[tor-talk] Tor-unfriendly List

2012-08-22 Thread Paul
Is there a list of 'things' (services, web sites, etc.) that do not work well with Tor? For example, connect to MSN using Tor and you'll find yourself being banned. http://www.rightmove.co.uk/ refuses to work with Tor. Such a list would be useful to check before trying to use such services, I t

[tor-talk] Debian Repository GPG Key

2012-08-28 Thread Paul
When doing an "apt-get update" after adding deb http://deb.torproject.org/torproject.org squeeze main to my apt sources list, I get: W: GPG error: http://deb.torproject.org squeeze Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 74A941

[tor-talk] DNSPort & googlemail.com

2012-09-30 Thread Paul
When using DNSPort to resolve googlemail.com, I get the 'wrong' address: $ host googlemail.com googlemail.com has address 173.194.41.150 Host googlemail.com not found: 4(NOTIMP) Host googlemail.com not found: 4(NOTIMP) It should be something like: $ host googlemail.com googlemail.com has addres

Re: [tor-talk] DNSPort & googlemail.com

2012-09-30 Thread Paul
On Sunday, 30 September, 2012 at 15:30:06 BST, Roger Dingledine wrote: On Sun, Sep 30, 2012 at 01:47:07PM +0100, Paul wrote: Looks like they're all the 'right' answer. My guess is that Google is doing some sort of geodns where it chooses its answers based on where you're as

Re: [tor-talk] DNSPort & googlemail.com

2012-10-01 Thread Paul
On Monday, 01 October, 2012 at 12:38:07 BST, Mansour Moufid wrote: Try using gmail.com instead of googlemail.com: http://support.google.com/mail/bin/answer.py?hl=en&answer=159001 Nope, same symptoms. Another solution may be a local DNS server like tor-dns-proxy.py: http://code.google.com/p/

Re: [tor-talk] TorBirdy doesn't work with Gmail?

2012-10-05 Thread Paul
I wonder if those could be related to my problem with connecting to their XMPP service (see thread titled 'DNSPort & googlemail.com'). -- . ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/t

[tor-talk] Firefox, Adobe, and DRM

2014-05-15 Thread paul
. Will it continue to be? The source code for FireFox is available free and so the DRM code could be striped out before making it the TOR browser. doing so, however, will require additional effort; is TOR prepared to take on this task? Paul -- Paul A. Crable. Portland, Oregon. U.S.A. PAUL AT

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-26 Thread Paul Syverson
passive attacker, would resist an active attacker. Though providing provable guarantees against a class of active attacker, it is not ready for primetime. See "Preventing Active Timing Attacks in Low-Latency Anonymous Communication" at http://freehaven.net/anonbib/ aloha, Paul >

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-27 Thread Paul Syverson
possible URLs to retrieve the paper, the one you gave plus the anonbib cached version. Both of these worked for me when I tried them a moment ago.) HTH, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-29 Thread Paul Syverson
f from this than when choosing circuits with random entry relays. And if none of your guards is evil, an adversary can never de-anonymize you in this way. (Never say "never". ;>) Cf. the experiments and discussion of layered guards in "Locating Hidden Servers", and our subsequent research on building trust into path selection.) aloha, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] on the topic of tor's weaknesses

2012-02-29 Thread Paul Syverson
protocol level even before that.) At best you might reduce this from virtual certainty to a very serviceable stochastic attack. But that's a good thing, because otherwise Tor would be more vulnerable to long path attacks. aloha, Paul ___ tor-talk ma

Re: [tor-talk] on the topic of tor's weaknesses

2012-03-01 Thread Paul Syverson
at https://www.torproject.org/docs/hidden-services.html.en And more elaborate details and variants in various papers on anonbib. HTH, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Paul Syverson
On Tue, Mar 06, 2012 at 12:22:16PM -0500, Andrew Lewman wrote: > > At PETS in 2009[0], Paul did a talk on 'why I'm not an entropist' and > suggested that people need to start working on defeating a mythical > global passive adversary. Maybe in the near future some

Re: [tor-talk] Tor and HTTPS graphic

2012-03-06 Thread Paul Syverson
On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson > wrote: > > I'm a mere four years behind in putting my work up on the web, and > > this one wasn't co-authored so nobody else did either. I'll try to

Re: [tor-talk] Tor and HTTPS graphic

2012-03-09 Thread Paul Syverson
On Tue, Mar 06, 2012 at 11:14:39PM -0500, Paul Syverson wrote: > On Tue, Mar 06, 2012 at 08:15:58PM -0500, Mansour Moufid wrote: > > On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson > > wrote: > > > I'm a mere four years behind in putting my work up on the web, and >

Re: [tor-talk] Tor and HTTPS graphic

2012-03-09 Thread Paul Syverson
ven if we accept your EER that is at least an order of magnitude worse than experiments have found (i.e., 99%) you come up with initial anonymity sets of who is visiting a particular website (respectively which destinations a given client is visiting) of around 50. That is essentially zero for a b

Re: [tor-talk] access sites

2012-04-05 Thread Paul Syverson
On Thu, Apr 05, 2012 at 05:24:28AM +0300, Maxim Kammerer wrote: > On Thu, Apr 5, 2012 at 04:15, Ted Smith wrote: > > > (Also, have you missed the mail *on this list* from .mil domains?) > > There is Paul Syverson, who works at NRL, if I am not mistaken; did I > miss anyone

Re: [tor-talk] Strong anonymization in a fixed group of participants

2012-08-07 Thread Paul Syverson
Note that Dissent-related work is ongoing. For a recent addition see "Scalable Anonymous Group Communication in the Anytrust Model" It's not on anonbib, but you can get it at http://www.ohmygodel.com/ See also http://dedis.cs.yale.edu/2010/anon/ -Paul On Tue, Aug 07, 2012 at 0

Re: [tor-talk] How dangerous are DNS leak?

2012-09-18 Thread Paul Syverson
us. Pretty sure that's not what you meant. But you're main point is well taken, subject to the limitation that most people won't know exactly what their threat model should be for any given behavior and it's best to be cautious. aloha, Paul > __

Re: [tor-talk] Tor and P2P

2012-09-26 Thread Paul Syverson
vicss were designed with that as a presumed default. Reply onions were more flexible in that regard and could be used either way. I guess the closest current analogue to reply onions is tor2web. Gotta run. HTH. -Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Guard flag vs relay bandwidth

2012-11-14 Thread Paul Syverson
0-50% of what it > could > have used that month. I don't think that's Roger's point. 1. You can induce all kinds of congestion and scheduling messes for circuits going through you if you're optimizing for TB/month processed. 2. There can be advantages to the perform

Re: [tor-talk] RFC1918 addresses on outside interface

2012-11-30 Thread Paul Syverson
from an AS-level attacker by mandating an increase in the number of ASes that must be traversed between client and entry node. -Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] On the Theory of Remailers

2013-01-09 Thread Paul Syverson
as we discussed in the alpha mixing paper mentioned earlier in this thread can provide real benefit for some applications and plausible adversaries (although I think what we called 'tau-mixing' in that paper is the more likely fruitful departure point). But departure point for someone else: there are years worth of higher-priority-to-me Tor-related research problems to solve, so it is back-burnered indefinitely or until somebody entices me that working on this is worth pulling away from other things. HTH, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Roger's status report, Dec 2012

2013-01-10 Thread Paul Syverson
y since there the misappropriation of the term from its original use is unambiguous and well established). aloha, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Debian bureaucracy [was: Tails Mac support [Was: Training Journalists in Istanbul]]

2013-02-27 Thread Paul Wise
I tend to think of the Debian code copies policy as encouraging collaboration, cooperation, peer review, a culture of participation and the spirit of free software amongst the upstream developers of software available in Debian. As to getting Tor Browser into Debian, this has been wanted for years

Re: [tor-talk] What would Tor v1.0 look like?

2013-03-14 Thread Paul Syverson
g since 1995. ;>) -Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] NSA supercomputer

2013-04-04 Thread Paul Syverson
heavily scrutinized by a variety of people with diverse goals and interests. 5. This is a response to the comment immediately below from Gregory Disney. I'm not going to try to address everything mentioned in the thread, although Nick gave a fine answer to the question about key l

Re: [tor-talk] NSA supercomputer

2013-04-06 Thread Paul Syverson
is the real Tor ;>) Your last point is the most salient. Lots of people with lots of different employers, funders, affiliations, etc. have contributed. Whether they were employees or contractors of the Tor Project, Inc., they were all part of the Tor Project. aloha, Paul ___

Re: [tor-talk] NSA supercomputer

2013-04-08 Thread Paul Syverson
On Sun, Apr 07, 2013 at 04:30:34PM -0400, Griffin Boyce wrote: > Paul Syverson wrote: > > > Lots of people with lots of different employers, funders, affiliations, > > > etc. have contributed. Whether they were employees or contractors > > > of the Tor Project, I

Re: [tor-talk] NSA supercomputer

2013-04-08 Thread Paul Syverson
On Mon, Apr 08, 2013 at 01:42:39AM -0400, grarpamp wrote: > > Paul Syverson wrote: > > [... some history of Tor ...] > > The posts regarding this history are useful for the historical perspective > and could be put on the website. Then anyone asking can simply be >

Re: [tor-talk] NSA supercomputer

2013-04-08 Thread Paul Syverson
On Mon, Apr 08, 2013 at 03:12:51PM -0400, Andrew Lewman wrote: > On Mon, 8 Apr 2013 09:00:00 -0400 > Paul Syverson wrote: > > http://www.onion-router.net/History.html > > > > covers what I said and then some, basically gives a brief history > > roughly 1995-2005.

Re: [tor-talk] How intensely do you use Tor?

2013-07-03 Thread Paul Syverson
om where you usually work, need to connect to a system of your employer, but you don't want locals to observe where/who that is. HTH, Paul > > That said, there *is* a reason to avoid using Tor for banking: a growing > number of banking websites use IP address to decide if you

Re: [tor-talk] How does Tor REALLY work?

2011-03-10 Thread Paul Syverson
This is definitely not my area of expertise for Tor (which is why I didn't say anything earlier), but when you iniitially raised this thread my kneejerk reaction was to suggest exactly this. Now we can wait for Roger or Nick to say why it's not the good idea it seems. -Paul On Thu, Ma

Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-20 Thread Paul Syverson
or until 2004. The first publicly deployed Tor network was in 2003, which was also when the source code was made available and publicly licensed under the MIT license. The first funding Roger and Nick got to work on Tor that was other than as part of an NRL project was from the EFF starting in

Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-21 Thread Paul Syverson
to believe and no evidence is going to change that. And yes there's always things to do to improve transparency/trustability/usability/etc. People worth trusting probably have a processes to do that and a relatively independent and confirmable history of doing it. HTH, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-21 Thread Paul Syverson
On Mon, Mar 21, 2011 at 02:06:04PM -0500, Joe Btfsplk wrote: > On 3/21/2011 10:07 AM, Paul Syverson wrote: >> On Mon, Mar 21, 2011 at 02:43:22PM +0100, Anders Andersson wrote: >>> In a scenario where the military actually >>> would hide something in the source, all

Re: [tor-talk] Iran cracks down on web dissident technology

2011-03-22 Thread Paul Syverson
On Mon, Mar 21, 2011 at 10:09:43PM -0700, Mike Perry wrote: > Thus spake Joe Btfsplk (joebtfs...@gmx.com): > > > On 3/21/2011 2:39 PM, Paul Syverson wrote: > > >On Mon, Mar 21, 2011 at 02:06:04PM -0500, Joe Btfsplk wrote: > > >Last comments for a while. (All I ha

Re: [tor-talk] Another security program

2011-04-01 Thread Paul Syverson
case. Note: This is responsive to to the comment about anonymity being broken if you identify yourself using your "real name" to a server you access. I don't have any comments about the original question. Sorry. aloha, Paul ___ tor-talk m

Re: [tor-talk] To Toggle, or not to Toggle: The End of Torbutton

2011-04-18 Thread Paul Syverson
.onion-router.net/Publications.html#IH-1996 Tor separates identification from routing so that your communication gets where it needs to without identifying you---anonymizes the communications pipe if you prefer. Torbutton toggles whether your browser communicates through that pipe or not and helps

Re: [tor-talk] Using passwords with TOR

2011-05-21 Thread Paul Syverson
that protection is SSL encryption, arranged between your Firefox and the server you are connecting to.) See also https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#CanexitnodeseavesdroponcommunicationsIsntthatbad Hope that helps, Paul __

Re: [tor-talk] de-anonymization by correlating circuit changes

2011-08-21 Thread Paul Syverson
But nothing that is both adequately practical and effective has been discovered by any of the researchers who have investigated it, nor do I think ever will be, at least for general purposes. As Curious Kid noted, Tor does not attempt to prevent this b

Re: [tor-talk] <>

2011-09-27 Thread Paul Syverson
cuits. These are used as long as everything remains basically stable and the same. Over time, some may be gradually replaced for various reasons. > > > Thx. HTH, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] <>

2011-09-27 Thread Paul Syverson
.torproject.org/torspec.git/blob_plain/HEAD:/dir-spec.txt -Paul > > thx > > > Date: Tue, 27 Sep 2011 09:49:47 -0400 > > From: syver...@itd.nrl.navy.mil > > To: tor-talk@lists.torproject.org > > Subject: Re: [tor-talk] <> > > > > On Tue

Re: [tor-talk] Automatic vulnerability scanning of Tor Network?

2011-12-21 Thread Paul Syverson
ho _do_ they work for? ;>) On a less facetious note, people might want to look at our trust work as a more constructive response to the diversity of geolocations, jurisdictions, OSes, operators, Tor versions, hardware etc. [2], although it is still research and I do no

Re: [tor-talk] Deterministic builds?

2012-01-05 Thread Paul Syverson
On Thu, Jan 05, 2012 at 02:52:42PM +0100, Jacob Appelbaum wrote: > On 01/05/2012 02:50 PM, Paul Syverson wrote: > > Hi Jake, > > > > On Thu, Jan 05, 2012 at 12:15:08PM +0100, Jacob Appelbaum wrote: > >> Hi, > >> > >> A few Tor hackers are meeting to

Re: [tor-talk] how to answer in tree (mailing list)?

2012-01-19 Thread Paul Staroch
do that for you automatically if you use the "Reply" or "Reply-all" functionality. Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Fwd: ANONdroid

2012-01-26 Thread Paul Syverson
destination of interest, there is no reason to think that future communication, even from the same originating client is likely to emerge from that same node. In fact just the opposite. aloha, Paul ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] tor-blocking sites

2012-02-08 Thread Paul Syverson
e is, so if your suggestion works, it should be compatible. As to your question, a main contribution of work in this area is that one establishes revocable credentials for clients. So if computation is a scarce resource, it would be one that clients need spend only rarely. Once they have the creden

[tor-talk] Spoofing a browser profile to prevent fingerprinting

2014-07-29 Thread Paul Templeton
normal tools of balance loading and migrating of running sessions across the TOR network. Down side would be whether or not the existing network could cope with data streaming. One day when I have time I might build a VE environment and experiment such a concept. Warm Regards Paul -- tor-talk

Re: [tor-talk] Stupid hidden services question

2014-10-06 Thread Paul Syverson
are that nodes with exit and/or guard flags are excluded from > circuits involving hidden services. > The client and/or HS choose their guards as usual. All other relays in both Intro Circuits and both Rendezvous Circuits in a HS access are chosen with the bandwidth-weighted probabili

Re: [tor-talk] Reasoning behind 10 minute circuit switch?

2014-10-14 Thread Paul Syverson
tential. But this was before we did the research that so strongly motivated the need for guard nodes.) The ten minute choice was an informed one, and we had some numbers on public-key overhead. But we had no hard usage data or similar on which to base our intuitions. aloha, Paul -- tor-t

Re: [tor-talk] Social Research on TOR in Turkey during March2014

2014-10-15 Thread Paul Syverson
ust in a pseudonym or what you mean by "true name" (some sort of Vinge reference?), but in any case that's the best Freudian typo of the day. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Social Research on TOR in Turkey during March2014

2014-10-15 Thread Paul Syverson
On Wed, Oct 15, 2014 at 09:26:59PM -0600, Mirimir wrote: > On 10/15/2014 08:57 PM, Paul Syverson wrote: > > On Wed, Oct 15, 2014 at 06:15:37PM -0600, Mirimir wrote: > >> > >> "Web of Trust" is problematic for those who chose pseudonymity. Over the > >>

Re: [tor-talk] "Hidden Services" vs "Onion services"

2014-11-13 Thread Paul Syverson
27;, but no convenient-enough-to-be-useful term is going to be the 100% best choice in all respects. 'Onion site' sounds like a winner to me. (But who would have expected it, clearly a dark horse, perhaps even a dark web horseman of the infocalypse... Oh dear.) aloha, Paul On Wed, Nov 12, 20

Re: [tor-talk] "Hidden Services" vs "Onion services"

2014-11-16 Thread Paul Syverson
conceptual confusion frequently made in the media and important to counter is that these sites/services/whatever are part of the Tor network. Yes I know they also confuse "The Web" with "The Internet" but its even more useful for us to keep those separate. Calling them "onion

Re: [tor-talk] Tor and solidarity against online harassment

2014-12-14 Thread Paul Syverson
if everything betweent eh entry and exit relasys is honest and well performing. (See "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries" http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf. The last comment of the paragraph is correct however. aloha, Paul -

Re: [tor-talk] Tor and solidarity against online harassment

2014-12-15 Thread Paul Syverson
On Sun, Dec 14, 2014 at 10:29:49PM -0700, Mirimir wrote: > On 12/14/2014 09:28 PM, Paul Syverson wrote: > > On Sat, Dec 13, 2014 at 01:04:06PM -0700, Mirimir wrote: > > [snip] > >> > >> However, Tor is by design a Chaum-style network of untrusted nodes. As > &g

Re: [tor-talk] ATOMIC BANJO and LEVITATION used by CSE

2015-01-29 Thread Paul Syverson
ttps://www.torproject.org/docs/faq.html.en#WhyCalledTor aloha, Paul (Note, the German meaning of 'Tor' mentioned in the FAQ is discussed in the "A Peel of Onion" paper, the Turkish meaning is apparently a fine-meshed net.) -- tor-talk mailing list - tor-talk@lists.torproject.org T

Re: [tor-talk] Tor -> VPN Clarification

2015-01-30 Thread Paul Syverson
ted destinations such as a bridge. I have certainly not given all the reasons for using either configuration, nor have I spelled out all the risks from every possible adversary. But I hope this helps. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change o

Re: [tor-talk] Tor -> VPN Clarification

2015-01-30 Thread Paul Syverson
on both sides. To be successful at this a low-latency cascade like JAP must maintain a constant (or adequately large) anonymity set of the same persistent clients concurrently and must use padding and other techniques to prevent natural or induced patterns from giving away the corr

Re: [tor-talk] Tor -> VPN Clarification

2015-02-01 Thread Paul Syverson
most certainly the phrase of the week if not month---and (for me) before dawn on the first day at that. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] ATOMIC BANJO and LEVITATION used by CSE

2015-02-02 Thread Paul Syverson
On Mon, Feb 02, 2015 at 01:32:06PM -0700, Mirimir wrote: > On 02/02/2015 11:56 AM, spencer...@openmailbox.org wrote: > > Paul Syverson paul.syverson at nrl.navy.mil: > >> See p. 129 of http://www.acsac.org/2011/program/keynotes/syverson.pdf > >> also > >

Re: [tor-talk] ATOMIC BANJO and LEVITATION used by CSE

2015-02-02 Thread Paul Syverson
/syverson.pdf > >>>>also > >>>>https://www.torproject.org/docs/faq.html.en#WhyCalledTor > >>>> > >>>>aloha, > >>>>Paul > >>>> > >>>>(Note, the German meaning of 'Tor' mentioned in the

Re: [tor-talk] ATOMIC BANJO and LEVITATION used by CSE

2015-02-02 Thread Paul Syverson
On Mon, Feb 02, 2015 at 01:44:05PM -0800, Seth wrote: > On Mon, 02 Feb 2015 13:37:58 -0800, Paul Syverson > wrote: > > >The point was that there was a bunch of stuff we started doing at NRL > >in 1995 we called "onion routing" including what we eventually called

Re: [tor-talk] "Confidant Mail"

2015-02-04 Thread Paul Syverson
; the cleanest and trustworthy thing, but you can still provide the CSR, > meaning you own the key. And they support 4096b with sha2… > See also https://letsencrypt.org/ Let's Encrypt plans to offer free and automatic to set up certificates from a recognized authority starting in mid-2015. (N

Re: [tor-talk] Protest Blocking Tor via CloudFlare

2015-03-11 Thread Paul Syverson
bandwidth costs could > be reduced for both the Exit operator and CloudFlare (assuming that traffic > within a datacenter or AS is counted separately). > This should have security advantages as well against end-to-end correlation by an AS level adversary. aloha, Paul -- tor-talk mai

Re: [tor-talk] DNS hijacking

2015-04-03 Thread Paul Syverson
ere a problem. HTH, Paul On Fri, Apr 03, 2015 at 07:32:05PM -0400, Max Bond wrote: > Have you tried this over multiple circuits? Is it possible your DNS > provider is the one doing something naughty? > > On Fri, Apr 3, 2015 at 7:12 PM, grarpamp wrote: > > > On Fri, Apr 3,

Re: [tor-talk] Tor Summer of Privacy

2015-04-06 Thread Paul Syverson
ally vetted by the best scientific and technical researchers on the planet from the most respected advanced institutions in every country. What could they possibly add to the truly dizzying intellect manifest in your arguments to date? Apologies to others for failing to resist feeding the trol

Re: [tor-talk] Making a Site Available as both a Hidden Service and on the www - thoughts?

2015-05-19 Thread Paul Syverson
ously is highly manual. So "easily" is in the eye of the beholder. We discuss use cases, protections, efficiencies, and conveniences provided. Also complementarity to TLS, automation, and the potential for integration with existing tools such as Convergence and Monkeysphere. Also, integr

Re: [tor-talk] Use of TOR for illegal activities

2015-05-19 Thread Paul Syverson
On Tue, May 19, 2015 at 10:24:31PM -0600, Mirimir wrote: > On 05/19/2015 09:10 PM, Paul A. Crable wrote: > > > > > Is there some way to keep TOR out of the hands of sleazebags and crooks? > > No, there's not. > > Also, not everyone agrees who the "s

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-21 Thread Paul Syverson
ed in the mentioned papers, but it has also been born out by several later results as the network and its use have grown. [0] Locating Hidden Servers. Overlier and Syverson available at http://freehaven.net/anonbib/ [1] Low-Resource Routing Attacks Against Tor. Bauer et al. ava

Re: [tor-talk] Matryoshka: Are TOR holes intentional?

2015-06-23 Thread Paul Syverson
ford to have always-on, full-length padding to connect to the network. Nor would they like the performance of the limit to that rate (e.g. no bursts above it). aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Is this still valid?

2015-06-25 Thread Paul Syverson
locked at the destination end for access from specific network locations. As Seth noted, what has been added (and continues to be developed) since the early 2000s version of Tor are various methods to obfuscate that someone is connecting to the Tor network. aloha, Paul -- tor-talk mai

Re: [tor-talk] Javascript vs privacy?

2013-08-07 Thread Paul Syverson
st a significant portion of the threats facing them. This is far from the whole story, but is important to keep in mind. For more, see "A Peel of Onion", "Why I'm not an Entropist", "Anonymity Loves Company: Usability and the Network Effect", and "Challen

Re: [tor-talk] torproject.us?

2013-08-09 Thread Paul Staroch
Am 2013-08-09 12:23, schrieb Roman Mamedov: > What is "www.torproject.us", and is it a scam clone website serving trojaned > copies of Tor and TBB? It is an official mirror page of torproject.org: https://www.torproject.org/getinvolved/mirrors.html.en (the fifth from the top)

Re: [tor-talk] Many more Tor users in the past week?

2013-08-27 Thread Paul Syverson
ncern worth mentioning, or... Malicious stuff happens, but most of the time these things are incompetence or similar rather than malicious intent. Until we know more, it's important to keep that in mind. -Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Traffic Spike and who really backs Tor

2013-08-30 Thread Paul Staroch
s a thread for this topic as well [2]. Paul [1] https://lists.torproject.org/pipermail/tor-talk/2013-August/029638.html [2] https://lists.torproject.org/pipermail/tor-talk/2013-August/029582.html -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settin

Re: [tor-talk] Tor and Financial Transparency

2013-08-30 Thread Paul Syverson
rate researchers, and lots of others have done trying to design for a diverse userbase. www.freehaven.net/anonbib/ is a fine place to start. If you can come up with better designs, we would love to have them. Please share those rather than the allegations you keep making but offer no support for, such as "Tor isn't 'subverted' - it just flawed...by design." aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] What if I connect to all nsa Tor nodes?

2013-09-08 Thread Paul Syverson
also at the ISPs, the ASes, the IXPs, etc. It is hard to say anything more about such an adversary without more details. You might want to see "Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries" and some of the earlier work on this issue cited therein. HTH, Paul

Re: [tor-talk] Tor and Financial Transparency

2013-09-11 Thread Paul Syverson
. On Fri, Aug 30, 2013 at 07:06:57PM -0300, Juan Garofalo wrote: > At 11:33 AM 8/30/2013 -0400, Paul S. wrote: > > >> >> 1. Respect our efforts on this front. We're doing our best with > >> >> what we have 2. Provide citations to support your c

Re: [tor-talk] Tor and Financial Transparency

2013-09-13 Thread Paul Syverson
On Wed, Sep 11, 2013 at 10:59:55PM -0300, Juan Garofalo wrote: > > At 02:31 PM 9/11/2013 -0400, Paul Syverson wrote: > > > Most people involved in creating Tor > >including, e.g., Andrew Lewman, now Executive Director, of the Tor > >Project Inc. first got invo

Re: [tor-talk] Tor and Financial Transparency

2013-09-14 Thread Paul Syverson
that people can easily do strong and repeatable analysis not just of the design but of the deployment and usage (cf. https://metrics.torproject.org/ ) You need to spend a lot of time doing your own research (cf. https://research.torproject.org/techreports.html) as well as collaborating with others a

Re: [tor-talk] Tor and Financial Transparency

2013-09-14 Thread Paul Syverson
ing. Not entirely facetiously I told him that the fascinating technological problems and the pontential to better protect people and their activities was nice, but the real attraction was to create a context where people who were sure they should hate each other were forced to collaborate. alo

Re: [tor-talk] Tor and Financial Transparency

2013-09-17 Thread Paul Syverson
; > Yes, I see that. I must admit I mostly got a fair hearing from you. > > > > >Well no not exactly. I was being a bit terse with "set up for", > > but I've already been overlong in so many respects. As Roger has already > >explained somewh

Re: [tor-talk] New paper : Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

2013-10-17 Thread Paul Syverson
the existing Tor network and usage in order to properly incorporate trust into routing for improved future design. HTH, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Social scientific research on Tor and similar technologies

2013-11-20 Thread Paul Syverson
'd like to collaborate? Do you have a reading list? I'm all for more research in this space, but why create a separate database, especially if there are currently few paper? Couldn't you contribute these to anonbib? Probably you want to create a new topic label for them. -Paul -- tor-talk

Re: [tor-talk] Regarding #8244; Including a string not under authority control?

2013-11-25 Thread Paul Syverson
eputation" You can find all of these on my homepage http://www.syverson.org/ aloha, Paul On Mon, Nov 25, 2013 at 11:53:45AM -0500, Nick Mathewson wrote: > On Fri, Oct 11, 2013 at 9:44 AM, Sebastian G. > wrote: > > Hello, > > > > beside having each authority call in for

Re: [tor-talk] !!! Important please read. !!!

2014-01-08 Thread Paul Syverson
nths since we're now focused elsewhere---such as on how specifically to improve things using trust in the face of the User's-Get-Routed results. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Pissed off about Blacklists, and what to do?

2014-02-07 Thread Paul Syverson
ins on the ground where the light is better, it doesn't mean that there are actually more coins on the ground there rather than elsewhere.) If you make claims without considering the above, you are just making stuff up and fooling yourself that you have evidence for it. aloha, Paul >

Re: [tor-talk] Why so many bugfixes?

2014-02-24 Thread Paul Syverson
t a major event where there was extensive testing and This was a major community/social event, the Winter Tor Developers Meeting, _Not_ some major breach event or similar, just in case anyone was wondering. -Paul > bugfixes. But as a rule, more testing reveals bugs which leads to > bu

Re: [tor-talk] Current attack of TOR to break anonymity

2014-03-07 Thread Paul Syverson
log https://blog.torproject.org/blog/one-cell-enough -Paul > > > 2014-03-07 10:32 GMT+00:00 Maimun Rizal : > > > Dear All, > > > > is there any attack can be break anonymity in TOR network? if so, how? > > > > I assume, if I want to break anonymity in

Re: [tor-talk] Pissed off about Blacklists, and what to do?

2014-03-08 Thread Paul Syverson
in order not-to-mix dirty traffic with > very-reasonably-good-traffic, could be one of the path to work on. Or encouraging corporations to run the same, e.g., allowing exit only to their servers/ports and only for appropriate classes of traffic. This is something we suggested early on, I think

Re: [tor-talk] Torproject frontpage content

2014-03-08 Thread Paul Syverson
s preferable to adding more clarification to the frontpage. A _well designed_ user study might tell us more about how different options are perceived. In the meantime we have competing intuitions. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Pissed off about Blacklists, and what to do?

2014-03-09 Thread Paul Syverson
On Sun, Mar 09, 2014 at 10:21:52AM +0100, Fabio Pietrosanti (naif) wrote: > Il 3/8/14, 8:39 PM, Paul Syverson ha scritto: > > If you naively view Tor as Yet Another Pulbic Proxy, I agree. But this > > is the same thinking that leads you to block all encrypted traffic you > >

Re: [tor-talk] Fundamental differences between Onion Routing and The Onion Router

2014-03-17 Thread Paul Syverson
ndle cases when one relay could not directly reach another, although it had other features.) HTH, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] darkweb-everywhere - was: Using HTTPS Everywhere to redirect to .onion

2014-05-14 Thread Paul Syverson
he frustration expressed. > > I would recommend finding a way to turn the negative into a positive. > Embrace the negative with a joke, for instance: > > Use the Dark Web. "Go Over to the Dark Side." They have cookies. aloha, Paul -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Re: [tor-talk] Presentation material in LaTeX

2014-06-19 Thread Paul Syverson
email exchanges that we actually started using 'Tor' to refer to the basic onion routing system design that we were working on before the design now generally called "Tor". 'Tor' also means a fine-meshed net in Turkish. aloha, Paul On Wed, Jun 18, 2014 at 10:49:01PM

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-07-01 Thread Paul Syverson
ze systems to protect people. I often take way longer than that to respond to substantive well-reasoned questions, as do many people with jobs and/or lives. Such people also typically expect response times proportional to the importance, urgency, and reasonableness of the questions. To such peo

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-07-01 Thread Paul Syverson
On Tue, Jul 01, 2014 at 08:31:00PM +0100, Mark McCarron wrote: > Paul, > [snip] > Eliminating this correlation attack is trivial. So you keep saying. Everybody who has worked on this who has responded has said that they don't know how and that they find this a hard problem. But

Re: [tor-talk] Illegal Activity As A Metric of Tor Security and Anonymity

2014-07-01 Thread Paul Syverson
On Tue, Jul 01, 2014 at 04:41:30PM -0300, Juan wrote: > On Tue, 1 Jul 2014 14:36:08 -0400 > Paul Syverson wrote: > [snip] > > >It's hard to imagine what would satisfy you at this point but > > perhaps this will help: I designed Tor with Roger and Nick. At all >

  1   2   >