Re: [tor-talk] Tor security

2018-12-13 Thread Kevin Burress
Yeah.. the concern here is that it's so feasible now that an attacker can correlate packet timing with a smaller portion of nodes and with the advent of high speed internet I think it would be beneficial for people who would like to adjust settings on their routing as such to be able to. On Mon, D

Re: [tor-talk] Tor security

2018-12-10 Thread Gunnar Wolf
Kevin Burress dijo [Mon, Dec 10, 2018 at 10:21:22AM -0500]: > I just have to check, is tor secure yet? > > I was thinking it might be more secure with these AI based timing attacks > now if the number of hops is more adjustable. Although I would like to see > a means of negotiating a layer between

Re: [tor-talk] Tor security advisory: Old Tor Browser Bundles vulnerable

2013-08-07 Thread Bry8 Star
Response is below, in-between. Received from scarp, on 2013-08-07 4:44 AM: > Bry8 Star: >> In my opinion, > >> After installing TBB (Tor Browser Bundle), users should disable JS >> (JavaScript) by default, and enable JS, ONLY when visiting a >> website and if the user must have to, to view a ver

Re: [tor-talk] Tor security advisory: Old Tor Browser Bundles vulnerable

2013-08-07 Thread scarp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Bry8 Star: > In my opinion, > > After installing TBB (Tor Browser Bundle), users should disable JS > (JavaScript) by default, and enable JS, ONLY when visiting a > website and if the user must have to, to view a very specific > portion. > > TBB by

Re: [tor-talk] Tor security advisory: Old Tor Browser Bundles vulnerable

2013-08-07 Thread Bry8 Star
In my opinion, After installing TBB (Tor Browser Bundle), users should disable JS (JavaScript) by default, and enable JS, ONLY when visiting a website and if the user must have to, to view a very specific portion. TBB by default keeps "Script Globally Allowed" option ENABLED or selected, inside "

Re: [tor-talk] Tor security advisory: Old Tor Browser Bundles vulnerable

2013-08-05 Thread Lars Noodén
On 08/05/2013 06:13 PM, Roger Dingledine wrote: > And finally, be aware that many other vectors remain for vulnerabilities > in Firefox. JavaScript is one big vector for attack, but many other > big vectors exist, like css, svg, xml, the renderer, etc. If I understand it is possible to embed

Re: [tor-talk] Tor security on EC2

2012-02-04 Thread Marco Gruß
Hello, On Sat, 4 Feb 2012 18:15:13 -0800, Damian Johnson wrote: Tor people, is there some kind of "automagic family" for EC2 nodes? Not at present. However, Tor Cloud is only bridge instances so a family wouldn't matter (they're only used for the first hop). Ah, good point. There are quite a

Re: [tor-talk] Tor security on EC2

2012-02-04 Thread Marco Gruß
Hello, On Sat, 4 Feb 2012 21:35:04 -0500, Gregory Maxwell wrote: I'm unqualified to say anything about the specific questions wrt VM system security... but I thought it might be worthwhile to offer a bit of caution related to risk saliency. Whatever risks you decide exist in EC2 here probably

Re: [tor-talk] Tor security on EC2

2012-02-04 Thread Damian Johnson
> Tor people, is there some kind of "automagic family" > for EC2 nodes? Not at present. However, Tor Cloud is only bridge instances so a family wouldn't matter (they're only used for the first hop). ___ tor-talk mailing list tor-talk@lists.torproject.org

Re: [tor-talk] Tor security on EC2

2012-02-04 Thread Gregory Maxwell
On Sat, Feb 4, 2012 at 8:09 PM, Marco Gruß wrote: > with https://cloud.torproject.org/ actively promoting it, > I have been thinking about Tor vs. EC2 for a while. I'm unqualified to say anything about the specific questions wrt VM system security... but I thought it might be worthwhile to offer

Re: [tor-talk] tor security question

2011-11-07 Thread audd
ok but my ISP could track my mac/IP address listening 8118 port??? or encrypted tunnelling pass throu this? On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote: Am Mon, 07 Nov 2011 19:14:24 + schrieb audd : I'm trying to understand well how tor works, the ip are hidden throu tunnel encryp

Re: [tor-talk] tor security question

2011-11-07 Thread BlueStar88
Am Mon, 07 Nov 2011 20:57:04 + schrieb audd : > ok but my ISP could track my mac/IP address listening 8118 port??? or > encrypted tunnelling pass throu this? > > On Mon, 7 Nov 2011 21:18:11 +0100, BlueStar88 wrote: > > Am Mon, 07 Nov 2011 19:14:24 + > > schrieb audd : > > > >> I'm trying

Re: [tor-talk] tor security question

2011-11-07 Thread Aaron
Short answer: no Long answer: a good general explanation can be found here: http://answers.google.com/answers/threadview/id/765054.html --Aaron On Mon, Nov 7, 2011 at 2:14 PM, audd wrote: > I'm trying to understand well how tor works, the ip are hidden throu tunnel > encrypted nodes, but what ab

Re: [tor-talk] tor security question

2011-11-07 Thread BlueStar88
Am Mon, 07 Nov 2011 19:14:24 + schrieb audd : > I'm trying to understand well how tor works, the ip are hidden throu > tunnel encrypted nodes, but what about mac address? anyone could > sniff the node for the mac address? > ___ > tor-talk mailing li