I think we have a failure to communicate. It's probably my fault. I use Windows XP. I don't use SSH. I know of no way to globally send all your...
The thanks should go to Kyle. He's quietly doing the work. I'm going to rant again, so get ready. The problem here is that 99% of the...
Yes, I'm also curious about Freenet. Does anyone here actually use it? You seem to be implying that Freenet can do everything Tor can do and...
Re: Is there a way to protect against "Cold Boot Attack" without turning off ur compu Why not just hibernate? It's not just for bears anymore....
http://www.deanonymizer.com/ is a good site to try. Now, under the assumption that you've tried it and it didn't reveal your true identity, I...
It doesn't have to be "tricked" into disobeying the proxy settings, if by "tricked" you mean a purposeful, malicious attack. It doesn't have to be...
I don't believe this is correct. I haven't personally tried this fix with Steve's Deanonymizer, but I suspect it will fail. Besides, I believe...
I know you asked noone_particular, but let me give you my 2 cents. You don't need a book. You might learn something from reading it but you'd be...
about:blank
Well, I'm not talking about the average computer user. I'm talking about the average Tor user. Of those users, I suspect a large portion will...
I have a serious question that's not meant to be insulting in any way. It's open to anyone. Is configuring a firewall just too difficult for...
How do you know that Ultrasurf is responsible for the problems you're experiencing? My guess is that something other than Ultrasurf is th problem....
Take a look at this article: http://www.defcon.org/images/defcon-15/dc15-presentations/Perry/Whitepaper/dc-15-perry-WP.pdf On page 3,...
Come on. We all know why Google is doing this. They want total information awareness. They want to know everything about everyone. They already...
It's too slow for downloading/uploading large files but it's fast enough for forums/blogging, etc. I personally don't care what the exit node...
I thought Tor did multiplexing between the guard (first) and relay (second) node. Here's an article from 2007 about securing the Tor network where...
Would something like this be possible retroactively if we assume the single node doesn't keep logs? My main concern is making sure no record of my...
No, it doesn't. To the best of my knowledge, the MAC address of the modem and of the device connected to the modem (e.g. router) can be obtained...
It would have to be encrypted during transmission to their servers, of course, because you're using a VPN. But even if it's not end-to-end...
Steve, I've looked again at your directions for leak-proofing a Windows machine. I think calling it "dead to the world" is not entirely correct....
My understanding is that if your SSH client is listening on 127.0.0.1/localhost, then all you have to do is allow your application to only access...
Re: Another problem with Trucrypt... That doesn't sound like the MBR. If the bootloader is working and XP is starting to load, then I don't...
Ouch! I'm sorry about that. This forum always gets high priority in Google searches. I guess that can be a good thing and a bad thing. Doing a...
This is a quote from http://blog.pgp.com/index.php/category/pgp_advisory_board/page/2/ I'm surprised to hear this on that site, but it's entirely...
Here are responses that already answered your questions. Steve has basically said PPTP is inherently flawed and that your traffic may bypass the...
Separate names with a comma.