[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Please don't recommend Tor Button!



Might I suggest that you check out JanusVM. 

http://janusvm.peertech.org/

When tested, JanusVM was able to prevent your real IP from being revealed through HD's decloak test (nice test BTW). 

Keep in mind, JanusVM only works with Windows and Linux at the moment because it uses VMware.
I requested a Beta copy of VMware for OS X, but haven't heard back from VMWare yet.

Gopher, FTP, or any other TCP based session will be going through Tor when you use JanusVM.
DNS request are also redirected through Tor, so no DNS leaks either.

Give it a try, let me know if you have any questions or concerns.

~ Kyle
http://janusvm.peertech.org

On 3/30/07, Michael_google gmail_Gersten <keybounce@xxxxxxxxx> wrote:
Decloak fails on Safari, Mac OS, 10.4.9. Firefox on the same machine
works, and reveals my real external NAT from both Java AND Flash.

Java version:

java version "1.5.0_07"
Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_07-164)
Java HotSpot(TM) Client VM (build 1.5.0_07-87, mixed mode, sharing)

Java console on Safari:

basic: Referencing classloader: sun.plugin.ClassLoaderInfo@c3014, refcount=1
basic: Added progress listener: sun.plugin.util.GrayBoxPainter@4dd758
basic: Loading applet ...
basic: Initializing applet ...
basic: Starting applet ...
network: Connecting
http://metasploit.com/research/misc/decloak/HelloWorld.class with
proxy=HTTP @ /127.0.0.1:8118
basic: Loading http://metasploit.com/research/misc/decloak/HelloWorld.class
from cache
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
liveconnect: JSObject::call: name=decloakAppletCallback

Java console on Firefox:

basic: Referencing classloader: sun.plugin.ClassLoaderInfo@f54c5f, refcount=1
basic: Added progress listener: sun.plugin.util.GrayBoxPainter@e18ba
basic: Loading applet ...
basic: Initializing applet ...
Fri Mar 30 12:21:32 PDT 2007 JEP creating applet HelloWorld
(http://metasploit.com/research/misc/decloak/)
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
<<< ProxyClassLoader: defined LiveConnectProxy class. >>>
<<< Here're the permissions you've got: >>>
<<< java.security.Permissions@9b59a2 (
(java.net.SocketPermission metasploit.com connect,accept,resolve)
)
>>>
basic: Starting applet ...
basic: Stopping applet ...
basic: Referencing classloader: sun.plugin.ClassLoaderInfo@f54c5f, refcount=2
basic: Added progress listener: sun.plugin.util.GrayBoxPainter@5ed853
basic: Loading applet ...
basic: Initializing applet ...
Fri Mar 30 12:21:35 PDT 2007 JEP creating applet HelloWorld
(http://metasploit.com/research/misc/decloak/)
basic: Removed progress listener: sun.plugin.util.GrayBoxPainter@e18ba
basic: Finding information ...
basic: Releasing classloader: sun.plugin.ClassLoaderInfo@f54c5f, refcount=1
basic: Done ...
basic: Joining applet thread ...
basic: Destroying applet ...
basic: Disposing applet ...
basic: Quiting applet ...
basic: Joined applet thread ...
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
network: Connecting socket://metasploit.com:80 with proxy=SOCKS @
/127.0.0.1:9050
<<< ProxyClassLoader: defined LiveConnectProxy class. >>>
<<< Here're the permissions you've got: >>>
<<< java.security.Permissions@c38157 (
(java.net.SocketPermission metasploit.com connect,accept,resolve)
)
>>>
basic: Removed progress listener: sun.plugin.util.GrayBoxPainter@5ed853
basic: Finding information ...
basic: Releasing classloader: sun.plugin.ClassLoaderInfo@f54c5f, refcount=0
basic: Caching classloader: sun.plugin.ClassLoaderInfo@f54c5f
basic: Current classloader cache size: 1
basic: Done ...
basic: Joining applet thread ...
basic: Destroying applet ...
basic: Disposing applet ...
basic: Quiting applet ...
basic: Joined applet thread ...