On Tue, 17 Mar 2009 03:15:31 +0100 slush sl...@slush.cz wrote:
On Tue, Mar 17, 2009 at 2:11 AM, Scott Bennett benn...@cs.niu.edu wrote:
Wow. The differences in laws from one place to another makes it
difficult or impossible to recommend any single practice for tor users. In
the
On Tue, Mar 17, 2009 at 01:18:10AM +0100, slush wrote:
I dont want to close HTTP ports 8-), but next report of abusive traffic will
lead to shutting down Tor or whole VPS :-(. So is there any best practice,
what I should do now? DMCA response is probably not fitting to this issue...
See also
Am 17.03.2009 um 04:59 schrieb pho...@rootme.org:
In five years of running a node, I had my share of these too. From
abusive forum posts to stupid people trying to break into .mil
sites. I
probably had 1 abuse complaint for every 10 TB of traffic served
through
Not if the abuse caused
On Tue, Mar 17, 2009 at 03:30:43PM +0100, s...@anderson.de wrote 4.8K bytes in
92 lines about:
Not if the abuse caused 5TB of traffic. You are comparing the number of
events with the number of bytes.
The abuse was a web forum post or some ssh attempts. In nearly all
cases it was hundreds of
Am 17.03.2009 um 17:07 schrieb pho...@rootme.org:
something, but not for the general Internet connections. Since a
criminal
usually has a strong interest to hide something, I expect the
proportion
of criminal traffic to be quite high, especially in countries with a
stable freedom of
Eh, wrong mailbox :]. Marek
On Tue, Mar 17, 2009 at 9:41 PM, Marek Palatinus ma...@palatinus.cz wrote:
Thank you everybody. There were many good ideas. One of the worst solution
is to close next and next exit ports, because by this, Tor will be closed
network without bridges to Internet one
I gave a talk to a small group of people on Saturday at BarCampAustin:
http://www.barcamp.org/BarCampAustin4 I have also given this talk in
two of my graduate classes at St. Edward's University. These kinds of
informal talks are a great way to educate others about Internet
censorship,
Hello Matt,
Im interesting in your materials, because at this moment, Im working on
advocacy of Tor node on my university. So please send me a copy!
I think there are some materials about Tor advocacy, see
https://wiki.torproject.org/noreply/TheOnionRouter/TorGuideUniversities.
Merging all these
On Tue, Mar 17, 2009 at 09:57:31PM +0100, sl...@slush.cz wrote 3.5K bytes in 77
lines about:
: Im interesting in your materials, because at this moment, Im working on
: advocacy of Tor node on my university. So please send me a copy!
Tor's presskit may be good for talking about why anonymity and
On Tue, Mar 17, 2009 at 03:36:24PM -0500, mate...@mrmccabe.com wrote 0.9K bytes
in 18 lines about:
I gave a talk to a small group of people on Saturday at BarCampAustin:
http://www.barcamp.org/BarCampAustin4 I have also given this talk in
two of my graduate classes at St. Edward's
I'd be interested in these materials as well. I've been giving workshops
on privacy/security for about a year now and Tor has been a fairly big
part of them. The workshop is available as a PDF at
http://www.olyhackbloc.org/presentation.zip
Ringo
pho...@rootme.org wrote:
On Tue, Mar 17, 2009 at
Sudo /mnt/cdrom/presentation/encryptswap.sh or encryptswap_random.sh
Are these scripts available? These files arent in zip...
Interesting presentation. I will probably need another life to fulfill all
these tips :-).
Marek
On Tue, Mar 17, 2009 at 11:51 PM, Ringo Kamens 2600den...@gmail.com
You'll need to run them as root or using sudo.
Here's encryptswap.sh
swapoff /dev/sda2
dd if=/dev/urandom of=/dev/sda2 bs=1M
cryptoswap /dev/sda2 /dev/urandom
cipher=aes-cbc-essiv:sha256,size=256,hash=sha256,swap
echo /dev/mapper/cryptoswap none swap sw 0 0 /etc/fstab
and here's
13 matches
Mail list logo