Abel Luck:
> On Saturday 29 March 2014 03:10:47 grarpamp wrote:
> > On Fri, Mar 28, 2014 at 5:20 PM, intrigeri wrote:
> > > grarpamp wrote (28 Mar 2014 21:02:35 GMT) :
> > >> [...] what happens with entire vm IP transproxy (perhaps like
> > >> Tails)?
>
On Sunday 16 February 2014 13:42:59 Patrick Schleizer wrote:
> Rusty Bird:
> > Patrick Schleizer:
> >> The problem is, any Whonix-Workstation behind Whonix-Gateway -
> >> once compromised - can claim to be another Whonix-Workstation,
> >> thus not being stream isolated anymore.
> >>
> >> This coul
On Saturday 29 March 2014 03:10:47 grarpamp wrote:
> On Fri, Mar 28, 2014 at 5:20 PM, intrigeri wrote:
> > grarpamp wrote (28 Mar 2014 21:02:35 GMT) :
> >> [...] what happens with entire vm IP transproxy (perhaps like
> >> Tails)?
> >
> > Tails only uses a transproxy for the automapped .onion add
Mike Perry:
> The new TBB 3.0 series is almost ready for its first alpha release!
>
> Here are the major highlights of the 3.0 series:
>
> 1. Usability, usability, usability! We've attempted to solve several
> major usability issues in this series, including:
>
> A. No more Vidalia. The
xtensive (meaning
> months)
> planned for anytime soon :-)
>
> Ondrej
>
Hi there Ondrej,
Any idea when the fc18 repo will be available?
Cheers,
Abel Luck
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
adrelanos:
> Downloading and gpg verifying Tor Browser each time there is an update
> gets really tiresome and I think many people either never gpg verified
> or don't do it sometimes.
>
> What if we had a Debian package which contains a Tor Browser updater?
>
> I could eventually provide somethi
Anthony Papillion:
> Hello Everyone,
>
> A friend of mine recently read something (I don't know what) that made him
> think that there were some issue using Thunderbird with Tor that might
> compromise your anonymity. I told him I thought it was probably a
> configuration issue that could resul
adrelanos:
>> Future Work Integrate Vidalia
>
> About Vidalia again... I was quickly reading my dev ticket again (
> https://trac.torproject.org/projects/tor/wiki/doc/TorBOX/Dev#SHELLSCRIPTSVidaliabydefaultGraphicalGatewayWAITINGFORVIDALIA0.3.x
> ), why it's not yet integrated into Whonix.
>
> S
Abel Luck:
> adrelanos:
>> Hi,
>>
>> Is it Amnesic or can it be made Amnesic?
>>
>> Or in other words Can you be sure, that after deleting (or wiping)
>> the torified AppVM no activity can not be reconstructed with local disk
>> forensics? Could the
adrelanos:
> Abel Luck:
>> adrelanos:
>>> Hi,
>>>
>>> Is it Amnesic or can it be made Amnesic?
>>>
>>> Or in other words Can you be sure, that after deleting (or wiping)
>>> the torified AppVM no activity can not be reconstru
intrigeri:
> Hi,
>
> adrelanos wrote (16 Oct 2012 18:28:19 GMT) :
>> Abel Luck:
>
>>> I need to do more research into what it would take to protect the
>>> localtime. For example, what are the consequences (technically and
>>> UX-wise) of ch
adrelanos:
> The Doctor:
>> On 10/10/2012 08:59 PM, adrelanos wrote:
>>
>>> Alternative startup scripts for the Tor Browser Bundle. For
>>> starting up Tor Browser without Tor and Vidalia.
>>
>> There's an easier way to go about it:
>>
>> https://github.com/virtadpt/Experiments/blob/master/tbb.sh
>
Mike Hearn:
> We blacklist SMS/voice forwarding services when we find them and
> re-suspend the accounts that used them. We haven't focused on it much
> so there are certainly services we haven't blacklisted yet.
>
> Generally, using these services is dangerous. If spammers have used
> the same nu
fakef...@tormail.org:
>
> I wanted to register for youtube. For comments, voting... Youtube wants a
> gmail account...
>
> Failed to make a gmail account. Gave them alternate mail, correct
> captcha... First thing after registration they want is sms or phone
> verification... I have no such thing
adrelanos:
> Hi,
>
> I am only commenting by reading the Readme:
> https://github.com/abeluck/qubes-addons/blob/master/qubes-tor/README.md
>
This is exactly the type of feedback I wanted, thanks. See responses inline.
> First of all, I find this most interesting!
>
>> Non-comphrensive list of
adrelanos:
> Hi,
>
> Is it Amnesic or can it be made Amnesic?
>
> Or in other words Can you be sure, that after deleting (or wiping)
> the torified AppVM no activity can not be reconstructed with local disk
> forensics? Could the torified AppVM be securely wiped without any
> leftovers? (Left
adrelanos:
> Hi,
>
> released under which license?
>
> Cheers,
> adrelanos
The script is GPL v2 licensed, as the rest of Qubes. You can see that in
the header [1].
[1]:
https://github.com/abeluck/qubes-addons/blob/master/qubes-tor/start_tor_proxy.sh
_
Hey folks,
I've implemented a TorVM service for Qubes OS [1] and I am seeking
feedback from more knowledgeable eyes on the tor+iptables configuration.
Quick background to give this context:
Qubes is an OS based on Xen and Linux that isolates applications to
domains. Each domain is a virtual mach
adrelanos:
> Abel Luck:
>> Interesting reading, thanks! My use case is different. It's running
>> Qubes-OS [1] with a specific TorVM acting as a transparent proxy for
>> other AppVms.
>>
>> The AnonBrowserVM is a VM that only has Firefox (soon TBB without tor)
adrelanos:
> Abel Luck:
>> Hi,
>>
>> Given the following conditions:
>>
>> 1) Firefox (15.0 lets say) is running in an isolated VM, and only
>> Firefox is running (i.e., no other user apps)
>
> Bad. You'd be one of the very few people not using
Hi,
Given the following conditions:
1) Firefox (15.0 lets say) is running in an isolated VM, and only
Firefox is running (i.e., no other user apps)
2) The VM is being properly transparently proxied by another machine
running tor in transparent proxy mode
3) The proxy machine fails cosed upon Tor
21 matches
Mail list logo