Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 15 July 2016 at 05:36, Mirimir wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > On 07/14/2016 01:34 PM, Jon Tullett wrote: >> If a law enforcement agency cracked Tor, it would be a very >> significant development indeed. The same agency using browser >> exploits doesn't move the se

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 15 July 2016 at 01:23, Joe Btfsplk wrote: > On 7/14/2016 2:34 PM, Jon Tullett wrote: >>> >>> 2. Aren't statements (from anyone) like, "... generally crack the >>> servers >>> hosting the illicit material, not Tor itself," sort of a matter of >>> semantics? >> >> Depends on the context, I guess

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 15 July 2016 at 00:07, krishna e bera wrote: >> Should add that users with NoScript enabled would not have been >> vulnerable - I get the "noscript decreases privacy" argument, but I'd >> still kinda like it to be on by default to protect users. Maybe with a >> big red "Turn on Javascript becau

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Mirimir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/14/2016 01:34 PM, Jon Tullett wrote: > On 14 July 2016 at 21:17, Joe Btfsplk wrote: >> On 7/14/2016 1:23 AM, Jon Tullett wrote: >> 2. Aren't statements (from anyone) like, "... generally crack >> the servers hosting the illicit material, not

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Nick Levinson
Law enforcement agencies exaggerate and lie publicly in order to mislead people, such as unidentified suspects or to weed out claimants to notorious crimes who didn't really do it (there are quite a few), but the recent news report appeared, as I recall, to be based on a court or other official

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Joe Btfsplk
On 7/14/2016 2:34 PM, Jon Tullett wrote: 2. Aren't statements (from anyone) like, "... generally crack the servers hosting the illicit material, not Tor itself," sort of a matter of semantics? Depends on the context, I guess. To the user, maybe, but in the context of this (Tor) community, the d

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread krishna e bera
> Should add that users with NoScript enabled would not have been > vulnerable - I get the "noscript decreases privacy" argument, but I'd > still kinda like it to be on by default to protect users. Maybe with a > big red "Turn on Javascript because I'm happy to get pwned by > malicious ads, FBI mal

Re: [tor-talk] Medium removed the captchas for Tor users!

2016-07-14 Thread Griffin Boyce
That is really awesome! :-) Thanks for the update. On Thu, Jul 14, 2016 at 5:42 PM, Kate Krauss < k...@torproject.org [k...@torproject.org] > wrote: I don't say much on Tor-Talk, but I will say this: Thanks, Medium, for removing all those CloudFlare captchas for Tor users. As an activist from

[tor-talk] Medium removed the captchas for Tor users!

2016-07-14 Thread Kate Krauss
I don't say much on Tor-Talk, but I will say this: Thanks, Medium, for removing all those CloudFlare captchas for Tor users. As an activist from East Africa once reminded me, the Internet means *all* of the Internet. Otherwise it isn't quite itself--it is meant to be accessible and comprehensive;

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 14 July 2016 at 21:17, Joe Btfsplk wrote: > On 7/14/2016 1:23 AM, Jon Tullett wrote: >> >> >> I think what you'll find in such cases is that the FBI generally crack >> the servers hosting the illicit material, not Tor itself. >> > 1. Wasn't this discussed back when it occurred? As to how they

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Joe Btfsplk
On 7/14/2016 1:23 AM, Jon Tullett wrote: I think what you'll find in such cases is that the FBI generally crack the servers hosting the illicit material, not Tor itself. 1. Wasn't this discussed back when it occurred? As to how they did (or likely did) identify the Tor / Tor Browser users fo

[tor-talk] Tor Project Elects All-New Board of Directors

2016-07-14 Thread Jaromil
I guess this belongs here: http://lwn.net/Articles/694406/ Congrats, this finally seems an healthy passage and at a quick glance the names on the board are reassuring for the integrity of the project. ciao -- ~.,_ Denis Roio aka Jaromilhttp://Dyne.org think &do tank "+. CTO and

Re: [tor-talk] Announcing OnionLauncher: a Launcher for Tor

2016-07-14 Thread Damian Johnson
Hi Neel, nice work! One quick note... "TorNova has logfile and circuit viewing. OnionLauncher would require third party programs (like arm to get this functionality)." For what it's worth that is not true. I wrote Stem to be the new backend of Nyx (aka arm). Just about anything arm can do Stem pr

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 14 July 2016 at 12:52, wrote: > On 14.07.16 09:23, Jon Tullett wrote: >> >> On 14 July 2016 at 01:51, Nick Levinson wrote: >>> >>> The FBI reportedly cracked Tor's security to crack a child porn case with >>> over 100 arrests of Tor users. >> >> I think what you'll find in such cases is that

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread me
On 14.07.16 09:23, Jon Tullett wrote: On 14 July 2016 at 01:51, Nick Levinson wrote: The FBI reportedly cracked Tor's security to crack a child porn case with over 100 arrests of Tor users. I think what you'll find in such cases is that the FBI generally crack the servers hosting the illicit

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Mirimir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 07/14/2016 01:38 AM, Jon Tullett wrote: > On 14 July 2016 at 08:37, Mirimir wrote: > >> On 07/14/2016 12:23 AM, Jon Tullett wrote: > >>> Having pwned the server, a malware component is then injected >>> to visiting computers. Ie: when the crimina

Re: [tor-talk] FBI cracked Tor security

2016-07-14 Thread Jon Tullett
On 14 July 2016 at 08:37, Mirimir wrote: > On 07/14/2016 12:23 AM, Jon Tullett wrote: >> Having pwned the server, a malware component is then injected to >> visiting computers. Ie: when the criminal visits the infected >> site, his PC is infected (over that encrypted, secure, etc) >> connection.