Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread Dave Warren
On 2015-02-03 21:28, Andrew Roffey wrote: Except for the few big names, most domain providers do not provide inexpensive certificates so the point is not invalid (yet). I don't think changing domain providers to bundle the cost is a reasonable solution to the high costs of certificates. HTTPS c

Re: [tor-talk] REAL-ID Internet Access Coming Soon

2015-02-04 Thread Joe Btfsplk
On Wed, Feb 4, 2015 at 7:07 PM, grarpamp wrote: http://www.pcmag.com/article2/0,2817,2476275,00.asp ...you will very soon be kissing any rights to freedom and self managed privacy you now enjoy on the internet goodbye forever. I'm not, but some would say that LEAs & gov'ts figuring out how to

Re: [tor-talk] REAL-ID Internet Access Coming Soon

2015-02-04 Thread hellekin
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 02/05/2015 12:15 AM, Max Bond wrote: > What are you proposing we do? > *** You can help push the P2PNames Internet Draft through IETF to ensure that there's at least a standard technical support for censorship-resistant alternatives to global nam

Re: [tor-talk] REAL-ID Internet Access Coming Soon

2015-02-04 Thread Max Bond
What are you proposing we do? On Wed, Feb 4, 2015 at 7:07 PM, grarpamp wrote: > http://www.pcmag.com/article2/0,2817,2476275,00.asp > > > Do not underestimate the precedence of the Chinese, > Facebook and the rumblings in the UK/US/etc. Code all > you want, but unless you start acting now in rea

[tor-talk] REAL-ID Internet Access Coming Soon

2015-02-04 Thread grarpamp
http://www.pcmag.com/article2/0,2817,2476275,00.asp Do not underestimate the precedence of the Chinese, Facebook and the rumblings in the UK/US/etc. Code all you want, but unless you start acting now in realworld politics to prevent this type of stuff (ID/names, anti-crypto, etc), you will very s

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 02/03/2015 06:25 PM, Seth David Schoen wrote: > The Tor Project itself has found that users often don't verify GPG > signatures on binaries (I think Mike Perry quoted some statistics > about This might provide some insight: http://arstechnica

Re: [tor-talk] corridor, a Tor traffic whitelisting gateway

2015-02-04 Thread Patrick Schleizer
AntiTree: > It appears the repo has moved or been deleted? https://github.com/rustybird/ > corridor > > Is this on purpose while addressing the issue that Gavin brings up? I don't think so. Looks like rustybird [Or someone else? Unlikely?] deleted the whole account. See https://github.com/rustybi

Re: [tor-talk] corridor, a Tor traffic whitelisting gateway

2015-02-04 Thread AntiTree
It appears the repo has moved or been deleted? https://github.com/rustybird/ corridor Is this on purpose while addressing the issue that Gavin brings up? On Wed Feb 04 2015 at 5:54:43 PM Gavin Wahl wrote: > > https://github.com/rustybird/corridor/#pitfalls > > > corridor cannot prevent malware

Re: [tor-talk] corridor, a Tor traffic whitelisting gateway

2015-02-04 Thread Gavin Wahl
> https://github.com/rustybird/corridor/#pitfalls > > corridor cannot prevent malware on a client computer from directly > > contacting a colluding relay to find out your clearnet IP address. I don't think this disclaimer is strong enough. With the 'getinfo address' command, malware doesn't even n

[tor-talk] Orbot+VPN alpha preview

2015-02-04 Thread Nathan Freitas
We have a new alpha build of Orbot that uses the Android VPN API to route all Android device traffic over Tor without root. This is obviously focused on circumvention and not anonymity, allowing people to use apps over Tor that are blocked in specific countries or contexts. We are also considering

Re: [tor-talk] Facebook Onion Site: Impending Works

2015-02-04 Thread Nathan Freitas
On Wed, Feb 4, 2015, at 06:23 AM, Alec Muffett wrote: > Specifically, we will be testing some experimental code to support both > “www-” and “m-site” onion addresses, which will bring to Tor the “mobile” > Facebook website as described in the original announcement: Just tried this today from Andro

[tor-talk] How to protect apache local-restricted from secret service access?

2015-02-04 Thread contact_tor
Hi When you have a website that is available from a tor secret service, how do you forbid access to url restricted to ip=localhost? I'm thinking of apache default http://x.onion/server-status for example. Using "a2dismod status" is the obvious solution for that one, but does anyone had a mor

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread Seth
On Tue, 03 Feb 2015 21:28:42 -0800, Andrew Roffey wrote: I don't suppose one could purchase a dummy domain with Namecheap and then ask them to sign a certificate for the real domain (with another provider)? I suspect not, but please correct me if I'm wrong. That's a damn fine questionp. My gu

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread Aymeric Vitte
Just for the story about startssl, unlike Confidant Mail which should use https, I think, despite of the fact that they don't trust it, like all of us, it's still better than nothing, I have explained several time here why we could not use https to retrieve the Peersm code. There was an artifi

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread CJ
On 04/02/15 13:19, Paul Syverson wrote: > On Wed, Feb 04, 2015 at 06:58:28AM +0100, CJ wrote: >> >> >> On 02/04/2015 06:19 AM, Seth wrote: >>> On Tue, 03 Feb 2015 20:01:36 -0800, Andrew Roffey >>> wrote: - there is a cost of obtaining HTTPS signatures. >>> >>> Not certain if the deal is st

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread Paul Syverson
On Wed, Feb 04, 2015 at 06:58:28AM +0100, CJ wrote: > > > On 02/04/2015 06:19 AM, Seth wrote: > > On Tue, 03 Feb 2015 20:01:36 -0800, Andrew Roffey > > wrote: > >> - there is a cost of obtaining HTTPS signatures. > > > > Not certain if the deal is still being offered, but for quite a while > >

[tor-talk] Tor Weekly News — February 4th, 2015

2015-02-04 Thread Harmony
Tor Weekly News February 4th, 2015 Welcome to the fifth issue in 2015 of Tor Weekly News, the weekly newsletter th

[tor-talk] Facebook Onion Site: Impending Works

2015-02-04 Thread Alec Muffett
Hi All, Apologies for mailshotting the list but it seems the most effective way to share this information. We’ve been busy here in Facebook's Security Infrastructure team, and my colleague Michal Nanasi has been building additions to the Facebook Onion Site. We intend to test some of the addit