23.08.2014, 00:16 no.thing_to-h...@cryptopathie.eu:
> I just downloaded the old version 3.6.3, the download link on
> http://www.neowin.net/news/tor-browser-bundle-363
> still works and leads to the file
> https://www.torproject.org/dist/torbrowser/3.6.3/torbrowser-install-3.6.3_en-US.exe
>
> When
22.08.2014, 23:38 bm-2cvvnfwsftfx8dv12l8z8pjejmtrjyj...@bitmessage.ch:
> Hi,
>
> I have TOR 3.6.3 installed in a Windows XP computer that is used almost
> just for it with very few additional software installed.
> My understanding is that a potential attacker will test his
> exploit/approach again
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ok, let's try to find our what's going in here.
I checksummed some files:
-
++ The directory I found yesterday evening.
https://www.torproject.org/dist/torbrowser/3.6.3/
- -> This was the old download directory for the Torbrowser v3.6.3
- -> Not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Is there any good way to hide the presence of hidden services? I know
that if I create a hidden service, at least the HSDir nodes are able
to see the .onion address of that site. So someone could scrape a list
of .onion addresses to portscan and auto
Nam-Shub:
> Is there any good way to hide the presence of services?
See `HiddenServiceAuthorizeClient` and `HidServAuth` options in tor(1)
manpage:
HiddenServiceAuthorizeClient auth-type client-name,client-name,...
If configured, the hidden service is accessible for authorized
cl
I don't know the anti-spyware tool that you used nor details about what the
tool deems a "screenshot" but I want to point out that in Windows
(especially older versions) one of the entropy sources for OpenSSL is the
screenshot of your current session[1]. So if the Tor Browser needs to
generate keys
Hello again :)
At https://ruggedinbox.com we are running a 'standard' email server,
using postfix, dovecot, and so on ..
The server is also able to receive and send emails to the onionland,
thanks to Tor providing DNS resolution for onion addresses and 'unbound'
for the clearnet.
As you ma
Take a look at example f.) ->
https://elrippoisland.net/public/how_to/anonymity.html
> Hello again :)
>
> At https://ruggedinbox.com we are running a 'standard' email server,
> using postfix, dovecot, and so on ..
>
> The server is also able to receive and send emails to the onionland,
> thanks