Yeah.. the concern here is that it's so feasible now that an attacker can
correlate packet timing with a smaller portion of nodes and with the advent
of high speed internet I think it would be beneficial for people who would
like to adjust settings on their routing as such to be able to.
On Mon, D
Kevin Burress dijo [Mon, Dec 10, 2018 at 10:21:22AM -0500]:
> I just have to check, is tor secure yet?
>
> I was thinking it might be more secure with these AI based timing attacks
> now if the number of hops is more adjustable. Although I would like to see
> a means of negotiating a layer between
I just have to check, is tor secure yet?
I was thinking it might be more secure with these AI based timing attacks
now if the number of hops is more adjustable. Although I would like to see
a means of negotiating a layer between a hidden service or exit node using
multiple connections in rendezvou
Hello,
I just downloaded tor and am trying to figure it out.
1.
I noticed that all the links I see are 16keys long followed by .onion.
Couldn't someone(person/company/government/other) just generate every
16 digit combination possible then try to connect to them?
Is there another layer I haven
Response is below, in-between.
Received from scarp, on 2013-08-07 4:44 AM:
> Bry8 Star:
>> In my opinion,
>
>> After installing TBB (Tor Browser Bundle), users should disable JS
>> (JavaScript) by default, and enable JS, ONLY when visiting a
>> website and if the user must have to, to view a ver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Bry8 Star:
> In my opinion,
>
> After installing TBB (Tor Browser Bundle), users should disable JS
> (JavaScript) by default, and enable JS, ONLY when visiting a
> website and if the user must have to, to view a very specific
> portion.
>
> TBB by
In my opinion,
After installing TBB (Tor Browser Bundle), users should disable JS
(JavaScript) by default, and enable JS, ONLY when visiting a website
and if the user must have to, to view a very specific portion.
TBB by default keeps "Script Globally Allowed" option ENABLED or
selected, inside "
On 08/05/2013 06:13 PM, Roger Dingledine wrote:
> And finally, be aware that many other vectors remain for vulnerabilities
> in Firefox. JavaScript is one big vector for attack, but many other
> big vectors exist, like css, svg, xml, the renderer, etc.
If I understand it is possible to embed
SUMMARY:
This is a critical security announcement.
An attack that exploits a Firefox vulnerability in JavaScript [1]
has been observed in the wild. Specifically, Windows users using the
Tor Browser Bundle (which includes Firefox plus privacy patches [2])
appear to have been targeted.
Hello,
On Sat, 4 Feb 2012 18:15:13 -0800, Damian Johnson wrote:
Tor people, is there some kind of "automagic family"
for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
Ah, good point.
There are quite a
Hello,
On Sat, 4 Feb 2012 21:35:04 -0500, Gregory Maxwell wrote:
I'm unqualified to say anything about the specific questions wrt VM
system security... but I thought it might be worthwhile to offer a
bit
of caution related to risk saliency.
Whatever risks you decide exist in EC2 here probably
> Tor people, is there some kind of "automagic family"
> for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
___
tor-talk mailing list
tor-talk@lists.torproject.org
On Sat, Feb 4, 2012 at 8:09 PM, Marco Gruß wrote:
> with https://cloud.torproject.org/ actively promoting it,
> I have been thinking about Tor vs. EC2 for a while.
I'm unqualified to say anything about the specific questions wrt VM
system security... but I thought it might be worthwhile to offer
Hello there,
with https://cloud.torproject.org/ actively promoting it,
I have been thinking about Tor vs. EC2 for a while.
Since at least Amazon's US datacenters are most certainly
under US jurisdiction, it might be possible for LEA to
obtain the private keys of EC2 tor nodes. Snapshotting
the c
ok but my ISP could track my mac/IP address listening 8118 port??? or
encrypted tunnelling pass throu this?
On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote:
Am Mon, 07 Nov 2011 19:14:24 +
schrieb audd :
I'm trying to understand well how tor works, the ip are hidden throu
tunnel encryp
Am Mon, 07 Nov 2011 20:57:04 +
schrieb audd :
> ok but my ISP could track my mac/IP address listening 8118 port??? or
> encrypted tunnelling pass throu this?
>
> On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote:
> > Am Mon, 07 Nov 2011 19:14:24 +
> > schrieb audd :
> >
> >> I'm trying
Short answer: no
Long answer: a good general explanation can be found here:
http://answers.google.com/answers/threadview/id/765054.html
--Aaron
On Mon, Nov 7, 2011 at 2:14 PM, audd wrote:
> I'm trying to understand well how tor works, the ip are hidden throu tunnel
> encrypted nodes, but what ab
Am Mon, 07 Nov 2011 19:14:24 +
schrieb audd :
> I'm trying to understand well how tor works, the ip are hidden throu
> tunnel encrypted nodes, but what about mac address? anyone could
> sniff the node for the mac address?
> ___
> tor-talk mailing li
I'm trying to understand well how tor works, the ip are hidden throu
tunnel encrypted nodes, but what about mac address? anyone could sniff
the node for the mac address?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.o
19 matches
Mail list logo