Not in a million years is deniable cryptography going to keep a terrorist from going free. Terrorism is not a computer storage crime. Terrorism...
This thread is becoming really cluttered with so many contrary views. It's hard to keep track of who said what. References, links? References,...
I was an average user a few years ago. I just did some studying and trial and error (lots of trial and error). But I will say that turning off...
I'm not really sure I understand. I tried that site today and yesterday. It shows nothing but my Tor IP. The first and fourth link show my Tor IP....
Do you have a reference for this or a website I can visit to try it out? I think I've been to every deanonymizing site currently available and...
Forensic analysts and law enforcement relying on assumptions like yours are the ones in for a rude awakening when/if they discover what's actually...
Sometime my seesta, she show her vergina to, my ah-brother Belo and say "You will never get this, you will never get this, LALALALALA" He uh...
Well, you have to worry about java in terms of giving up your IP. But I've never seen it done with javascript alone. Javascript (without java)...
I just gave 17 and 18 as an example without bothering to look it up. I think the whole 35 or 7-pass wiping idea is nonsense myself. I think one...
Let me add something else. The operative term here is "cryptographically secure". As far as I know, one set of cryptographically secure data...
I'm familiar with Mersenne Twister. It actually does pass the diehard tests but not the TestU01 suite. Here's the important fact. AES, Twofish,...
Well, I would say that most of the attacks against Xerobank have been fairly similar to mine. Nothing specific about the product, just someone...
Okay, I look forward to trying it out. But I would like to point out to a previous poster that to claim that a network (such as Tor) is...
What third parties precisely? With Tor, we can independently verify that it is indeed decentralized because anyone can relay traffic. Now,...
I'll bet you anything that it will not deanonymize Tor. It doesn't have to be a money bet. I don't believe for a second that it will be done. I...
Of course, this is meant to be a legal defense in countries where the prosecutor has to prove guilt beyond a reasonable doubt. There may be other...
I differentiate between passwords for encrypted data that requires physical access (e.g. TrueCrypt) and online passwords. The odds that someone...
I hope that tech gets his comeuppance as well.
What business is it of anyone else what I keep on my computer? The problem with most of these laws that you consider so great is that most of the...
I've never used the free version. Perhaps it was versions earlier than 7. I don't recall the last time it happened, but I'm almost certain ver....
Computer repair men, law enforcement, family, friends, etc. What do all these people have in common? They'll all go through your stuff when you're...
Okay, I'll look into this when I get a chance to remove my existing firewall and install a new one (within a few days). I'll try this strategy...
It's Blackhat time. I've been waiting to see what Steve is going to say about Ultrasurf. I found this thread about a month ago after I did a...
I read through the thread. I have no experience setting up rules, but it doesn't seem too hard. But my question is, how easy is it to change from...
I've been using ZA for several years, and it's always had one glaring weakness, in my opinion. When a browser is open, and you've granted it...
Separate names with a comma.