On 15 July 2016 at 05:36, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/14/2016 01:34 PM, Jon Tullett wrote:
>> If a law enforcement agency cracked Tor, it would be a very
>> significant development indeed. The same agency using browser
>> exploits doesn't move the se
On 15 July 2016 at 01:23, Joe Btfsplk wrote:
> On 7/14/2016 2:34 PM, Jon Tullett wrote:
>>>
>>> 2. Aren't statements (from anyone) like, "... generally crack the
>>> servers
>>> hosting the illicit material, not Tor itself," sort of a matter of
>>> semantics?
>>
>> Depends on the context, I guess
On 15 July 2016 at 00:07, krishna e bera wrote:
>> Should add that users with NoScript enabled would not have been
>> vulnerable - I get the "noscript decreases privacy" argument, but I'd
>> still kinda like it to be on by default to protect users. Maybe with a
>> big red "Turn on Javascript becau
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/14/2016 01:34 PM, Jon Tullett wrote:
> On 14 July 2016 at 21:17, Joe Btfsplk wrote:
>> On 7/14/2016 1:23 AM, Jon Tullett wrote:
>> 2. Aren't statements (from anyone) like, "... generally crack
>> the servers hosting the illicit material, not
Law enforcement agencies exaggerate and lie publicly in order to mislead
people, such as unidentified suspects or to weed out claimants to notorious
crimes who didn't really do it (there are quite a few), but the recent news
report appeared, as I recall, to be based on a court or other official
On 7/14/2016 2:34 PM, Jon Tullett wrote:
2. Aren't statements (from anyone) like, "... generally crack the servers
hosting the illicit material, not Tor itself," sort of a matter of
semantics?
Depends on the context, I guess. To the user, maybe, but in the
context of this (Tor) community, the d
> Should add that users with NoScript enabled would not have been
> vulnerable - I get the "noscript decreases privacy" argument, but I'd
> still kinda like it to be on by default to protect users. Maybe with a
> big red "Turn on Javascript because I'm happy to get pwned by
> malicious ads, FBI mal
That is really awesome! :-) Thanks for the update.
On Thu, Jul 14, 2016 at 5:42 PM, Kate Krauss < k...@torproject.org
[k...@torproject.org] > wrote:
I don't say much on Tor-Talk, but I will say this:
Thanks, Medium, for removing all those CloudFlare captchas for Tor
users. As an activist from
I don't say much on Tor-Talk, but I will say this:
Thanks, Medium, for removing all those CloudFlare captchas for Tor
users. As an activist from East Africa once reminded me, the Internet
means *all* of the Internet. Otherwise it isn't quite itself--it is
meant to be accessible and comprehensive;
On 14 July 2016 at 21:17, Joe Btfsplk wrote:
> On 7/14/2016 1:23 AM, Jon Tullett wrote:
>>
>>
>> I think what you'll find in such cases is that the FBI generally crack
>> the servers hosting the illicit material, not Tor itself.
>>
> 1. Wasn't this discussed back when it occurred? As to how they
On 7/14/2016 1:23 AM, Jon Tullett wrote:
I think what you'll find in such cases is that the FBI generally crack
the servers hosting the illicit material, not Tor itself.
1. Wasn't this discussed back when it occurred? As to how they did (or
likely did) identify the Tor / Tor Browser users fo
I guess this belongs here: http://lwn.net/Articles/694406/
Congrats, this finally seems an healthy passage and at a quick glance
the names on the board are reassuring for the integrity of the
project.
ciao
--
~.,_ Denis Roio aka Jaromilhttp://Dyne.org think &do tank
"+. CTO and
Hi Neel, nice work! One quick note...
"TorNova has logfile and circuit viewing. OnionLauncher would require
third party programs (like arm to get this functionality)."
For what it's worth that is not true. I wrote Stem to be the new
backend of Nyx (aka arm). Just about anything arm can do Stem pr
On 14 July 2016 at 12:52, wrote:
> On 14.07.16 09:23, Jon Tullett wrote:
>>
>> On 14 July 2016 at 01:51, Nick Levinson wrote:
>>>
>>> The FBI reportedly cracked Tor's security to crack a child porn case with
>>> over 100 arrests of Tor users.
>>
>> I think what you'll find in such cases is that
On 14.07.16 09:23, Jon Tullett wrote:
On 14 July 2016 at 01:51, Nick Levinson wrote:
The FBI reportedly cracked Tor's security to crack a child porn case with over
100 arrests of Tor users.
I think what you'll find in such cases is that the FBI generally crack
the servers hosting the illicit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/14/2016 01:38 AM, Jon Tullett wrote:
> On 14 July 2016 at 08:37, Mirimir wrote:
>
>> On 07/14/2016 12:23 AM, Jon Tullett wrote:
>
>>> Having pwned the server, a malware component is then injected
>>> to visiting computers. Ie: when the crimina
On 14 July 2016 at 08:37, Mirimir wrote:
> On 07/14/2016 12:23 AM, Jon Tullett wrote:
>> Having pwned the server, a malware component is then injected to
>> visiting computers. Ie: when the criminal visits the infected
>> site, his PC is infected (over that encrypted, secure, etc)
>> connection.
17 matches
Mail list logo