On 12/13/2014 11:15 PM, Zenaan Harkness wrote:
> On 12/14/14, andr...@fastmail.fm wrote:
>> On Sat, Dec 13, 2014, at 03:30 AM, kendrick eastes wrote:
>>> dont feed the troll. If you ignore them they go away faster.
>>
>> I was interested in hearing what he had to say. You folks may argue
>> agains
On 12/14/2014 09:28 PM, Paul Syverson wrote:
> On Sat, Dec 13, 2014 at 01:04:06PM -0700, Mirimir wrote:
> [snip]
>>
>> However, Tor is by design a Chaum-style network of untrusted nodes. As
>> long as one of the three nodes in a circuit is honest, users remain
>> anonymous. Even simultaneous attack
This is all mute:
(i) the communication has been affirmatively determined, in whole or in
part, to constitute foreign intelligence or counterintelligence or is
necessary to understand or assess foreign intelligence or
counterintelligence;
Item I probably is intended to cover FISA warrants. Which
On Sun, Dec 14, 2014 at 11:14:37PM -0500, Alden Page wrote:
> In the spirit of meeting the needs of the privacy community, I am
> interested in hearing what potential users might have to say about the
> design of such a tool. As of now, I envision this tool as a GUI
> desktop application that provi
On Sat, Dec 13, 2014 at 01:04:06PM -0700, Mirimir wrote:
[snip]
>
> However, Tor is by design a Chaum-style network of untrusted nodes. As
> long as one of the three nodes in a circuit is honest, users remain
> anonymous. Even simultaneous attacks by non-colluding adversaries can
> protect users'
It has been shown that it is possible to "fingerprint" a person using
their writing style (preference for certain words, spelling mistakes,
eccentricities in grammar, etc.) thereby using this fingerprint to
determine whether or not a person authored an anonymous document to a
high degree of statist
On Sun, Dec 14, 2014 at 4:22 PM, Jonathan Wilkes wrote:
> Does anyone here know about the Phantom Protocol:
> https://code.google.com/p/phantom/
>
> It looks like it's abandonware, although someone sent a message to the list
> that they had done some tests with virtual machines.
The HESSLA is pro
On 12/14/2014 10:39 AM, Tim Mitchell wrote:
> Morning all,
>
>
> If no one has yet seen Section 309 of US HR4681, it contains
> some very dubious language that sounds like it is legalizing
> indefinite government retention of encrypted communications.
> The text is as follows (Section 309.b.3.B.i
I believe Facebook and Blockchain both used Digicert to issue a .onion cert. If
I'm not mistaken Runa has worked with both teams?
Colin
On December 14, 2014 8:44:57 PM EST, Thomas White
wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>Christian Gagneraud:
>>> We will be seeking to o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Christian Gagneraud:
>> We will be seeking to obtain SSL certificates for both mirrors
>
> Which CA will you use? [just curious]
I've messaged Alec from Facebook who was the team leader for their
hidden service implementation. Hopefully I will get
Awesome, thanks for doing this!
Colin
Thomas White:
> I'm happy to announce that both my Globe and Atlas mirrors are now
> available as a hidden service for all those who prefer end-to-end
> encryption over Tor!
>
> Atlas: http://atlas777hhh7mcs7.onion
>
> Globe: http://globe223ezvh6bps.onion
>
On 15/12/14 14:14, Thomas White wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I'm happy to announce that both my Globe and Atlas mirrors are now
available as a hidden service for all those who prefer end-to-end
encryption over Tor!
\o/
[...]
We will be seeking to obtain SSL certifi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I'm happy to announce that both my Globe and Atlas mirrors are now
available as a hidden service for all those who prefer end-to-end
encryption over Tor!
Atlas: http://atlas777hhh7mcs7.onion
Globe: http://globe223ezvh6bps.onion
Unfortunately due t
Probably. I'm sure it implies any communications that pass through the United
States.
Colin
On December 14, 2014 4:27:13 PM EST, I wrote:
>Does that apply all over the world?
>
>
>> From: tim.mitche...@outlook.com
>> Sent: Sun, 14 Dec 2014 09:39:27 -0800
>> To: tor-talk@lists.torproject.org
>>
Does that apply all over the world?
> From: tim.mitche...@outlook.com
> Sent: Sun, 14 Dec 2014 09:39:27 -0800
> To: tor-talk@lists.torproject.org
> Subject: [tor-talk] HR4681 Sec 309 communication privacy legislation
>
> Morning all,
>
>
> If no one has yet seen Section 309 of US HR4681, it co
Hi Tor people,
Does anyone here know about the Phantom Protocol:
https://code.google.com/p/phantom/
It looks like it's abandonware, although someone sent a message to the
list that they had done some tests with virtual machines.
My main question is this: how does it bootstrap?
I'm asking here
Morning all,
If no one has yet seen Section 309 of US HR4681, it contains some very dubious
language that sounds like it is legalizing indefinite government retention of
encrypted communications. The text is as follows (Section 309.b.3.B.iii):
(B) Limitation on retention.--A covered communicat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I can see a lot of FUD spread around here regarding Roger and the NSA.
First of all, Tor is free, open-source and its usage is not enforced.
Feel free to use it if you trust it, if not that's ok with the rest of us.
Second, I can't understand how som
18 matches
Mail list logo