Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-23 Thread Sebastian G.
23.08.2014, 00:16 no.thing_to-h...@cryptopathie.eu: > I just downloaded the old version 3.6.3, the download link on > http://www.neowin.net/news/tor-browser-bundle-363 > still works and leads to the file > https://www.torproject.org/dist/torbrowser/3.6.3/torbrowser-install-3.6.3_en-US.exe > > When

Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-23 Thread Sebastian G.
22.08.2014, 23:38 bm-2cvvnfwsftfx8dv12l8z8pjejmtrjyj...@bitmessage.ch: > Hi, > > I have TOR 3.6.3 installed in a Windows XP computer that is used almost > just for it with very few additional software installed. > My understanding is that a potential attacker will test his > exploit/approach again

Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-23 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Ok, let's try to find our what's going in here. I checksummed some files: - ++ The directory I found yesterday evening. https://www.torproject.org/dist/torbrowser/3.6.3/ - -> This was the old download directory for the Torbrowser v3.6.3 - -> Not

[tor-talk] Hiding the presence of hidden services

2014-08-23 Thread Nam-Shub
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Is there any good way to hide the presence of hidden services? I know that if I create a hidden service, at least the HSDir nodes are able to see the .onion address of that site. So someone could scrape a list of .onion addresses to portscan and auto

Re: [tor-talk] Hiding the presence of hidden services

2014-08-23 Thread Lunar
Nam-Shub: > Is there any good way to hide the presence of services? See `HiddenServiceAuthorizeClient` and `HidServAuth` options in tor(1) manpage: HiddenServiceAuthorizeClient auth-type client-name,client-name,... If configured, the hidden service is accessible for authorized cl

Re: [tor-talk] TOR tried to take a snapshot of my screen

2014-08-23 Thread AntiTree
I don't know the anti-spyware tool that you used nor details about what the tool deems a "screenshot" but I want to point out that in Windows (especially older versions) one of the entropy sources for OpenSSL is the screenshot of your current session[1]. So if the Tor Browser needs to generate keys

[tor-talk] Tor TransparentProxy with iptables breaks connections ?

2014-08-23 Thread ml
Hello again :) At https://ruggedinbox.com we are running a 'standard' email server, using postfix, dovecot, and so on .. The server is also able to receive and send emails to the onionland, thanks to Tor providing DNS resolution for onion addresses and 'unbound' for the clearnet. As you ma

Re: [tor-talk] Tor TransparentProxy with iptables breaks connections ?

2014-08-23 Thread elrippo
Take a look at example f.) -> https://elrippoisland.net/public/how_to/anonymity.html > Hello again :) > > At https://ruggedinbox.com we are running a 'standard' email server, > using postfix, dovecot, and so on .. > > The server is also able to receive and send emails to the onionland, > thanks