Hello,
Let's say Alice is a political opponent in a repressive regime. Alice hosts
his blog as a tor hidden service hosted at home.
The government knows about the blog and monitor it. It also monitor the
internet at a nation scale.
Case 1 : the government dosen't suspect any individual of being
On 12 November 2012 08:27, HardKor wrote:
> Looks easy no ?
> Any way for Alice to mitigate such attacks ?
> Two nodes hosting the same .onion in diffrent locations ?
> Something else ?
I think different operational practices would solve the problem. For
example, Host the blog on a HS on a VPS
On Mon, Nov 12, 2012 at 05:21:34AM +, danhughes...@yahoo.co.uk wrote 1.3K
bytes in 29 lines about:
: Thanks, but I'm still a little unclear. You say "no"- it's basically the TBB
workings, but it seems an open question atm? So is there anything else apart
from disk cache ...swap files..flash
On Mon, Nov 12, 2012 at 02:27:22PM +0100, hardkor.i...@gmail.com wrote 1.1K
bytes in 33 lines about:
: Looks easy no ?
: Any way for Alice to mitigate such attacks ?
: Two nodes hosting the same .onion in diffrent locations ?
Host the .onion in multiple locations. Simply copy the private/public
k
HardKor:
> Hello,
>
> Let's say Alice is a political opponent in a repressive regime. Alice hosts
> his blog as a tor hidden service hosted at home.
>
> The government knows about the blog and monitor it. It also monitor the
> internet at a nation scale.
>
> Case 1 : the government dosen't suspe
>Host the .onion in multiple locations. Simply copy the private/public
keys to multiple computers. However, this isn't load-balancing, but
rather redundancy. As soon as one HS goes down, the next will become
available.
Intresting ! So if I undestand it well the two servers will work in a kind
or a
On Mon, 12 Nov 2012 14:20:20 +
and...@torproject.is wrote:
> On Mon, Nov 12, 2012 at 05:21:34AM +, danhughes...@yahoo.co.uk wrote 1.3K
> bytes in 29 lines about:
> : Thanks, but I'm still a little unclear. You say "no"- it's basically the
> TBB workings, but it seems an open question atm
I have been using socat to torify connections. Since I was unsure
where a network address was being translated, I supposed that I could
avoid the issue by first using tor-resolve to translate the address to
a numerical IPV4 address, and then pass that to socat.
I have now been told that this use
> Intresting ! So if I undestand it well the two servers will work in a kind
> or active / passive mode ?
No. There is no awareness between them or any other thing. It's
merely whichever is the newest descriptor in the directories and
when you fetched it.
> Any way for Alice to mitigate such atta
> But don't some LIveCDs write to swap space on the local hard drive IF they
> see one?
I can't speak to that, it's certainly a possible default. People have
some irrational fears of disabling swap. Just because you see
swap used in top doesn't mean you need it. So long as you have
enough ram just
Hi,
I'm using firefox with Tor for some tests work( can't use TBB because it
doesn't allow me to keep cookies the next time it opens). I set the firefox
proxy port to 9050, so firefox is using Tor for network access, however,
DNS queries are bypassing the proxy. How can I make the DNS query tra
> I have been using socat to torify connections. Since I was unsure
> where a network address was being translated
tor-resolve is not needed, socat is sufficient.
Both can resolve dns via socks4a and/or socks5.
Verify the behavior with tcpdump, etc.
___
On Monday, 12. November 2012, 21:57:01 esolve esolve wrote:
> Hi,
>
>I'm using firefox with Tor for some tests work( can't use TBB because it
> doesn't allow me to keep cookies the next time it opens). I set the firefox
> proxy port to 9050, so firefox is using Tor for network access, however,
Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
makes our defense-in-depth memory wiping more reliable, and begins to
count IPv6 addresses in bridge statistics,
https://www.torproject.org/dist/
Changes in version 0.2.4.6-alpha - 2012-11-13
o Major bugfixes:
- Fix an ass
14 matches
Mail list logo