Ernie Allen from the International Centre for Missing and Exploited
Children was a real disappointment, insofar as his statements about
anonymity and government control were incredibly myopic.
If your plan to protect children is to initiate force against people of
all ages, you're going to hav
If I were going to perform a de-anonymization attack on Tor users en
masse, I would take advantage of the fact that TorBrowser and Tails
Linux* both load a page with client-side scripting enabled upon startup.
How secure is this single point of failure?
I'm also curious if it would be possible
By changing the browser fingerprint, do you mean altering the HTTP
request headers, such as the User-agent? You'd need to decrypt SSL/TLS
traffic in order to modify the headers of any request sent over SSL/TLS,
so that limits you to plaintext HTTP traffic.
You COULD alter HTTP request headers
Pay-to-route seems likely in the future for the capitalists amongst
participants in P2P routing networks. Bitcoin is as good a medium for
that to take place as any, but great care would need to be taken in
order not to ruin the anonymity achieved through using Tor. It would be
especially tricky
As far as I can tell, the main competitor to Tor, which is far behind
in network size, is I2P.
en.wikipedia.org/wiki/I2P
-Kristov
On 2013-10-22 11:58, Anonymous wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello!
How many ways are there to be anonymous without using Tor?
I think th
On 2013-10-20 13:19, Antispam 06 wrote:
That's so cute! Can you point out some time a spy agency was brought
in
front of a judge for not respecting the law. The same law written in
stone in some countries as «nobody is above the law». Do you know of a
time when they were found guilty and punish
Thanks, everyone, for the feedback. I decided to go with Tails, which
is a far better choice than Ubuntu.
Regards,
Kristov
On 2013-10-03 15:17, Luther Blissett wrote:
On Thu, 2013-10-03 at 11:45 -0600, aut...@anonymousbitcoinbook.com
wrote:
Hey all,
I'm writing a book about the use of Bitcoi
Hey all,
I'm writing a book about the use of Bitcoin and anonymity. A fair
portion of the book will be dedicated to teaching people how to most
safely use Tor to facilitate anonymity with Bitcoin. Are there any
special tips that people have for configuring Tor or using Tor when it
comes to Bi