[tor-talk] Coderman's taobios-v2.tar.bz2

2018-12-31 Thread Where is Coderman?
Saludad Tor-Talk! A while back Coderman posted: “[tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program here's some fun for you: https://peertech.org/files/taobios-v2.tar.bz2 $ sha256sum taobios-v2.ta

Re: [tor-talk] Traffic shaping attack

2016-03-20 Thread coderman
On 3/19/16, Oskar Wendel wrote: > ... > Let's assume that the service is extremely popular, with over 6 terabytes > of traffic each day, and a gigabit port almost constantly saturated. Then, > we can observe a small handset of guards and still be able to spot at > least some users. the problem wi

Re: [tor-talk] Traffic shaping attack

2016-03-18 Thread coderman
On 3/19/16, Oskar Wendel wrote: >... > Let's set up a service in a way that it will modulate the traffic, so the > download would look like: > [ some distinct signaling here...] yes; it's a traffic confirmation attack, and by interrupting the flow you confirm that the endpoints in question are in

Re: [tor-talk] FPGA Tor Relay

2016-02-25 Thread coderman
On 2/26/16, Roman Mamedov wrote: > ... > Maybe I'm missing something, how anything you do inside your server (run > Tor > on CPU, GPU, FPGA or magic fairies) will reduce your *bandwidth* costs? more machines to saturate a gig link. in theory, future Tor will handle 10GigE at speed on single host

Re: [tor-talk] Large spike in .onion addresses - port scan?

2016-02-21 Thread coderman
On 2/22/16, Green Dream wrote: >... > Interesting. Any idea what they're able to enumerate with the modified > version of Tor? they're able to enumerate the onions which land on their node(s) per O(1) mapping in HSDir participants. e.g. "get lucky" > Can the Tor network be hardened from this c

Re: [tor-talk] [guardian-dev] orplug, an Android firewall with per-app Tor circuit isolation

2016-02-13 Thread coderman
On 2/12/16, Rusty Bird wrote: > ... > In my layman's prejudices, the VPN approach's upsides are: no > superuser privileges needed, and standardization across ROMs. And the > downside (really unsure here): that some packets, from system > processes or early in the boot process, could escape the fil

Re: [tor-talk] Using SDR

2016-02-05 Thread coderman
On 2/5/16, Sean Lynch wrote: > ... Radio is being used right now to provide anonymity, but it's being used[1] > to hide endpoints similar to the duct-taped payphone trick depicted in > Hackers, in order to avoid attacks like the one used to capture Ross > Ulbricht without giving him a chance to wi

Re: [tor-talk] Using SDR

2016-02-04 Thread coderman
On 2/3/16, Jeremy Rennicks wrote: > Would it be worthwhile or feasible to route Tor traffic through SDR.. For > example if I were a node on Tor and data came to my system would routing it > through my SDR to another system then back over the ISP backbone add > anonymity or be of any use? where i

Re: [tor-talk] Scripted installer of Tor and more being worked on at GitHub, ya may want to sit down for this...

2016-02-01 Thread coderman
On 2/1/16, Michael wrote: > ... > My last question (for now) has to do with Fail2Ban and hidden services. > > My question is would you all prefer that separate jail.local configuration > blocks be written for each Tor service port individually, ei failing one > port > doesn't ban from a possible s

Re: [tor-talk] Scripted installer of Tor and more being worked on at GitHub, ya may want to sit down for this...

2016-01-31 Thread coderman
On 1/23/16, David Stainton wrote: > tldr... Michael, you're not going to find much "professional software developer" uptake in your effort. the professionals feel "configuration management" is the domain of actual programming languages, like Python, or domain specific constructs like cfEngine.

Re: [tor-talk] Scripted installer of Tor and more being worked on at GitHub, ya may want to sit down for this...

2016-01-20 Thread coderman
On 1/19/16, Michael wrote: > Salutations Tor, > > I've something special to share with you all; regardless of if you're a node > operator, hidden service provider, client or completely new to Tor > installation and configurations... in short... a script pack aimed to > install and configure the pr

Re: [tor-talk] ProPublica’s Tor hidden service is at http://propub3r6espa33w.onion/

2016-01-18 Thread coderman
... btw. thanks for this! :) best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] transparent tor routers

2016-01-18 Thread coderman
On 1/18/16, Christian Stöveken wrote: > ... > I was talking to one of the tor developers at the Wauholland place the > last day @32C3 about his opinion on transparent tor wlan boxes like > anonabox or invinzbox and others. a recurrent theme. past discussion threads: 1. "[tor-dev] design for a To

Re: [tor-talk] Help me secure my setup

2016-01-12 Thread coderman
On 1/11/16, Oskar Wendel wrote: > ... > I have one more question. What are the drawbacks of not preserving Tor > state directory between reboots? ... > One drawback that I see is that after every reboot, a new entry guard will > be selected and it can make correlation attacks easier. this becomes

Re: [tor-talk] Hello I have a few question about tor network

2015-12-29 Thread coderman
On 12/29/15, Seth David Schoen wrote: > ... > I would suggest looking at Tom Ritter's overview presentation about Tor. > It is very detailed... > > https://ritter.vg/p/tor-v1.6.pdf Tom also provided a handy redirect to latest, https://ritter.vg/p/tor-vlatest.pdf :) -- tor-talk mailing list

Re: [tor-talk] single entity running >36% exit probability with 5 relays? scary.

2015-12-10 Thread coderman
On 12/10/15, Rob Jansen wrote: > ... > That is definitely an error! I rebooted the nodes but it appears that their > consensus weights in the latest consensus have not been corrected. So I just > took them down now. thank you to everyone for acting transparently and conservatively in this situat

Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program

2015-12-06 Thread coderman
On 11/21/15, Flipchan wrote: > I would like to help in anyway i can , i'm currently developing an anti > virus and auditing multi platform program , So if u can find out/copy all > the viruses the nsa have given You and send it i would love to help on > detecting and protecting ppl from it :) you

[tor-talk] don't use freenode. staff is mediocre; don't know when hacked. network a liability. don't use freenode. [was: #nottor]

2015-12-05 Thread coderman
On 12/3/15, Sebastian Hahn wrote: > ... > You're on the FreeNode irc network, not OFTC's. don't use freenode. ever. best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-ta

Re: [tor-talk] twitter tor block redux

2015-12-02 Thread coderman
On Tue, Dec 1, 2015 at 4:23 AM, Tempest wrote: > i noticed a number of accounts were suspended due to using tor recently. > any news on the status of accounts locked out in the last round of > twitter's tor censorship? i'm coming up on 96 hours since twitter has > acknowledged in email that there

Re: [tor-talk] Attention tor-talk ,what happened,??

2015-12-02 Thread coderman
On Wed, Dec 2, 2015 at 7:31 AM, CASPER aka the PARTY G wrote: > What happened?? this is a mystery to us all! > tor used to be about torture, this has been aggregated into a handful of tickets for multi-threading support. > killings live killings the collective defect identification efforts

Re: [tor-talk] How does one remove the NSA Virus off the BIOS Chip as described by Snowden in the ANT Program

2015-11-21 Thread coderman
On 11/20/15, Virilha wrote: > > I believe you need immediate help, to capture evidence and/or reverse > engineer malware. it will be persistent but latent. e.g. after a time period of "unable to successfully implant in OS" it will quit trying. or maybe not! unknown unknowns, etc. or maybe n

Re: [tor-talk] Did the FBI Pay a University to Attack Tor Users?

2015-11-12 Thread coderman
On 11/11/15, Soul Plane wrote: > ... > Is this a problem that can't be stopped, these relays that may join the > network in an effort to de-anonymize users? conflating issues; let's pick apart, can you stop evil relays from ever participating? No. however the design of Tor takes this into accou

Re: [tor-talk] Diaspora, Status.net and the rest Re: A little more hostility towards Tor from Twitter

2015-10-31 Thread coderman
On 10/31/15, Lara wrote: > ... only two > or three servers have .onion addresses. Both services (or pods) I have > tested use plain http for the .onion address. Anyway, it is quite > pointless, because once you are in you get a bunch of connections in the > regular Internet, including the main ser

Re: [tor-talk] A little more hostility towards Tor from Twitter

2015-10-29 Thread coderman
On 10/28/15, Juan wrote: > ... > edit : I mean, of course, without giving a phone number or any > other real information. i can't speak to "Real Names" policy, or verification requirements. it seems you can be singled out for verification by any number of feedback or automatic select

Re: [tor-talk] A little more hostility towards Tor from Twitter

2015-10-29 Thread coderman
On 10/27/15, Juan wrote: > ... > Can you create a facebook account thru the hidden service? yes. i am using an account only ever accessed via onion. [ https://www.facebookcorewwwi.onion/ ] -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go

Re: [tor-talk] Tor

2015-10-12 Thread coderman
On 10/12/15, David Tomic wrote: > To help students answer their assignment questions? this is what's called an ancillary benefit. "teachable moments" -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mail

Re: [tor-talk] Mulihomed flag for nodes (from Re: why are some exit IPs missing from Exit IP DB?)

2015-10-12 Thread coderman
On 10/12/15, coderman wrote: > ... > multi-homed flag must die in a fire. don't even consider it! note that multiple listen addrs for a relay (multi-homing) would be fine in consensus. this "multi-homed exit behavior" flag is a farce, however. best regards, -- tor-talk ma

Re: [tor-talk] Mulihomed flag for nodes (from Re: why are some exit IPs missing from Exit IP DB?)

2015-10-12 Thread coderman
On 10/12/15, sh-expires-12-2...@quantentunnel.de wrote: > ... > Tor users aren't entitled to special treatment, at times it is desirable to avoid the usual "knee-jerk" responses, however. there is a trick, which is to monitor the consensus. any new relay identity, or new IP associated with an ex

Re: [tor-talk] Tor

2015-10-12 Thread coderman
On 10/12/15, kennedy weinrich wrote: > What was the main purpose in creating Tor or the Tor Project? Private communications for all earth humans! as noble an aim today as it was then. and forever a basic human right. best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To un

Re: [tor-talk] Question

2015-10-12 Thread coderman
On 10/12/15, sh-expires-12-2...@quantentunnel.de wrote: > > Mozilla browser (and plugins) more or less hardwired to Tor. there are also significant numbers of browser hardening and configuration tuning for privacy, beyond just plugins and the Tor hard-wire-on. this is the fun part! (seeing how

Re: [tor-talk] pidgin and tor

2015-10-12 Thread coderman
On 10/12/15, sh-expires-12-2...@quantentunnel.de wrote: > ... > Thats what you fail to grasp, imho. i appreciate education in all forms :) > I am not sure, what "rogue remote execution" is, please elaborate. > Sounds like an assassin sniper to me. ;) i should have been more clear. specifical

Re: [tor-talk] Question

2015-10-11 Thread coderman
On 10/11/15, Idel Martinez Ramos wrote: > Hello! > I'm an 11th grade student and I'm doing a science fair about Anonymity it would be fun to compare different Tor configurations: - Tor Browser - TAILS - Whonix / Whonix-Qubes - Qubes-TorVM - TransProxy [ https://trac.torproject.org/projects/t

Re: [tor-talk] pidgin and tor

2015-10-08 Thread coderman
On 10/8/15, sh-expires-12-2...@quantentunnel.de wrote: > > One of the major problems is the design of Pidign, which tries > to build a convenient IM client before it takes security into > consideration "security vs. usability", as ever... > Still, it is possible to a achieve a high degree

Re: [tor-talk] pidgin and tor

2015-10-05 Thread coderman
On 9/29/15, Tempest wrote: > ... > another option to consider is whonix. https://whonix.org. it's a good > mitigation platform against potentially leaky aps. the primary problem with Pidgin is libpurple [ https://pidgin.im/news/security/ ] and a more appropriate mitigation would be Qubes isolatio

Re: [tor-talk] multithreading

2015-08-15 Thread coderman
On 8/11/15, coderman wrote: > ... > i thought i had a list of Trac tickets to the gist of this matter, > alas i cannot find them. perhaps someone else has a convenient > collection? https://trac.torproject.org/projects/tor/wiki/org/projects/Tor/MultithreadedCrypto which covers th

Re: [tor-talk] Crowdsourcing Tor Guides

2015-08-11 Thread coderman
On 8/11/15, coderman wrote: > ... i think it also is worth pointing out: using Tor in odd ways outside the supported Tor Browser configuration is not recommended. (like transparent Tor routers, or different browsers with Tor proxy setup) as with the PDF.js viewer, which has flaws, you do

Re: [tor-talk] Crowdsourcing Tor Guides

2015-08-11 Thread coderman
On 8/10/15, Thomas White wrote: > ... > If anyone has any links to good guides on using Tor with common > applications, resources i find myself suggesting to others: Surveillance Self Defense Guides and Briefings - https://ssd.eff.org/en Library Freedom Project presentations: - https://libra

Re: [tor-talk] (no subject)

2015-08-11 Thread coderman
On 8/11/15, Roman Mamedov wrote: > ... > *Repeatedly headbangs on the desk* > > Uhm so what was I talking about. Ah yes, I believe that's not the case. It > would add a great deal of benefit actually. it would be useful, particularly on systems with native acceleration of supported crypto primiti

Re: [tor-talk] pdf with tor

2015-08-07 Thread coderman
On 7/15/15, Apple Apple wrote: > ... > I think coderman was saying something about a conversion tool as well but I > didn't really understand it... you could call that rube goldberg a "conversion tool", but really it was an object lesson. ;) speaking of PDFs, "

[tor-talk] Attention Jail afficionados

2015-07-25 Thread coderman
minijail better than real jail, see: https://github.com/omegaup/minijail "a tiny, custom launcher that handles namespacing, control groups, chroot'ing..." forked from https://chromium.googlesource.com/chromiumos/platform/minijail/ documentation http://www.chromium.org/chromium-os/chromiumos-des

Re: [tor-talk] USB Sticks for Tails -> CCCamp

2015-07-22 Thread coderman
On 7/22/15, Apple Apple wrote: > ... is there some deeper reasoning ...? USB fit in your pocket; more like DVD-RW perhaps, too. best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/list

Re: [tor-talk] pdf with tor

2015-07-12 Thread coderman
On 7/12/15, Yuri wrote: > ... > It is nothing inherently unsafe in pdf format itself, and any other > document formats aren't any safer. You probably confuse pdf and > PostScript, which is more like a programming language. PDF isn't nearly > as much a programming language as ps is. It does have in

Re: [tor-talk] pdf with tor

2015-07-10 Thread coderman
On 7/9/15, flipc...@riseup.net wrote: > couldnt we just code some protection against this WhonixQubes with DeepLang semantic barriers between isolated temporal processing pipelines. you obtain the PDF inside a transient isolated VM via scrutinized path through upstream Tor and Firewall VMs. nex

Re: [tor-talk] app -> socks5-openvpn -> socks5-tor ?

2015-07-09 Thread coderman
On 7/8/15, grarpamp wrote: > I don't think openvpn supports socks5 on its input yet. > > Anyone know of a shim to put in front of openvpn that will accept > socks5 on its input and send to an IP nexthop / interface as its output > (thus making it configurable to point into openvpn)? this would be

Re: [tor-talk] Regarding the Hacking Team leak and the "TOR interception" (all uppercase Tor obviously)

2015-07-08 Thread coderman
On 7/7/15, chloe wrote: > ... > how would this method work if an infected client tries to visit a hidden > service? there are at least three common ways: 1. using an evil proxy, as directed above. they install a rogue CA so they can sign for any SSL/TLS required. this works for hidden services

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-18 Thread coderman
On 6/18/15, coderman wrote: > ... > this is where multi-path transports, which resist attacks against > traditional in-order or stream oriented transports - inherently > encumbered by serial datagram sequence i should have mentioned that stochastic shaping is required along with the

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-18 Thread coderman
On 6/18/15, l.m wrote: > ... > All that padding means nothing if an adversary can introduce latency > or gaps *at arbitrary* locations in a path. An adversary that can see > your guard, and who can also see the guards traffic can introduce the > gaps/latency in traffic at any point in your path. Y

[tor-talk] Fwd: Qubes Project gets OTF funding to integrate Whonix, improve UX

2015-06-04 Thread coderman
congratulations! glad to see Qubes & Whonix work continue... -- Forwarded message -- From: Joanna Rutkowska Date: Thu, 4 Jun 2015 13:12:52 +0200 ... -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Here is some great news: http://blog.invisiblethings.org/2015/06/04/otf-fun

Re: [tor-talk] isolating multiple server requests

2015-05-27 Thread coderman
On 5/27/15, Allen wrote: > I have a client application that Tor to communicate with several servers. > For privacy reasons, it is important that after each request, the client > starts with a "fresh slate" so the server is not able to tell that the next > request is coming from the same client. o

Re: [tor-talk] Hidden Service Scaling Summer of Privacy Project

2015-05-26 Thread coderman
On 5/26/15, Donncha O'Cearbhaill wrote: > ... > I am interested in hearing from all existing hidden service operators. speaking for two, > In particular I'd like to understand the use-cases, - file distribution - "web services", etherpad, ethersheet, webdav - XMPP - IRC - overlay network (tun

Re: [tor-talk] Friendly LAN bridge -- bad idea?

2015-05-08 Thread coderman
On 5/8/15, l.m wrote: >> There may be other security implications of a shared Tor client. > > Such as > > 1. All users that share a tor client also share a threat model. The > tor configuration is shared. This may not be an ideal property. > 2. If one user of the shared tor client breaks the proce

Re: [tor-talk] German University signs up 24 tor relays

2015-05-06 Thread coderman
On 5/5/15, l.m wrote: > I didn't say wondering about an anomaly is disrespectful. Assuming you > have the right bring their relay's to everyone's attention is > disrespectful. "Dodgson, Dodgson, we've got Dodgson here!" ... in other words, relays are inherently public. more importantly, this i

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-03 Thread coderman
On 5/3/15, Juan wrote: > ... hey Juan, i'm turning over a new leaf and responding to your feedback with promptness and detail. [0] >> what part of "Will never compromise Tor" do you not understand? > > LMAO! What part of 'secret laws' and US military nazis you > don't understand?

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-03 Thread coderman
On 5/3/15, benjamin barber wrote: > Except that TOR says they're going to help LEO with stop cyber criminals > according to briefings with UK parliament. what part of "Will never compromise Tor" do you not understand? educating law enforcement does not equate to capitulating to calls for backdoor

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-02 Thread coderman
On 5/2/15, benjamin barber wrote: > This has been discussed in the past here, specifically with darpa / memex > thread, funding. check. (a hard problem for anybody!) > and the pando saga, mostly funding, disagreements over earth humans being decent to each other? > and some documents submi

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-02 Thread coderman
On 5/2/15, benjamin barber wrote: > How does Ed Snowden not getting caught, have to do with Tor being immune > from flaws, by that logic I have a tiger repelling rock to sell you (money > back guarantee). the claim was not that Tor is immune to flaws. the point is that it works. it is not systema

Re: [tor-talk] Meeting Snowden in Princeton

2015-05-02 Thread coderman
On 5/2/15, Mirimir wrote: > ... I can't resist sharing this: "And it’s a matter > of record that Ed [Snowden] trusted his life to Tor, because he saw from > the other side that it worked." > > I wonder what the haters say to that. Actually, I know: "He's a double > agent, and it's all a con." Amir

Re: [tor-talk] hiddden service on openwrt

2015-04-28 Thread coderman
On 4/27/15, Griffin Boyce wrote: > ... >I've run hidden services successfully on TP-Link WDR-4300 -- they have > 8mb of flash (storage), 128mb ram, and 2 usb ports. With an added flash > drive it's basically a small server. For the size-conscious, you can > also run a hidden service on a TP-

Re: [tor-talk] [tor-dev] Porting Tor Browser to the BSDs

2015-04-17 Thread coderman
On 4/17/15, WhonixQubes wrote: > ... > And my next major project will hopefully overcome most all of the > top-tier low-level exploits you mentioned and shift us further towards > truly bulletproof security + anonymity systems. :) as an attacker, i love claims of bullet proof and NSA proof and m

Re: [tor-talk] Tor Summer of Privacy

2015-04-05 Thread coderman
On 4/5/15, Zenaan Harkness wrote: > ... > If we want a better future in 30 years, how can we achieve that? ... > What is the next step? > > Bind oneself (oh ye powerful tech hacker for freedom) to make no > compromise of means, for any purported ends. as an individual doing things independently,

Re: [tor-talk] Pocan & Massie Introduce Legislation to Repeal PATRIOT Act

2015-03-25 Thread coderman
On 3/25/15, grarpamp wrote: > ... [ shell games ] ... i want proposals to de-fund entire classes of offensive operations that contribute nothing to security, only detriment to all privacy. it's telling that even token gestures, and make no mistake - the CDR db debacle was a show - were scuttled

Re: [tor-talk] RAPTOR: Routing Attacks on Privacy in Tor

2015-03-17 Thread coderman
On 3/16/15, Kevin wrote: > ... > If such attacks are network wide, is there anything the end-user can do > to keep themselves safe? Does tor need special configuration? i use cyclops to monitor BGP routes of interest. it would be interesting to automate monitoring of routes for routers in consen

Re: [tor-talk] FOIPA adventures

2015-03-07 Thread coderman
first responsive one to complete: https://www.muckrock.com/foi/united-states-of-america-10/pet-15590/ "A search of the INTERPOL Washington indices produced 87 responsive pages regarding the Tor Project. We have reviewed the pages and are releasing 3 pages with partial redactions pursuant to Title

Re: [tor-talk] How can I let tor use the local dns settings instead of using its built-in dns queries?

2015-03-01 Thread coderman
On 2/26/15, Hongyi Zhao wrote: > ... > Could someone please give me some hints on how to let tor use my own dns > settings instead of using its built-in dns query mechanism? using your own DNS settings would be a "side channel" and "IP leak/disclosure". Tor cares about your DNS if configured as

Re: [tor-talk] force apt-get & yum updates through tor? - don't use polipo

2015-01-19 Thread coderman
On 1/18/15, Thom Miller wrote: > ... > I'm using your OPTION 3 on a Debian Wheezy system and it's working for > me. I sometimes get a bad package (didn't download properly) and I have > to remove it and re-download it... don't use polipo, it has trouble with very large downloads. better to use

Re: [tor-talk] HardwareAccel: Current proper use???

2015-01-03 Thread coderman
On 1/3/15, usprey wrote: > Summary: > The documentation is still somewhat vague on the best use of the > "HardwareAccel" option. you could submit a patch ;) >> *HardwareAccel* *0*|*1* >> >> If non-zero, try to use built-in (static) crypto hardware acceleration >> when available. (Default: 0)

Re: [tor-talk] Qubes? debian? binary? reproducible? (was: EGOTISTICAL something)

2014-12-07 Thread coderman
On 12/7/14, coderman wrote: > ... > Qubes OS is based on Centos, while Whonix is based on Debian. Whonix + > Qubes OS a chimera, and perhaps one day you'll have a usable Gentoo > Hardened App VM template for various other paranoid purposes, too. that should read: Qubes OS i

Re: [tor-talk] Qubes? debian? binary? reproducible? (was: EGOTISTICAL something)

2014-12-07 Thread coderman
On 12/7/14, carlo von lynX wrote: > ... > I wasn't talking of (2) because that is a given which isn't questioned > anywhere. I was only talking of (1). I don't know why you bring (2) into > the discussion as if there was any problem with that. Unless you are > using Microsoft Windows, there is not

Re: [tor-talk] Qubes? debian? binary? reproducible? (was: EGOTISTICAL something)

2014-12-07 Thread coderman
On 12/7/14, carlo von lynX wrote: > ... > If it took ages to find heartbleed in the source, how likely is it > that a backdoored binary is found? if the source is available, how likely is it to be reviewed? (to play devil's advocate, if heartbleed was found via protocol fuzzing, then a rogue bin

Re: [tor-talk] NSA TAO Exploit of Whonix Qubes - EGOTISTICALSHALLOT - Martin Peck

2014-12-07 Thread coderman
On 12/7/14, carlo von lynX wrote: > ... > This question may spell a change of topic, but wouldn't > it make much more sense to introduce backdoors into debian, > gaining thus access to any derivate distribution? exploits are developed at all levels of the system. from attacking applications, to s

Re: [tor-talk] NSA TAO Exploit of Whonix Qubes - EGOTISTICALSHALLOT - Martin Peck

2014-12-07 Thread coderman
ml thanks for pointing out the thread. there are more questions there, as you ask below. > Are you coderman the Martin R. Peck of the mentioned affidavit and > BigSun application? > > - http://cryptome.org/2014/12/peck-roark-affidavit.pdf > - http://sunshineeevvocqr.onion Patrick wo

Re: [tor-talk] NSA and other codewords

2014-12-06 Thread coderman
On 12/6/14, EGOTISTICALSHALLOT wrote: > > And if anyone else has any additional information regarding this > EGOTISTICALSHALLOT mention-/-codename-/-program then please contribute. other useful resources for _non-fictional_ codenames / projects, http://electrospaces.blogspot.fr/p/nicknames-and-c

Re: [tor-talk] compare and contrast

2014-12-06 Thread coderman
On 12/6/14, EGOTISTICALSHALLOT wrote: "This fictional example is constructed to convey some similarities to parts of reporting in the public knowledge base." ... "Fictional Input Document" ... With a link to an actual example, http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-t

Re: [tor-talk] latest generation traffic confirmation attacks

2014-11-28 Thread coderman
On 11/28/14, Mansour Moufid wrote: > ... > They implemented new traffic confirmation attacks that cannot be > detected by the end points, based on some radar techniques. They > don't mention it but the attacks can be implemented in real time. > > They can also decrease the false positive rate by

Re: [tor-talk] Tor router requirements / best practices [was: Cloak Tor Router]

2014-11-14 Thread coderman
On 11/14/14, coderman wrote: > """ that was quoting arma (Roger) per https://lists.torproject.org/pipermail/tor-relays/2014-October/005544.html and of course, how could i leave out PORTAL : https://github.com/grugq/portal best regards, -- tor-talk maili

[tor-talk] Tor router requirements / best practices [was: Cloak Tor Router]

2014-11-14 Thread coderman
On 11/10/14, Lars Boegild Thomsen wrote: > ... > Would run an OpenWrt build with Tor as Relay/Exit just fine. And I would be > quite OK if the Relay/Exit version required some technical skills for > installation (as in was not available as a ready flashed plug-and-go > device). prior testing on

Re: [tor-talk] Defense against DDoS Attacks in Tor

2014-11-14 Thread coderman
On 11/13/14, IGNACIO GAGO PADRENY wrote: > ... > I am currently studying network security and I am focusing on defense > against DDoS attacks in Tor. I have read a few papers (replay attack, > sniper attack, etc.) but most of them are not recent. i assume you looked over http://freehaven.net/anon

Re: [tor-talk] insufficient hidden service performance is potential de-anonymizing DoS [was Re: [tor-dev] yes hello, internet supervillain here]

2014-11-09 Thread coderman
On 11/9/14, grarpamp wrote: > ... > HS operators banding together to compare the above logs is one > of them. You could conceivably throw the logs/pcaps from many > relays and onions into a splunk.onion instance and try to mine some > knowledge out of them that way. Tor is a jointly owned wide are

[tor-talk] Tor Blog: "Thoughts and Concerns about Operation Onymous"

2014-11-09 Thread coderman
Griffin, Matt, Adam, Roger, David, George, Karen, and Jake worked on a wonderful write up of all the questions and concerns regarding this Op: https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous thank you! also, the performance link to doc/TUNING shows it could use mu

Re: [tor-talk] Operation Onymous against hidden services, most DarkNet markets are down

2014-11-09 Thread coderman
On 11/9/14, coderman wrote: > ... > all signs point to modified slowloris with a limited set of suspects. or was it RELAY_EARLY? https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack you could also use the attack above as "parallel constr

Re: [tor-talk] insufficient hidden service performance is potential de-anonymizing DoS [was Re: [tor-dev] yes hello, internet supervillain here]

2014-11-09 Thread coderman
On 11/9/14, coderman wrote: > ... > your ConstrainedSockets experiments are exactly what i would expect to > see if this technique were used, since reducing socket buffers would > allow you to have more concurrent connections open (and thus thwart a > DoS at lower limits). someo

Re: [tor-talk] Operation Onymous against hidden services, most DarkNet markets are down

2014-11-09 Thread coderman
On 11/7/14, Öyvind Saether wrote: > "The BBC understands that the raid represented both a technological > breakthrough - with police using new techniques to track down the > physical location of dark net servers ..." > > There you have it: An admission that Yes, they really can locate the > Tor hi

Re: [tor-talk] Operation Onymous against hidden services, most DarkNet markets are down

2014-11-09 Thread coderman
On 11/7/14, Mirimir wrote: >> ... >> "Something to note from that graph: There were lots of very odd layer >> 7 ddos requests which affected tor performance moreso than anything >> ... like my TCP buffers weren't even close to max, but I had to mess >> with the ContrainedSockets options in torrc i

Re: [tor-talk] insufficient hidden service performance is potential de-anonymizing DoS [was Re: [tor-dev] yes hello, internet supervillain here]

2014-11-09 Thread coderman
On 11/9/14, coderman wrote: > ... > Andrea's distribution shows this type of behavior, as i would expect it: > https://people.torproject.org/~andrea/loldoxbin-logs/analysis/length_distribution.txt > e.g. send small bits to keep connection active and not closed by > ser

[tor-talk] insufficient hidden service performance is potential de-anonymizing DoS [was Re: [tor-dev] yes hello, internet supervillain here]

2014-11-09 Thread coderman
thanks for the transparency, nachash! i am putting this conversation on tor-talk, since my replies are more noise and less dev, and the details seem to be around Tor use and configuration. On 11/8/14, Fears No One wrote: > ... Another regret is that pcaps weren't taken, but we both made > the mi

Re: [tor-talk] Cloak Tor Router

2014-11-06 Thread coderman
On 11/4/14, Lars Boegild Thomsen wrote: > ... > I will definitely look into this one. This should be quite easy to > implement by messing a bit with the firewall tables :) > > Only problem I see is that to make it useful I think it would have to time > out at some point. in the past i have used

Re: [tor-talk] Platform diversity in Tor network [was: OpenBSD doc/TUNING]

2014-11-05 Thread coderman
On 11/5/14, grarpamp wrote: > ... >1 DragonFly kudos, whoever you are! (i love this flavor more than most :) best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Krypton Anonymous: A Chromium Tor Browser

2014-11-03 Thread coderman
On 11/3/14, Cyrus Katrak wrote: > https://github.com/kr36/seaturtle cool :) > At a high level: > - Process per tab security model, with each tab owning it's own in-memory > state (cache, cookies, local storage, hsts db etc...). do you use any stream isolation per tab behavior? (perhaps via the

Re: [tor-talk] Cloak Tor Router

2014-11-03 Thread coderman
On 11/2/14, Lars Boegild Thomsen wrote: > ... > In the case of a standard Cloak (as least as it is envisioned right now) > that is not a problem for Cloak then. Cloak _will_ be the Wireless Access > Point, it will enforce client isolation at Wi-Fi level and it will hand out > separate address to

Re: [tor-talk] Cloak Tor Router

2014-11-02 Thread coderman
On 11/2/14, Lars Boegild Thomsen wrote: > ... > I just tried with the current Cloak build. And different clients use > different circuits. However, none of the configuration options appear to > work, so I reckon it is down to: if each client has a a distinct address (not behind NAT) this works

Re: [tor-talk] Cloak Tor Router

2014-11-02 Thread coderman
On 11/2/14, coderman wrote: > ... the tor ramdisk effort at https://git.torproject.org/tor-ramdisk.git -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Cloak Tor Router

2014-11-02 Thread coderman
On 11/2/14, Lars Boegild Thomsen wrote: > ... > Doesn't this already exist? there is also the clients behind NAT issue for stream isolation, e.g. clients[1-N...] -> WiFi Router -> Cloak -> ISP -. it would be useful to document the list of these concerns somewhere, perhaps on the Transparent Pr

Re: [tor-talk] Cloak Tor Router

2014-11-02 Thread coderman
On 11/1/14, Lars Boegild Thomsen wrote: > ... > No, we haven't done that yet apart from me trying to start this discussion > here on the mailing list ok. and thanks for running a relay and exit! > ... [ OpenWRT is difficult to work with ] this is true; i see you have tried to be accommodating

Re: [tor-talk] Cloak Tor Router

2014-11-01 Thread coderman
On 11/1/14, Lars Boegild Thomsen wrote: > ... We - the team behind Cloak - and me (the > networking and embedded Linux guy in the team) are genuinely concerned about > privacy and we really would like this product to ... first question, did you contact Tor Project Inc. about this for their input?

[tor-talk] hidden service performance [was: Questions about crypto used in TAP/Ntor]

2014-10-30 Thread coderman
On 10/30/14, bm-2cuqbqhfvdhuy34zcpl3pngkplueeer...@bitmessage.ch wrote: > ... > Maybe you get the chance to look into the Hidden Services... Nick has commented on them before on tor-dev, among other places. some additional hidden service performance links: "Hidden Services are in a peculiar sit

[tor-talk] Revocable Anonymity is Anonymity like Clipper Chip Protection - that is to say, it is not. [was: Another Tor is Possible, Kane/Ksec]

2014-10-07 Thread coderman
On 10/7/14, Nick Mathewson wrote: > ... > What's saddest: You didn't explain why you think it's broken. "Revocable Anonymity" is a farce and distraction; Skipjack Clipper Clip[0] equivalent in every sense to the non-starter of "key escrow" and "government / lawful access mandated backdoors". all

Re: [tor-talk] How does Tor help abuse victims?

2014-10-05 Thread coderman
On 10/5/14, BlackSam wrote: > ... > haha use tor stalk tor people. not sure i can see through the twisted as expected, but absolutely speaking, i would gladly trade "tor stalking" [do you mean trolling?] to most other stalking, particularly the stalking enabled when an aggrieved party can oppor

Re: [tor-talk] Hidden Services - how to implement something like Round Robin DNS?

2014-10-05 Thread coderman
On 10/5/14, Jeremy Rand wrote: > ... > Any chance you could provide more details on what you're using? Last > I heard the only Namecoin resolvers that handle Tor/I2P services were > FreeSpeechMe and NMCSocks; FreeSpeechMe doesn't handle round-robin, > and I'm pretty sure NMCSocks doesn't either.

Re: [tor-talk] Hidden Services - Access control.

2014-10-03 Thread coderman
On 10/3/14, Lluís wrote: > I understand that for "clients" you mean client processes as: > apache, httpd, etc. > > Right ? > > If that so, which is the point on specifying policies as > > "reject 2.2.2.2:80" ??? by clients i typically mean Tor Browser, users behind Transparent Tor Proxy, etc. b

Re: [tor-talk] Hidden Services - Access control.

2014-10-03 Thread coderman
On 10/3/14, Lluís wrote: > ... > SocksPolicy policy,policy,... > > Being "policy" the same form as exit policies. > > Since I can "reject" anyone but me, this will act as a kind of > a firewall for hidden services. Am I right ? this is not correct; think of SocksPort as a way for clients to use t

  1   2   3   >