Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-19 Thread grarpamp
On Wed, Sep 17, 2014 at 1:20 PM, Griffin Boyce wrote: >>> - Don't run a hidden service host. > No. As I clarified previously, I recommend against running a hidden service > for others to use as you are likely to be legally reasonable for their > content. No. As with any clearnet hoster... you

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-17 Thread Griffin Boyce
No. As I clarified previously, I recommend against running a hidden service for others to use as you are likely to be legally reasonable for their content. On September 17, 2014 6:45:47 AM EST, "Артур Истомин" wrote: >On Wed, Sep 10, 2014 at 12:26:03AM -0400, Griffin Boyce wrote: >> Kyle Maxwel

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-17 Thread Артур Истомин
On Wed, Sep 10, 2014 at 12:26:03AM -0400, Griffin Boyce wrote: > Kyle Maxwell wrote: > >Griffin Boyce wrote: > >>Actually, no, I *am* surprised that they decided to not even > >>bother trying to gift malware to Mac or Linux users. > > > >Probably just playing the odds, I'd suspect. Though they coul

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-10 Thread Griffin Boyce
krishna e bera wrote: >Would it be better to have a separate firewall appliance to ensure the >hidden service box cannot be as easily DDoS'd or exploited? No, this can be done very effectively with software firewalls. Though some people are doing more with authenticated hidden services. Some p

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-10 Thread Mirimir
On 09/09/2014 10:26 PM, Griffin Boyce wrote: > Things that are important to note for hidden service operators: > - Firewall rules are really useful for keeping out unwarranted scrutiny. It's also good to have server and tor process in separate machines, or at least in separate VMs, and to con

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-10 Thread krishna e bera
On 14-09-10 12:26 AM, Griffin Boyce wrote: > Things that are important to note for hidden service operators: > - Firewall rules are really useful for keeping out unwarranted scrutiny. Would it be better to have a separate firewall appliance to ensure the hidden service box cannot be as easily DD

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-10 Thread Virgil Griffith
> apparently all pedos are windoz-users Odd. I'd think if anything pedos would "think different". -V -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-09 Thread Griffin Boyce
Kyle Maxwell wrote: Griffin Boyce wrote: Actually, no, I *am* surprised that they decided to not even bother trying to gift malware to Mac or Linux users. Probably just playing the odds, I'd suspect. Though they could've examined the access logs at some point - do we know either way on that?

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-09 Thread Kyle Maxwell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 09/08/2014 03:31 AM, Griffin Boyce wrote: > Mirimir wrote: >> Also interesting is the fact that Magneto is a _Windows_ >> executable ;) > > Unsurprising Facts: Volume 1 ;-) > > Actually, no, I *am* surprised that they decided to not even > both

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-08 Thread Артур Истомин
On Mon, Sep 08, 2014 at 04:31:30AM -0400, Griffin Boyce wrote: > Mirimir wrote: > >Also interesting is the fact that Magneto is a _Windows_ executable ;) > > Unsurprising Facts: Volume 1 ;-) > > Actually, no, I *am* surprised that they decided to not even bother trying > to gift malware to M

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-08 Thread Griffin Boyce
Mirimir wrote: Also interesting is the fact that Magneto is a _Windows_ executable ;) Unsurprising Facts: Volume 1 ;-) Actually, no, I *am* surprised that they decided to not even bother trying to gift malware to Mac or Linux users. -- tor-talk mailing list - tor-talk@lists.torproject.o

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-08 Thread Mirimir
On 09/08/2014 02:12 AM, Griffin Boyce wrote: > Mirimir wrote: >> >> It's the same malware. >> >> Operation Torpedo _preceded_ the Freedom Hosting takedown. >> >> | From the perspective of experts in computer security and privacy, >> | the NIT is malware, pure and simple. That was demonstrated last

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-08 Thread Griffin Boyce
Mirimir wrote: It's the same malware. Operation Torpedo _preceded_ the Freedom Hosting takedown. | From the perspective of experts in computer security and privacy, | the NIT is malware, pure and simple. That was demonstrated last | August, when, perhaps buoyed by the success of Operation Torp

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-08 Thread Mirimir
On 09/07/2014 01:25 PM, blo...@openmailbox.org wrote: > On 2014-08-14 00:18, Roger Dingledine wrote: >> On Wed, Aug 13, 2014 at 10:06:00AM +, blo...@openmailbox.org wrote: >>> If it's possible for the owner of a hidden service (whether the FBI >>> or a regular person) to install malware which g

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-09-07 Thread blobby
On 2014-08-14 00:18, Roger Dingledine wrote: On Wed, Aug 13, 2014 at 10:06:00AM +, blo...@openmailbox.org wrote: If it's possible for the owner of a hidden service (whether the FBI or a regular person) to install malware which grabs visitors' IPs, then what is stopping any hidden service own

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-15 Thread terryz
y. --TZ Original Message From: Aymeric Vitte Apparently from: tor-talk-boun...@lists.torproject.org To: tor-talk@lists.torproject.org Subject: Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services. Date: Fri, 15 Aug 2014 22:11:27 +0200 > Definitely yes, tha

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-15 Thread Aymeric Vitte
I would love to think that it's not impossible but it seems to be, whatever documentation exists (which most of Tor users will not read), it can not predict OS and FF hazards, even if the Tor Browser forbids everything that is potentially dangerous (and in that case most of the sites will just

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-15 Thread Aymeric Vitte
Definitely yes, that's a perfect summary of the situation, unfortunately, despite of Tor devs efforts, browsing the web is too dangerous but the Tor browser can provide you a relative anonymity, if you "don't do stupid stuff" indeed. Regards, Le 15/08/2014 01:18, Mirimir a écrit : On 08/14/2

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-15 Thread Joe Btfsplk
On 8/14/2014 6:18 PM, Mirimir wrote: On 08/14/2014 04:48 PM, Aymeric Vitte wrote: I am "defensive" because you seem to make a general case of something that can only happen in case of browser's/OS bug, and conveying to Tor users that they should not use js is a non sense, you make believe them t

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-14 Thread Mirimir
On 08/14/2014 04:48 PM, Aymeric Vitte wrote: > I am "defensive" because you seem to make a general case of something > that can only happen in case of browser's/OS bug, and conveying to Tor > users that they should not use js is a non sense, you make believe them > that intrinsically js can easily

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-14 Thread Aymeric Vitte
I am "defensive" because you seem to make a general case of something that can only happen in case of browser's/OS bug, and conveying to Tor users that they should not use js is a non sense, you make believe them that intrinsically js can easily leak their ip and/or mac addresses, which is wron

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-14 Thread Anders Andersson
On Wed, Aug 13, 2014 at 11:56 PM, Aymeric Vitte wrote: >> As >> someone who argues against using javascript in any context, I can only >> say "told you so", but that doesn't really help anyone. :) > > No and you are wrong >From >https://lists.torproject.org/pipermail/tor-announce/2013-August/

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-13 Thread Roger Dingledine
On Wed, Aug 13, 2014 at 10:06:00AM +, blo...@openmailbox.org wrote: > If it's possible for the owner of a hidden service (whether the FBI > or a regular person) to install malware which grabs visitors' IPs, > then what is stopping any hidden service owner from doing this? See https://lists.tor

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-13 Thread Mirimir
On 08/13/2014 03:01 PM, Anders Andersson wrote: > On Wed, Aug 13, 2014 at 12:06 PM, wrote: >> How, in this case, was it possible for the FBI to learn the IP >> addresses of visitors to this hidden service? The Tor hidden server >> page states that "In general, the complete connection between >

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-13 Thread Aymeric Vitte
Le 13/08/2014 23:01, Anders Andersson a écrit : Considering the number of individuals that must have visited the hidden service, this doesn't seem to be very many people. Why were so few identified? Were the 25 using outdated browsers (TBB)? How, in this case, was it possible for the FBI to lea

Re: [tor-talk] Wired Story on Uncovering Users of Hidden Services.

2014-08-13 Thread Anders Andersson
On Wed, Aug 13, 2014 at 12:06 PM, wrote: > If it's possible for the owner of a hidden service (whether the FBI or a > regular person) to install malware which grabs visitors' IPs, then what is > stopping any hidden service owner from doing this? Nothing is stopping a hidden service owner from d