[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Firefox extensions and anonymity, TOR etc
- To: or-talk@xxxxxxxxxxxxx
- Subject: Firefox extensions and anonymity, TOR etc
- From: force44@xxxxxxxxxxxxx
- Date: Tue, 13 Jun 2006 05:24:59 -0400
- Delivered-to: email@example.com
- Delivered-to: firstname.lastname@example.org
- Delivered-to: email@example.com
- Delivery-date: Tue, 13 Jun 2006 05:25:16 -0400
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=N1-0105; d=Safe-mail.net; b=g2UfJnBUz8ArtD4YyNfHpfDNPUbKRtZn7+8SzG9GmGKtjjSQdqDzclDritsB+1L3 6T1jTR/mQkdz+82WU7tm2JVyGgnx3mk3uL9CaynnPvPNEIVlZIYzuUbXifHXS6qq 6/rO2s9tjsS8HWAE/87Mri7a3xADEclmdDJAFX+25F4=;
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
> Ringo Kamens <2600denver@xxxxxxxxx>
> For non-script email, you could use safe-mail.net
Yes, but safe-mail.net requires JS enabled at least to connect the first time into your account. The default safe-mail template is using JS, and to change to the "No script template", you must click on button that is enabled only if JS is enabled! I asked the safe-mail team to change this a few months ago, and hope it will be done.
There are anyway a lot of free mail services (but for sure not secure as safe-mail is) that allow to open mailboxes without using JS, java or anything else.
And we can always open a mailbox for example at Yahoo, WITH JS enabled, from a wifi public and free place, conecting with a notebook and a spoofed MAC address, through TOR of course. Then we check the mailbox with NO JS, yahoo allows this!
> Jan Reister <Jan.Reister@xxxxxxxx>
> Hi Abacus, have you tried the Firefox extension Flashblock?
Uninstalled it... IMO better is to have Flash than JS enabled!
About Vidalia: There is still the PGP bug
It is maybe right that the problem doesn't come from Vidalia directly, but having to chose between PGP and Vidalia, well...
I am still using TorCP, but in fact I wonder what's the advantage to use TorCP, or Vidalia, rather than simply the TOR program. During normal using, I never use any of the TorCP feature. What would be VERY great is the ability to easily put some TOR nodes (by IP, name or country!) in a personal black list, but as far as I know, no interface allows it simply.
Maybe the April3rd TOR project (http://www.april3rd.com/tor/) will allow this? :)
A BIG thank you to Robert Schade for his great TOR nodes map! Very interesting, and it makes me ask a question:
I see a node in Saudia Arabia. Some nodes in China.. and even a node in Iran! These countries strongly control the internet. How is it possible to believe, that these nodes are not some kind of honeypots ?! And for this, it would be great to be able to easily decide to not use some TOR nodes.