-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
anyone down with a debian-netinstall iso that uses tor in the pre-seed
and allows for selection of onions for mirrors? may seem like theater
or unnecessary for some. but, ability to download the installer iso
with tor browser bundle and go from there
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jonathan Wilkes:
> And here we have a respondent who does a complete 180 on the
> constraints. Claiming that "mum" just needs to "invest the time" is
> to do exactly the opposite of what Haroon was implying. Now it's
> not the software that should c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jon Tullett:
> It is, you know. More complex, and probably not suitable.
>
> Haroon Meer, who I greatly respect in the security space, describes
> UX complexity in terms of his mum. As in, "could my mum do this?"
> and if the answer is no, it's too
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Mansour Moufid:
> The audience of the Tor project, ever since it's provided a
> convenient browser rather than just source code, is the average
> user, not the technical community. So when the Tor project website
> promises "anonymity," they are not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Zenaan Harkness:
>> thomas.hluch...@netcologne.de:
>>> You have. You might consider that intelligent services have
>>> large amounts of resources. If this is a planned attack from a
>>> group of interested people, they are able to do so.
>>
>> so th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
thomas.hluch...@netcologne.de:
> You have. You might consider that intelligent services have large
> amounts of resources. If this is a planned attack from a group of
> interested people, they are able to do so.
so they are all government agents/ass
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
ja.talk:
> In a white male-dominated technology industry, stories of sexism,
> racism, and harassment are commonplace. Although companies and
> conferences are making efforts to improve representation and fix a
> culture where harassment is accep
i noticed a number of accounts were suspended due to using tor recently.
any news on the status of accounts locked out in the last round of
twitter's tor censorship? i'm coming up on 96 hours since twitter has
acknowledged in email that there was an "automated behavior" problem
which resulted in t
Mirimir:
>
> Have they required mobile text authentication, ID, etc?
in the handful of random attempts i've done to register a facebook
account through the onion, yes, it has always asked me for a mobile
number. while there are ways to work around this, it is not particularly
friendly for common
Jonathan Wilkes:
> Anyone know how Snowden posts to Twitter? Does he use Tor?
> If someone could convince him and/or other celebrities to complain that
> Twitter is denying them location anonymity, then that might make a difference.
> There's some leverage here, too, because, "even Facebook let's
k...@jondos.de:
> You have to compile Pidgin by self without "libjingle", because the
> Interactive Connectivity Establishment (ICE) of "libjingle" will breakout
> the proxy in case of a audio or video call.
>
> A small tutorial to compile a Tor-save Pidgin for Linux (only in German):
> https://
ma...@wk3.org:
> Maybe this is a good opportunity to invite people to Diaspora again.
> It's still not perfect, but it's running for something like 5 years now
> without major glitches and is only getting better.
>
> It is tor-friendly (some admins even run relays and exits) and not
> censorable i
XiaoLan (小蓝):
> Twitter uses IP address as a factor to detect "abnormal activities" just
> like Google sometimes gives us some CAPTCHA...maybe we need more exit nodes
i believe that is the issue, which is why i find their recent public
comments over the past 7 days about how "twitter is not target
XiaoLan (小蓝):
> use virtual phone number to verify...
> 1. register a free trial virtual phone number and forward to SIP
> 2. use this phone number to register Google Voice
> 3. use google voice number to active Twitter account...
the problem with such a solution is that it will be overly complex
isis:
> Tempest transcribed 2.4K bytes:
>> twitter's security configuration seems to be at war with tor. had to do
>> multiple resets over past 24 hours, only to see a perpetual "lock" in
>> place recently. i filed a support ticket. here's twitter's r
i just want to share the news that all of the hard work that has gone
into the library freedom project paid off today at kilton library.
despite pressure from the us federal government, which pulled out every
card to sell fear that they had in their hat, the local community
refused to accept it and
Marcin Cieslak:
> I don't have a phone number behind my Twitter account and it just
> asks me to confirm my email address.
>
> Not perfect, but way better.
i've never once given twitter a phone number. when it asked me for a
phone number to unlock an account, this was a new measure i hadn't
exper
Mike Perry:
> If you have Bitcoin, you can buy some SMS numbers for getting out of
> this lockout without giving up your real phone number:
> http://receivesmsonline.com/buynumbers
there's a number of tricks one can use to get around an sms/voice
requirement. i'm not particularly concerned for mys
twitter's security configuration seems to be at war with tor. had to do
multiple resets over past 24 hours, only to see a perpetual "lock" in
place recently. i filed a support ticket. here's twitter's response.
"Your account appears to have exhibited automated behavior that violates
the Twitter Ru
Cari Machet:
> as i have stated i dont trust tor because monolithic and we need more
> solutions than shit developed by the state but it could be a beautiful
> lawsuit against the federal gov - those are needed for sure everywhere
> anywhere - state sovereignty needs more legal enactment
> On Sep 1
oshwm:
> doesn't someone have to mention hitler soon or is it too early for that? :D
>
haha! i think this sums it up almost as well.
https://www.youtube.com/watch?v=JG5zytkypOE ;-)
--
gpg key - 0x2A49578A7291BB34
fingerprint - 63C4 E106 AC6A 5F2F DDB2 3840 2A49 578A 7291 BB34
--
tor-talk mail
benjamin barber:
> You're right, I'm just a pandobot, trying to gather clickbait. Tor looks
> completely safe, just listen to uncle Ed Snow.
why resort to a strawman argument?
--
gpg key - 0x2A49578A7291BB34
fingerprint - 63C4 E106 AC6A 5F2F DDB2 3840 2A49 578A 7291 BB34
--
tor-talk mailing li
l.m:
> Wow. You just blew my mind. So anonymity and privacy for users, but
> not contributors that make said privacy features possible?
if you're going to complain about others changing the subject, don't
blatantly do it yourself. relays have their public ip addresses
available to the public. that
aka:
> The common user does not apply to all threat models. If you are a high
> volume recreational drug salesman, you must expect 0days and snitches.
if you're a drug salesman, you're a different type of criminal that has
high value to multiple law enforcement agencies. personally, i don't
care a
Mirimir:
> Nothing implemented at useful scale provides better anonymity than Tor.
> I2P and JonDonym are interesting, but (other issues aside) are too
> small. I believe that combining Tor with other systems, using nested
> chains and remote workspaces, is the best approach available.
agreed. als
i made significant typos in the last subject like. so, this is a
resend for clarification purposes. i've been trying to find a greater
detailed log on this but, so far, have been unsuccessful. are there
any configuration differences for Firefox ESR 31.4.0 between
torbrowser bundle 4.0.3 and 4.5a3?
i've been trying to find a greater detailed log on this but, so far,
have been unsuccessful. are there any configuration differences for
Firefox ESR 31.4.0 between torbrowser bundle 4.0.3 and 4.5a3?
--
gpg key - 0x2A49578A7291BB34
fingerprint - 63C4 E106 AC6A 5F2F DDB2 3840 2A49 578A 7291 BB34
-
Mirimir:
> Also, some of the abusers have reportedly emphasized PinkMeth's supposed
> invulnerability as a Tor hidden service, and also their own supposed
> invulnerability as Tor users.
and the abusers reasons for defending pinkmeth displays a particular
interest, which leaves them incredibly vul
Kristy Chambers:
> Have I written, that there is anything creepy about that?
> The basic question is, in how the tor project can be trusted if we look
> on suspicious activities of tor developers (e.g. choosing worse design
> decisions).
the fundamental logical fallacy that one has to accept in or
Bobby Brewster:
>
> Currently, my Tor use model is as follows:
>
> Me (TBB in Ubuntu) ---> VPN ---> Tor (entry node) ---> Tor network
>
> I could, instead, do:
>
> Me (TBB Ubuntu VM) ---> VPN (configured in VM) ---> Tor (entry node) ---> Tor
> network
>
> However, from what I've read, there i
Bobby Brewster:
> What are the benefits of running TBB in a VM?
>
> AIUI, there are two advantages.
>
> 1.If malware infects the VM, then just the VM is compromised. If your
> Windows/Mac/Linux system is infected, then your entire system is affected
> (yes, I realise that it should be only
Bobby Brewster:
> OK.
>
> Let me ask in a different way.
>
> What do people who use .onion addresses use to communicate?
bitmessage.ch, which runs the bitmail onion you listed, has been usable
for me. however, the accessibility of the onion has not been consistent
and, at one point, the project
version 0.6.2 of the "Beginner Friendly Comprehensive Guide to
Installing and Using a Safer Anonymous Operating System" is now online.
the guide covers the following:
- installing debian on a luks encrypted usb drive, or on a luks
encrypted hd partition to be unlocked with a usb boot key.
- inst
Bobby Brewster:
> Three points about this story.
>
> First, if the student had used a VPN then the network would only have seen
> his VPN IP not the entry node IP. Right?
right.
> Second, who is to say that the 'real' perp was not using a different
> non-University network?
the perp confes
Alexander Dietrich:
> If this is just about transforming the URL, couldn't you use an HTTPS
> Everywhere rule? Then you wouldn't have to install ( and audit :) )
> Greasemonkey.
the "embed" url tweak is a very quick and dirty work around. you lose a
number of other youtube features with it, such a
Nunostc:
> Hi all,
>
> I am learning Tor an trying to use it more every day. One problem that
> I have is that when I browse for videos in Youtube using Tails or Tor
> Browser Boundle I can not view all the videos. HTML5 does not fully
> supported for Tor Browser.
>
> A thing I normally do when b
t...@bitmessage.ch:
> I appreciate your perspective but still think the community may still be
> better off--including those who take the time to RTFM--by taking a harm
> reduction approach to the RTFM-related problems you've mentioned.
the fundamental problem here is that this is not a technologi
t...@bitmessage.ch:
>
> In the spirit of Jake's 29c3 talk, I think we can decide as a community
> not to brush off high-profile attacks against people using Tor with
> arguments like "oh, it was an old Firefox vulnerability and some users
> weren't running the latest available code" or "oh, obvious
DeveloperChris:
> I haven't been following this conversation so please excuse me if I am
> covering old stuff here, but this situation is something I have been
> very concerned about since the silk road was busted. I found the excuses
> given as to how the silk road was busted as far far too flimsy
hi, conrad. awhile ago, you'd mentioned you were working on a hidden
service e-mail system. i was wondering if you had made any progress on it.
-
VFEmail.net - http://www.vfemail.net
$24.95 ONETIME Lifetime accounts with Privacy Features!
15GB dis
Marcos Eugenio Kehl:
> Hello folk!
> 1. Wich version of Linux do you recomend to use with Tor in a virtual
> machine? Ubuntu? Linux Mint? Other? Why?
i prefer debian as the base linux os and whonix for the virtual
machines. it's a good set up. there is a now somewhat dated tutorial
here on instal
Michael Wolf:
>
> I only commented that I don't click on the "tinyurl"s, since I have
> no idea where they're going.
use longurl.org or someting similar to see where they go. It will
expand shortened links for you and give you the end result without
requiring javascript or complaining about tor.
Juan Garofalo:
> So that the company can be blacklisted as clowns who cooperate with
> the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you? outting vpns for being
put into the situation of either complying with the law or facing
cr
43 matches
Mail list logo