You can also run VirtualBox with KVM as a backend.
You can also run VirtualBox with KVM as a backend.
Your relay is probably not working. From https://support.torproject.org/relay-operators/, Can I use IPv6 on my relay?:
Tor has partial support for IPv6 and we encourage every relay operator to enable IPv6 functionality in their torrc configuration files when IPv6 connectivity is available. For the time being Tor will require IPv4 addresses on relays, you can not run a Tor relay on a host with IPv6 addresses only.
This is possible, after all, legwork.i2p is based on YaCy. I’d recommend taking a look at the YaCy and Tor guide, and use it as a template. Where they create a Tor hidden service, create an I2P server tunnel, and where they proxy YaCy to Privoxy just proxy directly to I2P’s HTTP proxy.
The attack worked, the password is cmF0dGEK
.
This was obtained by generating 32 possible plaintexts for the first 10 bytes of system.zip (based on the different values in the headers of ~300 zip files on my system), plus three null bytes for the high bytes of compressed size, file name length and extra field length.
The inner zip files are just stored, uncompressed:
Archive: update.zip
Index Encryption Compression CRC32 Uncompressed Packed size Name
----- ---------- ----------- -------- ------------ ------------ ----------------
0 ZipCrypto Store d1bca061 65761967 65761979 system_lib.zip
1 ZipCrypto Deflate 64a3f383 2183 741 config.json
2 ZipCrypto Store 3731280f 89300292 89300304 app.zip
3 ZipCrypto Store a2bd64f5 135518964 135518976 app_lib.zip
4 ZipCrypto Store 700eb186 5996410 5996422 system.zip
So 12 bytes from the original content.
The entries in update.zip
are encrypted using the weak ZipCrypto scheme, which is known to be seriously flawed. If you feel motivated, and can guess at least 12 bytes of plaintext for an entry, it is possible to recover the internal state of the generator, which is enough to decipher the data entirely, as well as other entries which were encrypted with the same password. The bkcrack project implements this attack.
Since some of the entries are zip files themselves, it is within the realm of possibility to guess 12 bytes of plaintext. Parts of the zip local file header are pretty static, and you can use some of the values from the local file header of update.zip
itself. Still, this would require a bit of luck / inspired guesswork.
The insight is that c^2 + d^2
factors as (c + id)(c - id)
in the Gaussian integers, and shuffling factors in its square and multiplying gives both sides of the identity.
This is a special case of the Brahmagupta–Fibonacci identity.
According to the identity, (c^2 + d^2)^2 = (c^2 - d^2)^2 + (2cd)^2
which are the expressions you found for a
and b
(modulo sign)
Options:
torsocks
simply uses LD_PRELOAD, you could try to make this apply globally by adding the torsocks library to ld.so.preload. Just put the path returned by torsocks show
in /etc/ld.so.preload
.Either use the --proxy
option of yt-dlp, or use torsocks
to transparently torify any application.
Running nyx just shows some of the circuits (guard, middle, exit) but I seem to have no way of associating those circuits with fetchmail’s traffic. Anyone know how to track which exit node is used for various sessions?
In nyx
, on the first page, press e
and enable STREAM events. These have the following form:
[stream id] [status] [circuit id] [hostname/ip]:[port] ...
Find the correct stream based on hostname/ip, then you can cross-reference the [circuit id]
with the items on the Connections page.
singlelogin.re still worked for me recently.
This element is never generated as a candidate in the picker, probably a quirk of this specific site. I just looked at the DOM and saw this related element next to the dark mode button.
Also add acoup.blog
to your filters.
You can take the package from the Ubuntu PPA, which is generally updated quickly, and rebuild for Debian using the instructions here.
fn foo(x: i32) {
match x {
const { 3.pow(3) } => println!("three cubed"),
_ => {}
}
}
But it looks like inline_const_pat
is still unstable, only inline_const
in expression position is now stabilized.
It’s because it has to work in pattern contexts as well, which are not expressions.
It’s used to check for website breaches. From How to stop Firefox from making automatic connections:
Firefox Monitor warns you if your online accounts were involved in a known data breach. For more information, see Firefox Password Manager - Alerts for breached websites.
To get the latest login breach information and more, Firefox connects to firefox.settings.services.mozilla.com
To disable, see here.