Two large systemic flaws would mean there might be some systemic problems with the development of Tor. One major flaw can happen to anyone....
Re: Anyone useing OpenVpn with windows? If I had to take a guess, I would say it's more likely the Tor exit node would be snooping than some...
Kudos to Kyle for that. But it was corrected, and we can't live in the past. We can't condemn Tor for a flaw from 2 years ago or for some people...
What choice do they have? I don't know what country the TC developers are in, but how could the US government possibly control all crypto software...
Just to be clear, I wasn't talking about you being sloppy. I meant that if the drive was being examined by any random person (e.g. spouse, boss,...
First of all, perhaps it could be done on some unsecured machines, but not if you take precautions. The same things you learn on this site about...
Just as much as my power supply and USB ports are. If you take a look around here, you'll see a lot of people listing their computer specs in...
Tor is a cesspool. That's why it's so great for anonymity. Even if someone had a malicious exit node, it does them no good unless: 1) You're...
:thumb:
I understand this. But how can you be certain that if something shuts off the program that your traffic is not compromised? Let me give you an...
I have a quick question about VPNs. My understanding is that they route all traffic from your computer. With the ones I've tried, you simply start...
Re: Anyone useing OpenVpn with windows? I don't understand why you would use Tor when you travel. Tor is for anonymity. For instance, you...
Bad browser plugins can also cause this problem. I've seen it at least 30 times, and it's not even due to an exploit. The plugin simply doesn't...
I'm still not 100% sure what your threat model is. Most of what you say makes it seem like you're protecting against a casual observer. In that...
I think he means you're screwed if you go up against them, regardless of what you use. If you're concerned about backdoors, then there's...
Thanks. That worked for me.
Regarding denying the existence of TrueCrypt, while it's not impossible, it is extremely difficult. Unfortunately, the way it should be done and...
I don't know what to say to this either. I suppose anything is possible, but I think it really does a disservice to the developers who have...
I'm in Germany through the Tor network. I gave them a hushmail e-mail address. Shockingly, they requested a credit card. If you can't trust a...
Good call. I really do. The purpose of the thread is to challenge the way I view TrueCrypt. I do my best to study the currently available data...
::) Enlighten me. p.s. I highly, highly, highly doubt you know what I would write considering that some of my techniques, to my knowledge,...
I don't know how to respond to this except by getting into a whole world of technical mumbo jumbo that I'm not prepared to spend weeks writing...
They can identify the machine if you don't have a router. But if you do have a router, the router can clone the MAC address of the computer. This...
I'm going to revise what I said in light of my response to SundariDevi. TCHunt in fact cannot prove that a file is a TrueCrypt volume. But here on...
There are ways to do what you want, but you haven't provided enough information on your setup. The trick is, as you said, not to have any copy of...
Separate names with a comma.