Yeah.. the concern here is that it's so feasible now that an attacker can
correlate packet timing with a smaller portion of nodes and with the advent
of high speed internet I think it would be beneficial for people who would
like to adjust settings on their routing as such to be able to.
On Mon, D
Kevin Burress dijo [Mon, Dec 10, 2018 at 10:21:22AM -0500]:
> I just have to check, is tor secure yet?
>
> I was thinking it might be more secure with these AI based timing attacks
> now if the number of hops is more adjustable. Although I would like to see
> a means of negotiating a layer between
Response is below, in-between.
Received from scarp, on 2013-08-07 4:44 AM:
> Bry8 Star:
>> In my opinion,
>
>> After installing TBB (Tor Browser Bundle), users should disable JS
>> (JavaScript) by default, and enable JS, ONLY when visiting a
>> website and if the user must have to, to view a ver
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Bry8 Star:
> In my opinion,
>
> After installing TBB (Tor Browser Bundle), users should disable JS
> (JavaScript) by default, and enable JS, ONLY when visiting a
> website and if the user must have to, to view a very specific
> portion.
>
> TBB by
In my opinion,
After installing TBB (Tor Browser Bundle), users should disable JS
(JavaScript) by default, and enable JS, ONLY when visiting a website
and if the user must have to, to view a very specific portion.
TBB by default keeps "Script Globally Allowed" option ENABLED or
selected, inside "
On 08/05/2013 06:13 PM, Roger Dingledine wrote:
> And finally, be aware that many other vectors remain for vulnerabilities
> in Firefox. JavaScript is one big vector for attack, but many other
> big vectors exist, like css, svg, xml, the renderer, etc.
If I understand it is possible to embed
Hello,
On Sat, 4 Feb 2012 18:15:13 -0800, Damian Johnson wrote:
Tor people, is there some kind of "automagic family"
for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
Ah, good point.
There are quite a
Hello,
On Sat, 4 Feb 2012 21:35:04 -0500, Gregory Maxwell wrote:
I'm unqualified to say anything about the specific questions wrt VM
system security... but I thought it might be worthwhile to offer a
bit
of caution related to risk saliency.
Whatever risks you decide exist in EC2 here probably
> Tor people, is there some kind of "automagic family"
> for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
___
tor-talk mailing list
tor-talk@lists.torproject.org
On Sat, Feb 4, 2012 at 8:09 PM, Marco Gruß wrote:
> with https://cloud.torproject.org/ actively promoting it,
> I have been thinking about Tor vs. EC2 for a while.
I'm unqualified to say anything about the specific questions wrt VM
system security... but I thought it might be worthwhile to offer
ok but my ISP could track my mac/IP address listening 8118 port??? or
encrypted tunnelling pass throu this?
On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote:
Am Mon, 07 Nov 2011 19:14:24 +
schrieb audd :
I'm trying to understand well how tor works, the ip are hidden throu
tunnel encryp
Am Mon, 07 Nov 2011 20:57:04 +
schrieb audd :
> ok but my ISP could track my mac/IP address listening 8118 port??? or
> encrypted tunnelling pass throu this?
>
> On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote:
> > Am Mon, 07 Nov 2011 19:14:24 +
> > schrieb audd :
> >
> >> I'm trying
Short answer: no
Long answer: a good general explanation can be found here:
http://answers.google.com/answers/threadview/id/765054.html
--Aaron
On Mon, Nov 7, 2011 at 2:14 PM, audd wrote:
> I'm trying to understand well how tor works, the ip are hidden throu tunnel
> encrypted nodes, but what ab
Am Mon, 07 Nov 2011 19:14:24 +
schrieb audd :
> I'm trying to understand well how tor works, the ip are hidden throu
> tunnel encrypted nodes, but what about mac address? anyone could
> sniff the node for the mac address?
> ___
> tor-talk mailing li
14 matches
Mail list logo