Hi,
Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can
obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
even though its over Tor?
If so, can't these be used to trace a clie
On 02/06/2011 11:59, Anon Mus wrote:
> Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can
> obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as,
>
> 1. client time zone
> 2. client machine clock time
> 3. client machine time since last boot
>
> even though its over T
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I've been lucky so far, both times police contacted me I just said it was a Tor
exit node and it was ok.
On Jun 1, 2011, at 11:32 PM, Jim wrote:
>
>
> Nils Vogels wrote:
>
>> Took a bunch of envelopes to explain the onion rings, but it worked :)
On Wednesday 1 June, 2011 18:41:47 Marsh Ray wrote:
> > - VirtualBox VM bridged to LAN still must share the LAN class C, and
> > could potentially monitor internal traffic. (And please don't
> > quibble with me calling it a class C... they have to make up a name
> > and stick with it. I still ca
On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote:
> On Wednesday 1 June, 2011 18:41:47 Marsh Ray wrote:
> > > - VirtualBox VM bridged to LAN still must share the LAN class C, and
> > > could potentially monitor internal traffic. (And please don't
> > > quibble with me calling it a
On Wednesday 1 June, 2011 18:41:47 you wrote:
> Don't forget the host-only virtual networking that was suggested too.
The Host-only VM adapter does not mean guests will have Internet access; in
fact, they won't. vboxnet0 does not have a default gateway. To make vboxnet0
also serve queries outs
On Thursday 02 June 2011 07:24:27 t...@lists.grepular.com wrote:
> Not sure. If I wanted to access my email over Tor, but using a proper
> client rather than webmail, I'd probably set up fetchmail to fetch the
> email using SSL secured POP3 over Tor, and drop it in a local Maildir,
> and point Thun
I hate to feed a troll, but many of us run relays that we monitor for
badness... it's hard to tell from your curt messages what exactly your
issue is or what your use case is. I'm certainly sure you're one of
very few people that have alleged Tor is coy about security. Maybe if
you laid your case o
On Thu, Jun 2, 2011 at 11:35 AM, Joseph Lorenzo Hall wrote:
> I hate to feed a troll, but many of us run relays that we monitor for
> badness... it's hard to tell from your curt messages what exactly your
> issue is or what your use case is. I'm certainly sure you're one of
> very few people that
I've run tor relays for years (linux) and have never ever had any security
issues. No compromises, no hacks, no nothing. Untouched.
praedor
On Thursday, June 02, 2011 09:51:37 am Geoff Down wrote:
>
> On Thu, 02 Jun 2011 06:36 -0700, cac...@quantum-sci.com wrote:
> > On Wednesday 1 June, 2011
On 02/06/2011 16:30, Javier Bassi wrote:
>> I hate to feed a troll, but many of us run relays that we monitor for
>> badness... it's hard to tell from your curt messages what exactly your
>> issue is or what your use case is. I'm certainly sure you're one of
>> very few people that have alleged To
On Thu, Jun 2, 2011 at 12:52 PM, wrote:
> "If Tor has vulnerabilities, it might get exploited!"
>
> Of course, you can replace "Tor" with any other application name. Tor is
> not special in this regard.
Yeah, thats why I found his argument strange and said 'I think he's
trying to say' although m
t...@lists.grepular.com wrote:
On 02/06/2011 11:59, Anon Mus wrote:
Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can
obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as,
1. client time zone
2. client machine clock time
3. client machine time since last boot
e
I have faced several websites that exclude Tor users from Sign Up with
them,even configuring torrc to go through low speed ExitNodes(not associated
with spam) it is not possible.They must be using TorDNSEL,or so,and receiving
real time csv lists of ExitNodes and that way it is easy to exclude to
On Thursday, June 2, 2011, Javier Bassi wrote:
>
> What is think he is trying to say is that if someone finds a security
> vulnerability in Tor/Vidalia (this has happened in the past) the
> attacker can easily have a list of all IPs running relays, and may
> compromise all their machines with his
does anyone here know of open .onion jabber server?
--
Jerzy Łogiewa -- jerz...@interia.eu
Dzwonki MP3 na telefon. To sa prawdziwe hity!
Pobierz >> http://linkint.pl/f29c2
___
tor-talk m
On Wed, 2011-06-01 at 21:35 -0600, Jim wrote:
>
> and...@torproject.org wrote:
> > On Wed, Jun 01, 2011 at 05:31:41AM +, krak...@googlemail.com wrote 1.9K
> > bytes in 45 lines about:
> > : A few weeks ago, there was one that tried to give me a .bin file
> > : whenever I tried to visit a non-
On Thu, 2 Jun 2011 12:30:33 -0300
Javier Bassi wrote:
> What is think he is trying to say is that if someone finds a security
> vulnerability in Tor/Vidalia (this has happened in the past) the
> attacker can easily have a list of all IPs running relays, and may
> compromise all their machines with
On Thursday 2 June, 2011 09:53:05 Javier Bassi wrote:
> On Thu, Jun 2, 2011 at 12:52 PM, wrote:
> > "If Tor has vulnerabilities, it might get exploited!"
> >
> > Of course, you can replace "Tor" with any other application name. Tor is
> > not special in this regard.
>
> Yeah, thats why I found h
Hi *,
Last year we (student group) did a research project called "entry point
distribution in overlay networks". The information in the paper might be
useful in combination with Tor. The paper is available here:
http://pimpmyshell.org/entry_point_distribution_overlay_networks.pdf
regards,
Kevin
On 02/06/2011 17:55, Anon Mus wrote:
>>> Is it true that email SMTP & POP3 hosts (e.g. gmail's servers) can
>>> obtain from SMTP & POP3 clients (e.g. Thunderbird) data such as,
>>>
>>> 1. client time zone
>>> 2. client machine clock time
>>> 3. client machine time since last boot
>>>
>>> even tho
Jerzy Łogiewa wrote :
> does anyone here know of open .onion jabber server?
ch4an3siqc436soc.onion:5222
>
> --
> Jerzy Łogiewa -- jerz...@interia.eu
>
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailma
--- On Thu, 6/2/11, t...@lists.grepular.com wrote:
> "If Tor has vulnerabilities, it might get exploited!"
>
> Of course, you can replace "Tor" with any other application
> name. Tor is not special in this regard.
It is a server though, and every other application is
not. Most home user's are n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/02/2011 06:55 PM, Anon Mus wrote:
> Does anyone know if there is a mail client source code out there that I
> could modify to create a client that would send settable/random values?
You can modify some of the header values using about:config,
--- On Thu, 6/2/11, cac...@quantum-sci.com wrote:
> For those interested, so far my best idea is running the
> daemon in a VirtualBox VM running SELinux as guest, and
> bridged to the outside. This should substantially
> solve most problems except membership in the local
> LAN.
I don't think
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/02/2011 03:56 PM, cac...@quantum-sci.com wrote:
> On Wednesday 1 June, 2011 18:41:47 you wrote:
>> Don't forget the host-only virtual networking that was suggested
>> too.
>
> The Host-only VM adapter does not mean guests will have Internet
>
On Thursday 2 June, 2011 14:50:44 Martin Fick wrote:
> --- On Thu, 6/2/11, cac...@quantum-sci.com wrote:
>
> > For those interested, so far my best idea is running the
> > daemon in a VirtualBox VM running SELinux as guest, and
> > bridged to the outside. This should substantially
> > solve most
On Thursday 2 June, 2011 15:45:04 tagnaq wrote:
> > At the end, you will have achieved Bridged networking, so why
> > bother?
>
> If your Host OS acts as a router your relay running in a VM won't be
> able to perform layer 2 attacks on your LAN as long as the VM can't
> compromise the Host OS.
Th
--- On Thu, 6/2/11, cac...@quantum-sci.com wrote:
> > > For those interested, so far my best idea is
> running the
> > > daemon in a VirtualBox VM running SELinux as
> guest, and
> > > bridged to the outside. This should
> substantially
> > > solve most problems except membership in the
> local
>
Hi all
In my torrc, in order to use bridges that uses ports other than 80,443
Is it acceptable to simply use
ReachableAddresses *:*
or allowing only specific ports
ReachableAddresses *:9001,*:8080,*:80,*:443
regards
fernan
___
tor-talk mailing list
t
On Fri, Jun 03, 2011 at 10:18:53AM +0800, Fernan Bolando wrote:
>
> In my torrc, in order to use bridges that uses ports other than 80,443
>
> Is it acceptable to simply use
> ReachableAddresses *:*
>
> or allowing only specific ports
> ReachableAddresses *:9001,*:8080,*:80,*:443
If you've conf
The Fight Against Browser FingerPrinting & Creating New Firefox Release for
Non-Tor usage based on Tor Browser bundle
This post will be cross-posted to the blog where it was stated that Tor
Button will soon merge with the Firefox and it won't be a stand-alone add-on
anymore.
I don't understand wh
On Fri, Jun 3, 2011 at 10:59 AM, Roger Dingledine wrote:
> On Fri, Jun 03, 2011 at 10:18:53AM +0800, Fernan Bolando wrote:
>>
>> In my torrc, in order to use bridges that uses ports other than 80,443
>>
>> Is it acceptable to simply use
>> ReachableAddresses *:*
>>
>> or allowing only specific por
On Jun 3, 2011, at 6:52 AM, Fernan Bolando wrote:
> Thanks, Actually openbsd seems to defaults this to
> ReachableAddresses *:80,*:443
Did you (or does openbsd) set the FascistFirewall option
by chance?
How did you learn that openbsd defaults to
ReachableAddresses *:80,*:443?
Thanks
Sebastian
_
34 matches
Mail list logo