On Mon, Aug 11, 2014 at 05:01:14PM +, m...@ruggedinbox.com wrote:
> About connecting to an ssh server with keys, just a little doubt: if I
> connect to all my servers without changing my ssh private and public keys
> (so without deleting '/etc/ssh' and re-creating the keys every time), would
>
On Thu, Oct 02, 2014 at 01:15:32PM -0600, Mirimir wrote:
> What's needed, I think, is challenge-based (as opposed to
> reputation-based) proof-of-work that's very difficult to cheat. That
> sounds like Bitcoin, doesn't it?
Yes, but a bit more like Hashcash given the usecase:
http://www.hashcash.or
To how many other Onion Routers does an Onion Router typically
have open TLS connections? I suspect that the answer is
something like "to nearly all of them", but would like to have
that confirmed.
pgp7DZDJFs_yz.pgp
Description: PGP signature
--
tor-talk mailing list - tor-talk@lists.torproject.
On Sat, Dec 27, 2014 at 04:39:07PM +0100, Tom van der Woerdt wrote:
> It depends on the OR. I had a quick look at some of my own ORs: a relay with
> ~5MB/s had an average of 40 open connections to other ORs, and a relay with
> ~20MB/s reported 250. These numbers seem rather stable: across all my no
Well, the subject line pretty much says it all: Lots of Tor relays send out
globally sequential IP IDs, which, as far as I know, allows a remote party to
measure how fast the relay is sending out IP packets with high precision,
possibly making statistical attacks possible that could e.g. pinpoint t
On Mon, Mar 31, 2014 at 05:31:31PM -0500, Joe Btfsplk wrote:
> On 3/31/2014 4:12 PM, Jann Horn wrote:
> >Well, the subject line pretty much says it all: Lots of Tor relays send out
> >globally sequential IP IDs, which, as far as I know, allows a remote party to
> >measure
On Wed, Apr 09, 2014 at 02:29:19PM -0400, Christopher J. Walters wrote:
> It seems no one wants to talk or hear about this issue. It is not
> being reported on media sites or anywhere else, other than the
> Heartbleed site, and the OpenSSL lists.
And FD... and arstechnica... and Heise...
> This
On Wed, Apr 09, 2014 at 03:07:11PM -0400, Christopher J. Walters wrote:
> On 4/9/2014 3:04 PM, Michael Wolf wrote:
> >On 4/9/2014 2:29 PM, Christopher J. Walters wrote:
> >
> >>This bug has been a known issue for about 2 years, and we are only now
> >>learning about it.
> >
> >The bug has existed f
On Mon, Jun 09, 2014 at 05:09:31PM +0200, Martin Kepplinger wrote:
> So assuming that people here
> https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
> are serious and do a "straight-forward", yet clever passive-observer
> attack