Displaying 6 results from an estimated 6 matches for "deanonymize".
Did you mean:
anonymize
2012 Jan 20
2
Regarding Pubkey Enumeration
HD Moore from MetaSploit has noted that, given a pubkey (and not the
corresponding private key, as might be found in authorized_keys), he can
determine if he'd be able to log into an account.
It's a small thing, but he's using it for very interesting
recon/deanonymization. He'll be releasing a paper shortly, not overplaying
the characteristic, but certainly showing it can be used
2016 Mar 11
2
Re: [virt-tools-list] [libvirt] Usability Enhancement: Import/Export VMs GUI
...tion
properties of virtualizaiton for security.
The setup is made up of two VMs a "Gateway" that runs Tor and which all
traffic from an untrusted "Workstation" VM is forced thru it. The idea
is that even if an attacker successfully roots the Workstation VM they
still cannot deanonymize a user or infect the host. Its a fantastic
project. You should try it and maybe even hack on it with us ;)
Running on a secure and libre stack like KVM and Libvirt is awesome and
wins half the battle. The rest of the way is about making the setup as
easy as possible to expand the user base and...
2016 Mar 14
0
Re: [virt-tools-list] [libvirt] Usability Enhancement: Import/Export VMs GUI
...of virtualizaiton for security.
>
>The setup is made up of two VMs a "Gateway" that runs Tor and which all
>traffic from an untrusted "Workstation" VM is forced thru it. The idea
>is that even if an attacker successfully roots the Workstation VM they
>still cannot deanonymize a user or infect the host. Its a fantastic
>project. You should try it and maybe even hack on it with us ;)
>
>Running on a secure and libre stack like KVM and Libvirt is awesome and
>wins half the battle. The rest of the way is about making the setup as
>easy as possible to expand t...
2023 Sep 07
1
Privacy improving suggestions for ObscureKeystrokeTiming
...e clearnet
> could potentially link future ones of the same host even if routed through an
> anonymity network like Tor.
>
> Advanced attacks where attackers run loads on onion services that influence
> CPU activity and clock skew in predictable ways [2] may be possibly used to
> deanonymize them.
>
> We would suggest drawing the padding packet intervals from some other
> distribution instead of firing these off on a fixed timer. Basically, do what
> kloak does but at the network layer.
Yeah, making the intervals a bit uncertain seems like a reasonable idea.
This gives th...
2016 Mar 10
3
Re: [libvirt] Usability Enhancement: Import/Export VMs GUI
On Fri, Mar 04, 2016 at 04:23:18PM +0000, bancfc@openmailbox.org wrote:
>The single most important usability feature missed by our less technical
>users who migrate from VirtualBox is a one click import/export of VMs
>and their config settings.
>
>I was optimistic about the Gnome Boxes effort on Govf lib but
>unfortunately it was never realized and I would hesitate to recommend
2012 Aug 03
0
Binary Quadratic Opt
Hi Bert,
I won't post any more messages on this thread as problem has shifted from Optimization in R to Graph Algorithms.
Rest fine
Khris.
On Aug 2, 2012, at 9:13 PM, Bert Gunter [via R] wrote:
> This discussion needs to be taken off (this) list, as it appears to
> have nothing to do with R.
>
> -- Bert
>
> On Thu, Aug 2, 2012 at 2:27 AM, khris <[hidden email]>