[opensuse] how to protect from govt monitoring and anti p2p with opensuse?
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent. I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored. In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service. So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian? -- G.O. Box #1: 12.1 | KDE 4.8.3 | AMD Athlon X3 | 64 | nVidia C61 GeForce 7025 | 4GB RAM Box #2 12.1 | KDE 4.8.3 | Pentium 4 (2core) | 32 | Intel 82915G | 2GB RAM Lap #1: 12.1 | KDE 4.8.3 | Core2 Duo T8100 | 64 | Intel 965GM | 4GB RAM Lap #2: 12.1 | KDE 4.8.2 | Core Duo T2400 | 32 | NVIDIA Quadro NVS 120 | 2GB RAM learning openSUSE and loving it -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
Look up project Tor. https://www.torproject.org/ -- Per Jessen, Zürich (7.8°C) -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
Am 16.05.2012 12:28, schrieb Per Jessen:
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
Look up project Tor.
Hm..., I found this: https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea Any other solutions for the OPs question? Daniel -- Daniel Bauer photographer Basel Barcelona professional photography: http://www.daniel-bauer.com personal facebook: http://www.facebook.com/mars.fotografo google+: https://plus.google.com/109534388657020287386 -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
Daniel Bauer wrote:
Am 16.05.2012 12:28, schrieb Per Jessen:
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
Look up project Tor.
Hm..., I found this:
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
Sorry, I missed the bit about bittorrent, I thought the question was more about privacy in general.
Any other solutions for the OPs question?
Well, I think the answer is - if you're concerned about privacy of bittorrent, just don't use it. -- Per Jessen, Zürich (9.5°C) -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 05/16/2012 07:41 PM, Per Jessen wrote:
Daniel Bauer wrote:
Am 16.05.2012 12:28, schrieb Per Jessen:
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
Look up project Tor.
Hm..., I found this:
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
Sorry, I missed the bit about bittorrent, I thought the question was more about privacy in general.
Any other solutions for the OPs question?
Well, I think the answer is - if you're concerned about privacy of bittorrent, just don't use it.
I looked up TOR. It does look interesting, and thanks for the link that shows that it is best not used through a torrent client. Although I wonder if the same applies to ktorrent. Do torrent clients by nature use UDP protocol? As far as other anonymity, what about things like skype calls and email? Do those you TCP streams so that they can be protected by TOR? -- G.O. Box #1: 12.1 | KDE 4.8.3 | AMD Athlon X3 | 64 | nVidia C61 GeForce 7025 | 4GB RAM Box #2 12.1 | KDE 4.8.3 | Pentium 4 (2core) | 32 | Intel 82915G | 2GB RAM Lap #1: 12.1 | KDE 4.8.3 | Core2 Duo T8100 | 64 | Intel 965GM | 4GB RAM Lap #2: 12.1 | KDE 4.8.2 | Core Duo T2400 | 32 | NVIDIA Quadro NVS 120 | 2GB RAM learning openSUSE and loving it -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
Am 16.05.2012 14:10, schrieb George Olson:
On 05/16/2012 07:41 PM, Per Jessen wrote:
Daniel Bauer wrote:
Am 16.05.2012 12:28, schrieb Per Jessen:
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
Look up project Tor.
Hm..., I found this:
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-good-idea
Sorry, I missed the bit about bittorrent, I thought the question was more about privacy in general.
Any other solutions for the OPs question?
Well, I think the answer is - if you're concerned about privacy of bittorrent, just don't use it.
I looked up TOR. It does look interesting, and thanks for the link that shows that it is best not used through a torrent client. Although I wonder if the same applies to ktorrent. Do torrent clients by nature use UDP protocol?
As far as other anonymity, what about things like skype calls and email? Do those you TCP streams so that they can be protected by TOR?
Emails should be considered just like a post card: everyone that sees it on its way can read it (if not encrypted and decrypted on a private computer only). As you are using gmail you can even be sure that your emails not only get read but also analised to profile you and everybody who writes to you, including thru mailing lists like this. Even encrypted emails do not give you any privacy as long as there is at least one recipient who uses gmail, hotmail and so on, as the mails will be decrypted on these online accounts, analised, profiled... Skype is closed source and belongs to Microsoft. I guess, this says all. Daniel -- Daniel Bauer photographer Basel Barcelona professional photography: http://www.daniel-bauer.com personal facebook: http://www.facebook.com/mars.fotografo google+: https://plus.google.com/109534388657020287386 -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2012-05-16 14:37, Daniel Bauer wrote:
As you are using gmail you can even be sure that your emails not only get read but also analised to profile you and everybody who writes to you, including thru mailing lists like this. Even encrypted emails do not give you any privacy as long as there is at least one recipient who uses gmail, hotmail and so on, as the mails will be decrypted on these online accounts, analised, profiled...
No, that is not true. Gmail can not decrypt emails, this requires lots of computing power. Gmail clearly states that they machine analyze emails, but that's not something they can do on encrypted email. What they can do and possibly do is register who sends and who receives. Gmail doesn't even recognize pgp signed emails... Even the police can not decrypt those emails, it takes ages.
Skype is closed source and belongs to Microsoft. I guess, this says all.
That's recent. - -- Cheers / Saludos, Carlos E. R. (from 11.4 x86_64 "Celadon" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk+zpigACgkQIvFNjefEBxpbfQCgzDqjhxTdOhj1yWHKwg0GmvUX 2vAAoInIxAk4TSexxlhoFISL8VcfGVcO =BrWv -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
El 16/05/12 08:37, Daniel Bauer escribió:
As you are using gmail you can even be sure that your emails not only get read but also analised to profile you and everybody who writes to you, including thru mailing lists like this.
Email in general is insecure by default, whoever is expecting something different is kidding himself.
Even encrypted emails do not give you any privacy as long as there is at least one recipient who uses gmail, hotmail and so on, as the mails will be decrypted on these online accounts, analised, profiled...
No, as long as email providers do not have GPG/PGP support built into their web interfaces AND you give them your private key, then there is no way they can do that. Of course that if you give them your private key..well. you got what you deserve :-P Cheers. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 17/05/12 10:02, Cristian Rodríguez wrote:
El 16/05/12 08:37, Daniel Bauer escribió:
As you are using gmail you can even be sure that your emails not only get read but also analised to profile you and everybody who writes to you, including thru mailing lists like this.
Email in general is insecure by default, whoever is expecting something different is kidding himself.
Even encrypted emails do not give you any privacy as long as there is at least one recipient who uses gmail, hotmail and so on, as the mails will be decrypted on these online accounts, analised, profiled...
No, as long as email providers do not have GPG/PGP support built into their web interfaces AND you give them your private key, then there is no way they can do that.
Of course that if you give them your private key..well. you got what you deserve :-P
And wouldn't you normally send this key as an attachment, say, to an e-mail? :-) BC -- Using openSUSE 12.1 x86_64 KDE on a system with- AMD FX 8-core 3.6/4.2GHz processor 16GB PC14900/1866MHz Quad Channel Corsair "Vengeance" RAM Gigabyte AMD3+ m/board; Gigabyte nVidia GTX550Ti 1GB DDR5 GPU -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
El 16/05/12 23:35, Basil Chupin escribió:
And wouldn't you normally send this key as an attachment, say, to an e-mail? :-)
The public key, yes, I am talking about the private one. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 17/05/12 13:44, Cristian Rodríguez wrote:
El 16/05/12 23:35, Basil Chupin escribió:
And wouldn't you normally send this key as an attachment, say, to an e-mail? :-)
The public key, yes, I am talking about the private one.
And how would you send the private one to several people who may be living in different parts of the world? BC -- Using openSUSE 12.1 x86_64 KDE on a system with- AMD FX 8-core 3.6/4.2GHz processor 16GB PC14900/1866MHz Quad Channel Corsair "Vengeance" RAM Gigabyte AMD3+ m/board; Gigabyte nVidia GTX550Ti 1GB DDR5 GPU -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 16/05/12 23:51, Basil Chupin wrote:
On 17/05/12 13:44, Cristian Rodríguez wrote:
El 16/05/12 23:35, Basil Chupin escribió:
And wouldn't you normally send this key as an attachment, say, to an e-mail? :-)
The public key, yes, I am talking about the private one.
And how would you send the private one to several people who may be living in different parts of the world?
you don't, that's whole purpose of public key cryptography, you share only the public one. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
you don't, that's whole purpose of public key cryptography, you share only the public one.
don't wanna sound simple and obvious but why not just use i2p if you need to ? it does have an easy (real easy) to use email service which you can even set up with pop3/imap or access through local web interface. not to mention real secure browsing of webpages and other data. and I really want to bring this up,specially since some(if not a lot) of opensuse developers might read this. i2p really needs your help and support. it is really good but needs more users to boost it's speed and attract more devs to work on it and improve it even more. I can't even find an rpm for it on the suse repos (from what little I searched a while back). but it is good and you can send and receive emails to other i2p users and to the public internet. it truly in my opinion is the most underrated anonymity software out there(kinda like how opensuse is the most underrated os out there) . also since the subject mentions p2p , i2p is very p2p friendly,it even comes with a torrent client to work with other i2p peers. I sincerely ask all of you to help the project out in whatever way you feel you can. with the backing of a major distro like suse,who knows ? maybe it could be the next tor(in popularity ) or even better. -Cheers Michael -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
Basil Chupin wrote:
And how would you send the private one to several people who may be living in different parts of the world?
You would never do that. You're supposed to keep the private key secret and share the public key. Someone sending you a message would use your public key to encrypt it and then you'd use your private key to decrypt it. That's the whole point of public key encryption, so that it's easy to share exchange keys, without requiring secure means to do so. With public key encryption there are 2 keys and one can decrypt what the other has encrypted. But either key cannot decrypt what it has encrypted. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 17/05/12 21:49, James Knott wrote:
Basil Chupin wrote:
And how would you send the private one to several people who may be living in different parts of the world?
You would never do that. You're supposed to keep the private key secret and share the public key. Someone sending you a message would use your public key to encrypt it and then you'd use your private key to decrypt it. That's the whole point of public key encryption, so that it's easy to share exchange keys, without requiring secure means to do so. With public key encryption there are 2 keys and one can decrypt what the other has encrypted. But either key cannot decrypt what it has encrypted.
Sounds reasonable, but..... if I send an e-mail encrypted with my secret private key and the person at the other end has the public key then surely if my message is intercepted by anyone who has that public key then it can be read by anyone who has that public key. The "interceptor" may not be able to read a response to my original post, only I can do that with my secret and private key, but they surely would be able to read whatever *I* post. No? :-) . (There has to be more to this than I have read so far........ just like my question about VirtualBox which seems to be understood on how it works by everyone except by me :-) .) BC -- Using openSUSE 12.1 x86_64 KDE 4.8.3 and kernel 3.3.6 on a system with- AMD FX 8-core 3.6/4.2GHz processor 16GB PC14900/1866MHz Quad Channel Corsair "Vengeance" RAM Gigabyte AMD3+ m/board; Gigabyte nVidia GTX550Ti 1GB DDR5 GPU -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 05/18/2012 03:13 PM, Basil Chupin wrote:
Sounds reasonable, but..... if I send an e-mail encrypted with my secret private key and the person at the other end has the public key then surely if my message is intercepted by anyone who has that public key then it can be read by anyone who has that public key. The "interceptor" may not be able to read a response to my original post, only I can do that with my secret and private key, but they surely would be able to read whatever *I* post. No? :-) .
You have it wrong.... If you want to send an encrypted message to someone you encrypt the message using *their* public key and they un-encrypt using their *private* key. You *sign* messages with your private key and the signature is checked with your public key.
(There has to be more to this than I have read so far........ just like my question about VirtualBox which seems to be understood on how it works by everyone except by me :-) .)
The details of public/private key encryption is interesting. in email.... When the text portion of a message is encrypted it is encrypted using a one time, two-way key (same key is used to encrypt and un-encrypt). Now, if you have 3 recipients that key is encrypted 3 times using the public keys for each of the recipients. They (their client) then un-encrypt the key and that key is then used to un-encrypt the message. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 18/05/12 17:28, Ed Greshko wrote:
On 05/18/2012 03:13 PM, Basil Chupin wrote:
Sounds reasonable, but..... if I send an e-mail encrypted with my secret private key and the person at the other end has the public key then surely if my message is intercepted by anyone who has that public key then it can be read by anyone who has that public key. The "interceptor" may not be able to read a response to my original post, only I can do that with my secret and private key, but they surely would be able to read whatever *I* post. No? :-) . You have it wrong....
If you want to send an encrypted message to someone you encrypt the message using *their* public key and they un-encrypt using their *private* key.
You *sign* messages with your private key and the signature is checked with your public key.
Aaah, now I understand. Thanks, Ed, for the clear description of how it works.
(There has to be more to this than I have read so far........ just like my question about VirtualBox which seems to be understood on how it works by everyone except by me :-) .) The details of public/private key encryption is interesting.
in email.... When the text portion of a message is encrypted it is encrypted using a one time, two-way key (same key is used to encrypt and un-encrypt).
At this point you lost me...... :-( ......
Now, if you have 3 recipients that key is encrypted 3 times using the public keys for each of the recipients. They (their client) then un-encrypt the key and that key is then used to un-encrypt the message.
....but what you said above is clear enough. Now I know all about how encryption works! :-) BC -- Using openSUSE 12.1 x86_64 KDE 4.8.3 and kernel 3.3.6 on a system with- AMD FX 8-core 3.6/4.2GHz processor 16GB PC14900/1866MHz Quad Channel Corsair "Vengeance" RAM Gigabyte AMD3+ m/board; Gigabyte nVidia GTX550Ti 1GB DDR5 GPU -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
And how would you send the private one to several people who may be living in different parts of the world?
You would never do that. You're supposed to keep the private key secret and share the public key. Someone sending you a message would use your public key to encrypt it and then you'd use your private key to decrypt it. That's the whole point of public key encryption, so that it's easy to share exchange keys, without requiring secure means to do so. With public key encryption there are 2 keys and one can decrypt what the other has encrypted. But either key cannot decrypt what it has encrypted.
Sounds reasonable, but..... if I send an e-mail encrypted with my secret private key and the person at the other end has the public key then surely if my message is intercepted by anyone who has that public key then it can be read by anyone who has that public key. The "interceptor" may not be able to read a response to my original post, only I can do that with my secret and private key, but they surely would be able to read whatever *I* post. No? :-) . When you send someone an encrypted email, you use their public key and
Basil Chupin wrote: they use their private key to decrypt. As I mentioned above, when they send you a message, they use your public key and you then use your private key. The private key is used to decrypt something that has been encrypted with the public key. The private key can also be used to create a digital signature that can be verified with the corresponding public key. So, if you want to exchange encrypted email with someone, you first have to exchange public keys and you don't care who sees them. You could even post them in public forums such as this. You never, ever exchange private keys. BTW, with the X.509 digital certificates, just signing an email was enough to send someone your public key. You'll often see PGP users attaching their public key to a message. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
Am 17.05.2012 02:02, schrieb Cristian Rodríguez:
El 16/05/12 08:37, Daniel Bauer escribió:
Even encrypted emails do not give you any privacy as long as there is at least one recipient who uses gmail, hotmail and so on, as the mails will be decrypted on these online accounts, analised, profiled...
No, as long as email providers do not have GPG/PGP support built into their web interfaces AND you give them your private key, then there is no way they can do that.
Of course that if you give them your private key..well. you got what you deserve :-P
Cheers.
I am not referring to an email-company decrypting your emails. But if you use an online service, like gemail, YOU will decript the incoming emails on your online account and then have the plain text version saved there. Or you write an email in plain text online, and decrypt it later to send it. And the decrypted version is always analised. The same happens on your big brother android phones: you receive an encrypted email, decrypt it on your phone and google will use it without saying thanks to you. So, as long as you decript encrypted emails in an online-account, it is well protected on its way, but not at the destination. Of course it is save to download an encrypted email and decrypt it on your own PC, as long as you are not using a browser, especially not chrome, to do so. I just believe that encrypting emails only makes sense if you use an offline email client that does not allow access to google, apple, microsoft or whoever... regards Daniel -- Daniel Bauer photographer Basel Barcelona professional photography: http://www.daniel-bauer.com personal facebook: http://www.facebook.com/mars.fotografo google+: https://plus.google.com/109534388657020287386 -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2012-05-17 13:36, Daniel Bauer wrote:
I am not referring to an email-company decrypting your emails. But if you use an online service, like gemail, YOU will decript the incoming emails on your online account and then have the plain text version saved there.
Impossible. I can not decrypt encrypted emails in the gmail viewer, they are not recognized. It doesn't even recognize PGP signatures, they are displayed as garbage. - -- Cheers / Saludos, Carlos E. R. (from 11.4 x86_64 "Celadon" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk+05MEACgkQIvFNjefEBxrivgCfY/t8LSNBM4f6GRSGwybnGft9 aBIAn3yrt/HA/86Nj/3QssqEzJQo+jsY =nC72 -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 5/17/12 6:45 AM, Carlos E. R. wrote:
On 2012-05-17 13:36, Daniel Bauer wrote:
I am not referring to an email-company decrypting your emails. But if you use an online service, like gemail, YOU will decript the incoming emails on your online account and then have the plain text version saved there.
Impossible. I can not decrypt encrypted emails in the gmail viewer, they are not recognized. It doesn't even recognize PGP signatures, they are displayed as garbage.
At some point there was an extension that would allow PGP usage in Gmail in Firefox. Even then the decryption was all client-side, all Gmail ever saw was the gibberish. I think Daniel may not be all that familiar with how PGP works for people using online services. You either use an external client, or manually decrypt it using GPG or other utilities. The only system around that does encryption on the server, that I know of, is hushmail. I would not trust hushmail for true security.
On Wed, 16 May 2012 20:10:37 +0800, George Olson wrote:
I looked up TOR. It does look interesting, and thanks for the link that shows that it is best not used through a torrent client. Although I wonder if the same applies to ktorrent. Do torrent clients by nature use UDP protocol?
They use both TCP and UDP for different purposes. But yes, the same would apply to ktorrent; ktorrent is a client (like Vuze/Azureus, uTorrent, etc). Bittorrent is a specific protocol that these clients use. The TOR project takes a very dim view on users using TOR for bittorrent traffic. I remember reading somewhere that they can (and have) kicked people off for doing so. Jim -- Jim Henderson Please keep on-topic replies on the list so everyone benefits -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 2012-05-17 03:03, Jim Henderson wrote:
The TOR project takes a very dim view on users using TOR for bittorrent traffic. I remember reading somewhere that they can (and have) kicked people off for doing so.
Quite so, because TOR traffic is transferred by peers to hide it, and p2p traffic is heavy for volunteers. - -- Cheers / Saludos, Carlos E. R. (from 11.4 x86_64 "Celadon" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk+0XLIACgkQIvFNjefEBxoyFwCg0wXgXN5zEF9L7UDe3fV+9csy qysAoK6pHxvPkYSSlj/ks5fBwgnVcR9P =oWw2 -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On Thu, 17 May 2012 04:04:34 +0200, Carlos E. R. wrote:
On 2012-05-17 03:03, Jim Henderson wrote:
The TOR project takes a very dim view on users using TOR for bittorrent traffic. I remember reading somewhere that they can (and have) kicked people off for doing so.
Quite so, because TOR traffic is transferred by peers to hide it, and p2p traffic is heavy for volunteers.
Well, that and the intention behind TOR is to help people in countries where freedom is restricted by the government and the government engages in heavy censorship - I think of places like Iran and Egypt when I think of "appropriate" places for TOR to be used. Using it to avoid being nicked for copyright infringement in first world countries - that doesn't seem to me like an appropriate use. Having to wait for the DVD/Blu-ray release of The Avengers isn't a human rights issue. Not being able to organize resistance against an oppressive regime? That's on a completely different level. Jim -- Jim Henderson Please keep on-topic replies on the list so everyone benefits -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 5/16/12 7:10 AM, George Olson wrote:
I looked up TOR. It does look interesting, and thanks for the link that shows that it is best not used through a torrent client. Although I wonder if the same applies to ktorrent. Do torrent clients by nature use UDP protocol?
As far as other anonymity, what about things like skype calls and email? Do those you TCP streams so that they can be protected by TOR?
Really your best bet is a VPN service, but you do have to pay for them most of the time. Many are located overseas in areas with better privacy laws and keep no logs, or a minimal amount of logs. There is a review of VPN providers based on privacy (not just P2P policies) at http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-... If it supports L2TP, PPTP, and especially OpenVPN, then it will work with Linux. L2TP and PPTP support is a little more finicky most of the time. Email should work via tor, but because it's insecure, whoever is running the exit node could read your email messages. Skype is encrypted, but performance over tor is probably unacceptable. Bittorrent over tor is not very kind, and many exit nodes block bittorrent as best they can because they are the ones that end up receiving the DMCA notices.
On Wed, May 16, 2012 at 6:14 PM, Steven Susbauer <steven@too1337.com> wrote:
On 5/16/12 7:10 AM, George Olson wrote:
I looked up TOR. It does look interesting, and thanks for the link that shows that it is best not used through a torrent client. Although I wonder if the same applies to ktorrent. Do torrent clients by nature use UDP protocol?
As far as other anonymity, what about things like skype calls and email? Do those you TCP streams so that they can be protected by TOR?
Really your best bet is a VPN service, but you do have to pay for them most of the time. Many are located overseas in areas with better privacy laws and keep no logs, or a minimal amount of logs. There is a review of VPN providers based on privacy (not just P2P policies) at http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-...
If it supports L2TP, PPTP, and especially OpenVPN, then it will work with Linux. L2TP and PPTP support is a little more finicky most of the time.
Email should work via tor, but because it's insecure, whoever is running the exit node could read your email messages. Skype is encrypted, but performance over tor is probably unacceptable. Bittorrent over tor is not very kind, and many exit nodes block bittorrent as best they can because they are the ones that end up receiving the DMCA notices.
I use a VPN service. They are very handy. Everthing I do too and from is shh, https or sftp. -- ____________ Apply appropriate technology. Use what works without prejudice. Steven L Hess ARS KC6KGE DM05gd22 Google Voice 661 769 6201 +SMS openSUSE Linux 12.1 KDE 4.7.2 Known and FlameBait and The Sock Puppet of Doom. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
George Olson wrote:
As we all know, there are plenty of legitimate uses of torrent files that don't involve piracy. I downloaded my opensuse distribution using ktorrent.
I have been reading about how to protect from having one's own computer logged with one of the anti-p2p groups and government monitoring. Whether or not one is downloading legitimate or copyrighted material, none of us like to be monitored.
In a google search, the protection software and services out there that I could find are for windows or mac based computers, except BT Guard, which is a pay service.
So I am wondering, what are opensuse users using to protect themselves from government monitoring and having their ip addresses logged? Is there another service like BT Guard which is not a pay service? What about a utility that blocks IP addresses from known anti-p2p groups, like peer guardian?
An AR-15 with half a dozen 30-round magazines. They can montor all they want, but any asshole who comes to take my computers away, with or without a badge, will be living his last moments on Earth. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
On 05/16/2012 08:22 PM, Dirk Gently wrote:
An AR-15 with half a dozen 30-round magazines.
They can montor all they want, but any asshole who comes to take my computers away, with or without a badge, will be living his last moments on Earth.
Now there is someone who should definitely like the ballistics calculator package I took time to package earlier this week :) [161k] http://www.3111skyline.com/dl/suse/sources/gebc-1.07-1.0.src.rpm You need libharu and fltk-devel installed to build it. S | Name | Type | Version | Arch | Repository --+---------+---------+-----------+--------+------------------ i | libharu | package | 2.2.1-1.0 | x86_64 | (System Packages) S | Name | Type | Version | Arch | Repository --+----------------------------+---------+------------+--------+----------- i | fltk-devel | package | 1.3.0-8.3 | x86_64 | games v | fltk-devel | package | 1.1.10-2.1 | x86_64 | openSUSE-11.4-11.4-0 -- David C. Rankin, J.D.,P.E. -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
participants (14)
-
Basil Chupin
-
Carlos E. R.
-
Cristian Rodríguez
-
Daniel Bauer
-
David C. Rankin
-
Dirk Gently
-
Ed Greshko
-
George Olson
-
James Knott
-
Jim Henderson
-
michael getachew
-
Per Jessen
-
Steven Hess
-
Steven Susbauer