On 10/05/2012 03:31 PM, antispa...@sent.at wrote:
> I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> bundle has been discontinued. So I jumped at using this configuration.
> I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried
> pushing through it a jabber.org
On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote:
> I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> bundle has been discontinued. So I jumped at using this configuration.
> I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried
> pushing throu
On Sat, Oct 6, 2012, at 08:11, Roger Dingledine wrote:
> On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote:
> > I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
> > bundle has been discontinued. So I jumped at using this configuration.
> > I have read that the
On Sat, Oct 6, 2012, at 08:06, Matthew Finkel wrote:
> Depending on the version of TBB you have, Tor will randomly select the
> SOCKS5 port it listens on. I don't know of official documentation off
> hand, but I know there are a couple ways to find it. It is specified in
> Data/Tor/port.conf within
Vidalia -> Settings -> Advanced
TCP Connection. Normally it goes on auto. But I guess it can be set for
each instance. Now the ControlSocket would do exactly the same in an
Unix environment for an app that can use a special file?
Second: authentication. It is set for password. And the password is
On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote:
...
> with Pidgin through Tor. In my proxy configuration for the account in
> Pidgin I left the user and password empty. And it still worked. Am I
> missing something? Shouldn't the authentication be set to Nothing in
> order to make it
Hi Agree,
there is generally a serious lacks of high usable applications for
application sandboxing from both filesystem and network operations point
of view.
I hate advertising a commercial product, but Handsoff is a very good
example of highly usable/security application for Mac.
If they would
On Fri, Oct 05, 2012 at 07:28:35PM +0200, Sebastian G. wrote:
> Some questions about Flashproxy regarding the configuration by the one
> that places the badge and what happens to the Proxy in various use cases.
>
> According to the paper:
> "... the badge is highly configurable for different scen
Import from rubberhose dirauth on other list...
> *Anyone* with *any* access to the data centers that host the directory
> authorities is potentially subject to either a coercive or subversive
>
> As you know, I've been digging down the rabbit hole of how to ensure the
> integrity of a remote mach
On Sat, Oct 6, 2012, at 14:46, Andreas Krey wrote:
> On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote:
> ...
> > with Pidgin through Tor. In my proxy configuration for the account in
> > Pidgin I left the user and password empty. And it still worked. Am I
> > missing something? Shouldn'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 19:24, grarpamp wrote:
>> *Anyone* with *any* access to the data centers that host the
>> directory authorities is potentially subject to either a coercive
>> or subversive
>>
>> As you know, I've been digging down the rabbit hole of ho
t...@lists.grepular.com:
> On 06/10/12 19:24, grarpamp wrote:
>
>>> *Anyone* with *any* access to the data centers that host the
>>> directory authorities is potentially subject to either a coercive
>>> or subversive
>>>
>>> As you know, I've been digging down the rabbit hole of how to
>>> ensure
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 20:42, adrelanos wrote:
>> FYI, if you use TRESOR/Trevisor, you can protect your OS
>> encryption keys from cold boot attacks:
> I like the basic idea very much.
>
> Does this patch still work against latest kernel of your distro?
Not
On Sat, Oct 6, 2012 at 9:37 PM, wrote:
> The basic idea being that your keys are shifted from RAM into the
> debug registers of the CPU on boot, then all future crypto is done
> directly on the CPU (AES-NI) without the keys re-entering RAM.
Did you check that the volume key (shown with cryptsetu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 22:28, Maxim Kammerer wrote:
>> The basic idea being that your keys are shifted from RAM into
>> the debug registers of the CPU on boot, then all future crypto is
>> done directly on the CPU (AES-NI) without the keys re-entering
>> RAM.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 22:44, t...@lists.grepular.com wrote:
> From:
> http://www1.informatik.uni-erlangen.de/tresorfiles/tresor.pdf
>
> "TRESOR is only compatible with real hardware. Run- ning TRESOR as
> guest inside a virtual machine is gen- erally insecur
On Sat, Oct 6, 2012 at 11:44 PM, wrote:
> "TRESOR is only compatible with real hardware. Run-
> ning TRESOR as guest inside a virtual machine is gen-
> erally insecure as the guest?s registers are stored in the
> host?s main memory."
This is irrelevant to my example.
> Also, the encryption/decr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/10/12 23:37, Maxim Kammerer wrote:
>> "TRESOR is only compatible with real hardware. Run- ning TRESOR
>> as guest inside a virtual machine is gen- erally insecure as the
>> guest?s registers are stored in the host?s main memory."
>
> This is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi antispam06,
> Sukhbir, could you make a small tutorial on how to test TorBirdy?
> I'm willing to create one or two free accounts via TBB and do the
> checking, but I have no idea how.
thanks for your offer to test TorBirdy. What are you aiming
TBB will delete all cookies when it is closed
however, in youtube, html5 can be enabled by join the html5 trial through
this page: http://www.youtube.com/html5, which will save a cookie on TBB
can this cookie be kept on TBB?
like configuration file?
thanks
__
20 matches
Mail list logo