Re: [tor-talk] [Tails-dev] [Secure Desktops] Persistent Tor start in Tails vs location aware Tor entry guards (LATEG)

2016-02-22 Thread Patrick Schleizer
I mistyped. Here is the correct version. day 1 1) Tails user regularly goes to physical place A that provide [free] WiFi. 2) The name of the wifi is FreeWifi832458252823523 with MAC address "A". The user uses the regular way to set up a WiFi connection. Network Manager etc. 3) Now, Tails would re

Re: [tor-talk] Is it possible to use Tor without showing a Tor IP to the destination?

2016-02-22 Thread Aymeric Vitte
Even when you know what you are doing there can be some funny side effects, this is really specific and not entirely related to the original problematic of this thread but just shows that you can't master everything even when you think you do, and anybody I believe can one day make mistake while se

Re: [tor-talk] Is it possible to use Tor without showing a Tor IP to the destination?

2016-02-22 Thread Anders Andersson
On Sun, Feb 21, 2016 at 9:30 PM, Scfith Rise up wrote: > Mr. Andersson is assuming a lot. There are definitely tried and true methods > to make purchases online and setup identities for these types of things. At > the end of the day, yes the VPS provider is the weakest link. But you can use > o

[tor-talk] Fwd: Cryptopolitik and the Darknet

2016-02-22 Thread grarpamp
-- Forwarded message -- From: Steve Kinney Date: Mon, 15 Feb 2016 08:59:32 -0500 Subject: Cryptopolitik and the Darknet To: cypherpu...@cpunks.org -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cryptopolitik and the Darknet "Encryption is too important to be left to true believer

[tor-talk] Tor Weekly News -- February 22nd, 2016

2016-02-22 Thread TWN
Tor Weekly News Febrary 22nd, 2016 Welcome to the 2nd issue in 2016 of Tor Weekly News, the weekly newsletter tha

[tor-talk] Tor for everyone; introducing Eccentric Authentication

2016-02-22 Thread Guido Witmond
Dear Tor community, I came across this message[1] about Shari Steele wanting to bring Tor to the mainstream. I humbly believe I have something that might assist her in this quest. I call it Eccentric Authentication. Philosophical: The Eccentric Authentication protocol is designed for situations