Hi everyone,
Willing to give aioe's tor NNTP service a try, I installed Vidalia 0.7
and tried to run it under Windows Millenium together with Thunderbird
and Torbutton, but my system was becoming sluggish and unresponsive. A
ctrl-alt-del returned a message telling that the ressources of my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello everyone,
The translated article is now online at:
http://www.anti1984.com/en/articles/8.html
And no, I translate articles myself and instead of using Google. ;)
Sincerely,
Enigma
- --
German Tor mailing list / surveillance and anonymity:
On Dec 2, 2006, at 4:28 AM, Stegozor wrote:
Then I removed Vidalia, tor and Privoxy (using their own uninstall
option from Start/Programs/app/uninstall menu) and installed the
latest Vidalia package. The problem is that when I launch Vidalia
now I get the following error message:
Tim Warren [EMAIL PROTECTED] said:
Maybe you could answer a question for me. Should I NOT login in to
a site, such as a bank, when using Tor? Or do I need to make sure
it is https:?
Appreciate any clarification.
Thanks,
I´ll put it this way, if you are registered as your real identity
Linux is very tor friendly. If you are a linux noob I suggest ubuntu. I
oppose the idea of a tor police force for several reasons:
1. Lie detectors don´t work
2. It is no better than the opressive governments tor tries to circumvent
3. It would take too much work.
I do appreciate the effort to
Ringo Kamens wrote:
Linux is very tor friendly. If you are a linux noob I suggest ubuntu. I
oppose the idea of a tor police force for several reasons:
1. Lie detectors don´t work
2. It is no better than the opressive governments tor tries to circumvent
3. It would take too much work.
I do
Here's a thought... I was contemplating the ramifications of, say an
exit node designed purely to log traffic directed through it. Assume
the most malicious intent here too. Listening to every frame that
comes out, you're bound to find something that leaks information. Has
anyone
On 1-Dec-06, at 5:29 PM, Robert Hogan wrote:
On Friday 01 December 2006 21:23, Seth David Schoen wrote:
Some people have suggested that this is a good application for
trusted computing; proxies could prove that they're running the
real, official proxy software on top of real hardware. Then
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
i had another questionable MITM attack today. fortunately, i was connecting to
my own server and was able to check the SSH logs. the connection came from
82.103.134.252/tor-proxy.thing2thing.com.
the interesting thing is: after waiting 2-3
9 matches
Mail list logo