follow links and click to add them
> > to your
On 14-07-03 02:05 PM, grarpamp wrote:
> You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
> Alexander Volynkin / Michael McCord
if they have followed a responsible disclosure process, tor developers
should already be working on remedies...
--
tor-talk mailing list - to
The addon list is:
* Adblock Plus 2.6.3
* Adblock Plus Pop-up Addon 0.9.2
* DownThemAll! 2.0.17
* DownThemAll! AntiContainer 1.3
* Flash and Video Download 1.58
* GrabMyBooks 1.8
* HTTPS-Everywhere 3.5.3
* Internote 3.0.2
* Mozilla Archive Format 3.0.2
* NoScript 2.6.8.31
* Self-Destructing Cookie
Another example is this s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com OR
ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to
markmonitor.com
On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas wrote:
> I'm not referring to this.I'm talking of a lot of UR
Seth David Schoen:
> Can you right-click on the image and Inspect Element? If so, does it
> reference
>
> style="background-image:
> url(//upload.wikimedia.org/wikipedia/en/b/bc/Wiki.png);"
http://s4.postimg.org/u8lb1dv7x/Screenshot_from_2014_07_03_23_15_59_1.png
The source does not point to o
I'm not referring to this.I'm talking of a lot of URI that appears when I
try to link to any site. Every one of those Remote Address start with a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net .
On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen wrot
Michael O Holstein:
>> I got worried yesterday when instead of the Wikipedia logo on the
>> top-left corner there was the picture of a nazi (army) guy with a
>
> Is this reproducible?
In this instance of TBB, yes. But I haven't tried on a second computer.
> To successfully (without error) inser
Spam 06 writes:
> I admit I have installed more extensions to TBB. Only FSF approved
> licenses, mind you ;-) I have no flash, no java, only the add-ons.
>
> When I browse Wikipedia some of the images are messed up. Meaning there
> is another image, most of the time a detail from a larger picture
On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen wrote:
> ...
> Does anyone have theories about this part right at the bottom? ..
>/**
> * Placeholder fingerprint for Tor hidden service addresses.
> * Real fingerpritns will be fired by the plugins
> * 'anonymizer/tor/plugin/oni
>I got worried yesterday when instead of the Wikipedia logo on the
>top-left corner there was the picture of a nazi (army) guy with a
Is this reproducible?
To successfully (without error) insert into an HTTPS connection you must be
trusted by the client .. would need list of CAcerts from firefo
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
--
Christopher Booth
From: grarpamp
To: tor-talk@lists.torproject.org
Cc: cypherpu...@cpunks.org
Sent: Thursday, July 3, 2014 2:05 PM
Su
I admit I have installed more extensions to TBB. Only FSF approved
licenses, mind you ;-) I have no flash, no java, only the add-ons.
When I browse Wikipedia some of the images are messed up. Meaning there
is another image, most of the time a detail from a larger picture in
place. You can see the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/02/2014 04:18 PM, Helder Ribeiro wrote:
> Apps like Pocket (http://getpocket.com/) work as a "read it later"
> queue, downloading things for offline reading. While you're reading
> an offline article, you can also follow links and click to ad
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
On Thu, Jul 3, 2014 at 2:05 PM, grarpamp wrote:
> You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
> Alexander Volynkin / Michael McCord
>
> [...]
> L
I agree that collecting stories about "why/how I use Tor" is useful, but I
disagree that any special education or warning should be needed before setting
up an exit node. Setting up an exit node is simply providing another IP that
can be used for traffic and nothing else. It is useful to provide
On Thu, 7/3/14, Tempest wrote:
Subject: Re: [tor-talk] Benefits of Running TBB in a VM?
To: tor-talk@lists.torproject.org
Date: Thursday, July 3, 2014, 5:48 AM
Bobby Brewster:
>
What are the benefits of running TBB in a VM?
>
> AIUI, there
++ 03/07/14 16:11 + - Jacob Appelbaum:
>Here is some of the source code:
>
> http://daserste.ndr.de/panorama/xkeyscorerules100.txt
Can you tell us something about the source of this code? The articles of
the ARD do not mention any source at all, while other outlets mentioned
Snowden wheneve
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
Alexander Volynkin / Michael McCord
[...]
Looking for the IP address of a Tor user? Not a problem. Trying to
uncover the location of a Hidden Service? Done. We know because we
tested it, in the wild...
In this talk, we dem
Jacob Appelbaum writes:
> On 7/3/14, Eugen Leitl wrote:
> >
> > http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
> >
>
> Here is our larger story (in English) which includes excerpts of source code:
>
On Jul 3, 2014 9:57 AM, "Jacob Appelbaum" wrote:
>
> On 7/3/14, coderman wrote:
> > On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote:
> >> ...
> >> i presume you mean as below:
> >> (more a translation than additional QUELLCODE info though ;)
> >
>
> Here is some of the source code:
>
> http:/
On 7/3/2014 10:34 AM, Zenaan Harkness wrote:
Agreed, great news.
In hindsight, it is clear that we as a community have an interest to
build a resource of amicus curiae briefs - friend of the court briefs.
So PLEASE make moves in the direction of contributing and collecting
documents which may b
On Thu, 3 Jul 2014 16:11:39 +
Jacob Appelbaum allegedly wrote:
> On 7/3/14, coderman wrote:
> > On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote:
> >> ...
> >> i presume you mean as below:
> >> (more a translation than additional QUELLCODE info though ;)
> >
>
> Here is some of the source
On Thu, Jul 3, 2014 at 9:11 AM, Jacob Appelbaum wrote:
> ...
> Here is some of the source code:...
merci beaucoup :)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 7/3/14, coderman wrote:
> On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote:
>> ...
>> i presume you mean as below:
>> (more a translation than additional QUELLCODE info though ;)
>
Here is some of the source code:
http://daserste.ndr.de/panorama/xkeyscorerules100.txt
Happy hacking,
Jacob
On Thu, Jul 3, 2014 at 8:36 AM, coderman wrote:
> ...
> i presume you mean as below:
> (more a translation than additional QUELLCODE info though ;)
detailed technical info via J. Appelbaum, A. Gibson, J. Goetz, V.
Kabisch, L. Kampf, L. Ryge
---
http://daserste.ndr.de/panorama/aktuell/NSA-tar
(Thread start:
https://lists.torproject.org/pipermail/tor-talk/2014-July/033573.html
)
On 7/3/14, Anders Andersson wrote:
> On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl wrote:
>> On 07/02/2014 11:00 PM, Anders Andersson wrote:
>>> Unfortunately he doesn't seem to want to take this further, so th
On 7/3/14, Eugen Leitl wrote:
>
> http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
>
Here is our larger story (in English) which includes excerpts of source code:
http://daserste.ndr.de/panorama/aktu
On Thu, Jul 3, 2014 at 8:13 AM, -John wrote:
> I thought JY at cryptome.org was already doing what you suggest.
i presume you mean as below:
(more a translation than additional QUELLCODE info though ;)
---
http://cryptome.org/2014/07/nsa-tor-de.htm
Donate for the Cryptome archive of files
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 7/3/2014 4:16 PM, Anders Andersson wrote:
> On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl
> wrote:
>> On 07/02/2014 11:00 PM, Anders Andersson wrote:
>>> Unfortunately he doesn't seem to want to take this further, so
>>> the ruling will stand. It's
* Elrippo schrieb am 2014-07-03 um 16:22 Uhr:
> On which station can we watch the story on German TV today?
Will be broadcasted on ARD at 21:45 (9:45 pm, 20:45 UTC).
http://daserste.ndr.de/panorama/archiv/2014/Quellcode-entschluesselt-Beweis-fuer-NSA-Spionage-in-Deutschland,nsa224.html>
--
Jens
BlueStar88:
> On Wed, 02 Jul 2014 09:15:47 +
> Patrick Schleizer wrote:
>
>> BlueStar88:
>>>
>>> 37lnq2veifl4kar7.onion:6697 is up and running fine.
>>
>> Who runs that server? Inoffical one?
>>
>> I was more looking for a scalable, robust solution rather than
>> individual quick fix.
>
> He
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On which station can we watch the story on German TV today?
On 03. Juli 2014 14:01:15 MESZ, Jacob Appelbaum wrote:
>Hi,
>
>On 7/3/14, coderman wrote:
>> request for more (english speaking) details on QUELLCODE part of
>> XKeyScore(XKS)
>>
>>
>http
> On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl
> wrote:
> > On 07/02/2014 11:00 PM, Anders Andersson wrote:
> >> Unfortunately he doesn't seem to want to take this further, so the
> >> ruling will stand. It's his choice, but it could be a very bad
> >> deterrent to other potential exit node opera
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl wrote:
> On 07/02/2014 11:00 PM, Anders Andersson wrote:
>> Unfortunately he doesn't seem to want to take this further, so the
>> ruling will stand. It's his choice, but it could be a very bad
>> deterrent to other potential exit node operators in Austr
Bobby Brewster:
> What are the benefits of running TBB in a VM?
>
> AIUI, there are two advantages.
>
> 1.If malware infects the VM, then just the VM is compromised. If your
> Windows/Mac/Linux system is infected, then your entire system is affected
> (yes, I realise that it should be only
++ 03/07/14 04:39 + - scarp:
>Most attacks about breaking out of a VM rely on you installing the
>guest tools, so never do that.
What are "guest tools" in this context?
--
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl
T @rejozenger | J r...@zenger.nl
OpenPGP
The same thing happened to Yahoo and AOL users in tor-relays:
https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
To summarize, your only practical remedy at this time is to use an email
address not on Yahoo or AOL.
On 14-07-01 04:41 PM, Bobby Brewster wrote:
> What does this
On 14-07-02 10:59 PM, Seth David Schoen wrote:
> ideas buenas writes:
>
>> Why is markmonitor.com and its derivates in my TBB? How can I do to delete
>> this ? Are they watching me?
>
> Hi,
>
> Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
> Enable/Disable Rules men
Hi,
On 7/3/14, coderman wrote:
> request for more (english speaking) details on QUELLCODE part of
> XKeyScore(XKS)
>
> http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html
>
> specifically subsequent tasking associated with selected anonyms.
request for more (english speaking) details on QUELLCODE part of XKeyScore(XKS)
http://www.bild.de/politik/ausland/nsa/us-geheimdienst-spionierte-deutschen-studenten-aus-36657402.bild.html
specifically subsequent tasking associated with selected anonyms...
--
tor-talk mailing list - tor-talk@lis
On Thursday 03 July 2014 11:06:15 Bron Taylor wrote:
> p accept 25,110,119,143,443,465,995
> "252.94.2.188.25.27.196.125.74.ip-port.exitlist.torproject.org. 1799 IN
> A 127.0.0.2" from Google Public DNS. Moreover, the answer from TorDNSEL
> told that the node with the ip address "188.2.94.252" is
http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
All accesses (several 100 k/day) to Tor directory authorities (at least some
IPs
hardcoded, Sebastian Hahn one of the targets) intercepted and logged, T
Hi there,
I used the TorDNSEL to verify an ip address of an exit node whether
I can sent some kind of traffic through that node and found
something is weired. First the information of the node can be found
in the cached consensus file on my system with running a tor client.
The
Hi there,
I used the TorDNSEL to verify an ip address of an exit node whether
I can sent some kind of traffic through that node and found
something is weired. First the information of the node can be found
in the cached consensus file on my system with running a tor client.
The
MacLemon:
> German language Austrian Legalese background:
> Austrian E-Commerce Law §15: Ausschluss der Verantwortlichkeit bei
> Zwischenspeicherungen http://j.mp/1iYdg4L
>
> § 15. Ein Diensteanbieter, der von einem Nutzer eingegebene
> Informationen in einem Kommunikationsnetz übermittelt, ist fü
Maybe one day, something like Peersm combined with [1] in order to
follow/or use [2] and [3] (don't focus on google developing this here,
these concepts are the only way to really secure a web page)
Basically you fetch the web page with something like Peersm, then
retarget it in a sandboxed co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/03/2014 05:12 PM, grarpamp wrote:
>> High-latency web browsing is actually a great use case and could
>> benefit from the extra security.
>>
>> Apps like Pocket (http://getpocket.com/) work as a "read it
>> later" queue, downloading things
When Edith Windsor approached Roberta Kaplan to take her case after she had
been forced to pay $363,053 in estate taxes only because she had been married
to a woman, instead of a man, she offered to pay for the defense, and Roberta
immediately agreed to take the case and immediately said, no we
60 matches
Mail list logo