On 05/10/2012 09:11 PM, johnmurphy...@safe-mail.net wrote:
Hi List,
I am trying to tweak my transparent netfilter setup (Tor Stable,
Debian Wheezy, GNU/Linux, iptables v1.4.12.2, Kernel 3.2.0-amd64). So
far, redirection and torification works fine. I have have several
users, some of them have th
On 12/01/2011 09:16 AM, Hanspeter Spalinger wrote:
Hi,
I built a new gdb (from the homepage), and got the output below. I too
tried rebuild tor from the source (apt-get source,
dpkg-buildpackage,...) and both times the stack trace looks like this. I
do not understand why gdb does not find the to
On 11/12/2011 01:11 PM, Julian Yon wrote:
Nobody's going to keep an old, unsupported system up and running, at
personal expense, just to appease a person who is rude to them.
It's also a bad idea from a security perspective. You could easily be
doing them more harm than good.
Win2k had a lo
On 11/08/2011 12:28 AM, Jacob Appelbaum wrote:
On 11/07/2011 09:29 PM, coderman wrote:
On Sun, Nov 6, 2011 at 5:57 PM, Moritz Bartl wrote:
...
[notice] Using OpenSSL engine Intel AES-NI engine [aesni] for AES
however, you
are getting not only 3x-10x+ performance improvement in AES ops, but
al
On 11/02/2011 05:54 PM, Gozu-san wrote:
Is it really possible that over 100 fools would have downloaded a
purported Tor security update from Hard Candy in one day? In the middle
of an attack by OpDarknet? Seriously?
Mozilla stats https://addons.mozilla.org/en-US/statistics/addon/2275
seem t
On 09/10/2011 10:22 PM, Andre Risling wrote:
I've noticed a lot of people that are concerned about privacy and
security are using Gmail accounts.
Do you really trust Google not to read your email and tell THE MAN what
you've been saying?
No.
But technologies like Tor are general purpose and u
On 09/07/2011 09:21 PM, Indie Intel wrote:
Apparently people are spying on Tor users by setting up their own
exit nodes and sniffing traffic?!
Oh yeah. It happens.
This Moxie Marlinspike is even a well-respected researcher,
apparently. He gives talks at Blackhat to government hacker wannabes
On 09/07/2011 04:48 PM, Julian Yon wrote:
There's no need to be patronising. I have plenty of security
experience.
Sorry, wasn't trying to be patronizing. Just trying to give my opinion
plainly.
This is where, IMHO, computer security people can maybe take a step
back. Sure we should all remin
On 09/07/2011 03:19 PM, Julian Yon wrote:
My bank forces me to enter part of my password using unobscured
dropdowns "for security". Sure, it avoids keyloggers, but what about
*someone standing behind me*?
Do they have a gun? Otherwise, cover the screen with your hand or ask
them to look away.
On 06/01/2011 07:35 PM, cac...@quantum-sci.com wrote:
On Wednesday 1 June, 2011 16:39:22 Javier Bassi wrote:
I have to say I felt a bit disappointed when I saw that the EFF
was also running a middle node. I thought they would be running
the openest exit node.
Everybody's gotta choose their bat
On 05/27/2011 11:22 AM, cac...@quantum-sci.com wrote:
On Friday 27 May, 2011 08:10:47 tagnaq wrote:
You do not mention the threats you worry about and assets you care
about (thread model + security requirements).
Yes that's because I don't know what threats there may be.
http://en.wikipedia.
Which version (number, distribution) of OpenSSL are you using? The line
number s23_clnt.c:607 might tell us something.
Could you get a packet capture (Wireshark, tshark, tcpdump, etc.)?
It's probably only a few KB of the packets which are relevant to the
failed connection attempt.
On 05/27/2011
On 05/27/2011 11:53 AM, alex wrote:
On 05-27 11:39, Marsh Ray wrote:
Which version (number, distribution) of OpenSSL are you using?
0.9.8o-5ubuntu1
Could you get a packet capture (Wireshark, tshark, tcpdump, etc.)?
I'll try. But I'm running a Tor Relay, so isolating my traffic
On 05/26/2011 11:12 AM, cac...@quantum-sci.com wrote:
On Thursday 26 May, 2011 07:31:42 Eugen Leitl wrote:
So you're worrying about a compromised vserver guest
compromising the host, which is then used to attack
your LAN segment?
Doesn't even have to compromise the host. With the guest in the
On 05/15/2011 03:38 PM, tagnaq wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
"If someone publishes or demonstrates a code-exec exploit [...] we
should drop all vulnerable relays from the consensus" [1]
- - Does Tor provide Authority Directories with an easy way to reject/drop
rela
15 matches
Mail list logo