this is usually true. one exception is the local DNS query attack using Java (or other plugin capable of arbitrary direct DNS requests when...
sorry, i should have stated javascript, no java, has proven sufficient in the past. for example,...
this is not the behavior in question. and a white list by some company at one point in time does not indemnify for the future. they're...
i second this approach. if you're relying on the deniable aspect of TrueCrypt or any other such system you're asking for unpleasant surprises...
depending on the nature of your internal network even the best firewall filtering is unable to block certain types of IP disclosure available to...
don't be so sure... xB VPN can be bypassed if you allow arbitrary java execution. xB Machine is pretty solid.
java is only a threat if proxy bypass is in your threat model. with a good transparent Tor / equiv. setup even java, flash, etc. are no advantage....
for a VPN service UDP transport is almost always preferable. this is because multiple streams of data (of any type) are not bound to the same...
indeed. i will defer all further responses to Justin as he is doing a better job in this thread than i. (i should have noticed the...
some might argue combined auth+encrypt modes like GCM provide the best results for such situations. (at least, you might get better parallelism in...
it's called "nuking that promiscuous nssckbi dll/.so and adding back what you trust."
why only 256? do you have a gigantic quantum computer in your garage that is a risk to 128 via quantum search? (did you see the paper breaking...
this is an implementation artifact, though the extreme bias towards small nested/hidden volumes does provide some protection. in short, hidden...
unfortunately no Tor implementation is going to solve the problem of services blocking Tor requests via the Tor DNS exit list service, or other...
by default Vidalia will configure your relay as a middle only if you enable relaying without adding approved ports to your exit policy. it is...
the internets are dangerous... ;) most sites, including wikipedia and many IRC networks use the DNS EL lookup service to determine exit...
you can setup a middle or bridge relay that does not exit traffic with a reject all exit policy.
there is a FAQ entry on this subject: https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#RelayAnonymity in short, there are a lot of...
selected papers in anonymity has all the info you seek: http://www.freehaven.net/anonbib/ in other words, like crypto, anonymity is hard....
Re: Cypherix, AxCrypt, and such. i'm waiting for a good Galois/counter mode extension to gpg; then i'd be happy for the forseeable future......
encryption does not exist in a vacuum and the best way around a cipher is never cryptanalysis. integrity and validation of encrypted content is...
it is getting easier to protect against the catastrophic failure of anonymity via side channels like this by transparently relaying ALL traffic or...
note that all of these fixes are for accidental / non-directed DNS requests to specific nameservers on the local subnet. to truly plug all DNS...
Re: xb Browser cannot ever connnect, why? i forgot there is no proxy in the middle for xB Browser; Polipo won't be of much help then with...
Re: xb Browser cannot ever connnect, why? nothing loading at all sounds like a timeout or configuration problem; it might be worthwhile to try...
Separate names with a comma.