This is my fault for using whirlpool in the example of how passwords are traditionally stored server side, but we actually decided to go with...
This grew from secure forum. Is currently being developed by professionals but I would appreciate any feedback or advice. Help us get it right the...
cool! Is there any reason not to have random exits/relays with trusted Xerobank exit nodes? Why limit it to entry nodes? But, this is cool, and I...
Perhaps a better question would have been, what is more likely to keep a person anonymous (with user sets and everything else takin into...
Who here actually uses mixminion? And does anyone have anything to say on how anonymous it is? What is more likely to be traced an email sent from...
I had a thread on this subject before, but it is quite cluttered as I often brainstormed by creating posts. I think the thread is confusing at...
Sure intelligence agencies have nodes. The cool thing about intelligence agencies is that every country has many of them. One thing I know about...
This is directly from Tors road map.
Decloak is a good Tor breaker. Hide my ass is a single hop network though, whoever runs it can see what websites you are going to, and see who you...
I know data centers running Tor nodes have been raided by SWAT teams before, as have operators of Tor exit nodes. Think of it this way. People...
I don't hate anyone and certainly don't condone killing. Crime is too broad of a topic for me to take a stance for or against it. What is a crime...
It used to be illegal to be Jewish in Germany. The law can change any day. Maybe some day the mean old democrat socialists of America will make...
Meh, worthless anonymity.
Let's see someone trace back an E-mail sent on Mixminion to me =). I don't think ANYONE can trace back super high latency anonymity networks.
Thats why I suggest a constant stream of encrypted information rotate between the LANs. It can be dummy traffic with start and stop sequences....
What side channel attacks are used, I want to defend myself against them now (Screw waiting till august 1st to be safe....). Is is the CSS...
How does deanonymizer work?
Heh I actually just thought of a way to solve this. Hundreds of machines in a local area network, with only some having access to the internet,...
Can you elaborate on the side channel attacks you think tor portable is vulnerable to? I imagine you mean things like flash, java etc; but if...
double posted
People running Tor relays don't have all THAT much to worry about from a legal perspective. People who run Tor exits have orders of magnitude more...
I don't think BitTorrent needs to resolve any domain names other than maybe the tracker, so I doubt it will matter too much, although it...
Put it this way...... your REAL IP is shown and recorded already if you have been engaging in illegal torrent downloads. Not if he is using an...
If you run as a Tor relay and leave your connection on 24/7 they wont be able to tell when you are surfing and when you are running as a relay.
Tor is free, just always use SSL. It is really slow though, use xerobank if you can pay and need fast, Tor is fine for many though if you know the...
Separate names with a comma.