[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Any way to secure/anonymize ALL traffic?



On 12/22/10 20:32, Kyle Williams wrote:
> On Wed, Dec 22, 2010 at 8:39 AM,
> 7v5w7go9ub0o<7v5w7go9ub0o@xxxxxxxxx>wrote:
>
>>
>> Any and ALL suggests a machine that allows only HTTP/S activity
>> to/from a TOR process; to/from a TOR entry node; all other traffic
>> (e.g. UDP from some sneaky plugin) is blocked.
>>
>> An iptables script or Windows firewall could do that. Presumably a
>> second script would be invoked for normal operation.
>>
>> Alternatively, VMs dedicated to TOR applications could achieve
>> your goal, plus protect your box if something grabs your e.g.
>> browser and tries to sniff around.
>>
>> JanusVM(.com) does exactly this and works with any OS.

Dang......... I went to that site and was impressed; yet I was not at
all inclined to try it out.

WHY?   .....Suddenly it dawns on me that my closed-minded attitude was
because of VM-prejudice ( :-) ) - I'm a Linux user and so am oriented
toward QEMU and VirtualBox (I presume that VMware is a favorite and best
choice for Windows users). I'd guess there are a number of us who
have never checked out JanusVM because we don't want to learn VMware
just to experiment with a single application.

A quick google came up with this:
<http://www.ubuntugeek.com/howto-convert-vmware-image-to-virtualbox-image.html>

JanusVM seems an important application; and I don't want to reinvent the
wheel putting TOR into a VM!    So I hope to play with conversion
sometime next week. But if you already know how to do this (convert),
how about putting a note on your web page telling VB and Qemu users how
to use JanusVM on their VM host of choice?


***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/