This sounds like it could be a cool project. You might look into running
it all inside a virtual machine with Qemu or VMWare. Damn Small Linux or
Knoppix would probably be a good distro to run in the virtual machine.
Ringo
Aaron Lebahn wrote:
I am interested in taking up the challange of
I have found that when I disable javascript in Firefox, it automatically
gets enabled on restart. I'm not sure if this it because of TorButton,
but I wouldn't be surprised. On another note, I've heard that using both
NoScript and TorButton can be dangerous, but I don't know any specifics.
Ringo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey Torland,
I've got a question about the way Tor chooses circuits. Sometimes I use
Thunderbird to send mail via Tor (yeah, I know, DNS leaks) and I notice
some interesting behaviour.
It's my understanding that when Tor receives a request for a
I'd be interested in these materials as well. I've been giving workshops
on privacy/security for about a year now and Tor has been a fairly big
part of them. The workshop is available as a PDF at
http://www.olyhackbloc.org/presentation.zip
Ringo
pho...@rootme.org wrote:
On Tue, Mar 17, 2009 at
/presentation/encryptswap.sh or encryptswap_random.sh
Are these scripts available? These files arent in zip...
Interesting presentation. I will probably need another life to fulfill all
these tips :-).
Marek
On Tue, Mar 17, 2009 at 11:51 PM, Ringo Kamens 2600den...@gmail.com wrote:
I'd
As far as I know there's no buffer exploits publicly available for Tor
servers. If there were, the Tor team would patch it very quickly.
Running a firewall wouldn't hurt, just make sure you aren't interfering
with the traffic coming into or out of the Tor network.
Ringo
William Adams wrote:
I
If I remember correctly, it is calculated by percentile. All the servers
have their uptime monitored and the highest 50% get marked as stable.
Ringo
Hans de Hartog wrote:
Hi,
What are the criteria for a tor relay to be flagged as stable in the
Tor Status pages?
Thanks in advance,
Hans.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It absolutely would. Here are some things TorButton defends against that
wouldn't be covered in your scenario:
1. Unauthenticated Updates
2. CSS Tracking (I think it does anyways)
3. Flash and auto-opening of files
4. Browser referral and user-agent
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Don't feed the trolls people.
Michael G. Reed wrote:
On Tue, 10 Feb 2009 mark485ander...@eml.cc wrote:
| no need also to upgrade from 98se, except tor developers are too lazy to
| code properly.
You know, Tor is open sourceyou can go fix
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey Tor Users,
I teach a workshop on privacy and anonymity and I've gotten some
questions that I didn't know how to answer. Maybe somebody can answer a
few of these.
1. If I have multiple Firefox profiles, one of which is exclusively for
Tor use, if
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
pho...@rootme.org wrote:
On Fri, Dec 19, 2008 at 08:25:49PM -0600, onionrou...@gmail.com wrote 1.6K
bytes in 28 lines about:
: I'm a member of one of those local organizations that regularly presents
: information related to security, technology,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
6cnf6c...@sneakemail.com wrote:
Hi!
I want to provide basic free anonymous blogging services using Tor's hidden
services. Are there any tutorials for this, apart from the basic setup
information on Torproject.org? More specifically, how can I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
David Kammering wrote:
Matthew McCabe schrieb:
Here is where I need your help. First, is there a good way to filter
out torrents in my exit policy?
I tried out some different exit policies after getting a big load of
DMCA notices. My
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Luis Maceira wrote:
The combination Firefox-3.0.3(in fact,Iceweasel-3.0.3),Torbutton-1.2.0 leaks
my real IPaddress.This happens BETWEEN when I initiate Tor-0.2.0.31 with the
bash command /usr/local/tor/bin/tor and the moment when Tor effectively
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Alessandro Donnini wrote:
I sincerely hope you will be compensated. It would be a sign that Finnish
authorities, unlike those in most parts of the world recognize when they make
a
mistake, and accept responsibility for their actions.
M wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I have a quick question about how tor constructs circuits. Recently I
have started using Tor for my email (Thunderbird). IIRC the default exit
policy does not allow SMTP traffic. Let's say that I'm connected to Tor
server X for HTTP traffic. When I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Roger Dingledine wrote:
Hi folks,
Joel Reardon has finished his thesis at U Waterloo under the guidance
of Ian Goldberg. He looked at switching Tor's transport from TCP to
UDP. There are still many unsolved problems before we can do the switch,
I have heard of Javascript breaking Tor but that might be speculation.
Regardless, running Javascript while using Tor is dangerous. I would
suggest using a program like Pidgin
Ringo
On Fri, Sep 19, 2008 at 2:42 PM, Kyle Williams [EMAIL PROTECTED] wrote:
Yes, through Tor.
All communications
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Scott Bennett wrote:
On Mon, 18 Aug 2008 14:57:42 +0200 sigi [EMAIL PROTECTED] wrote:
On Mon, Aug 18, 2008 at 11:17:57AM +0200, Karsten N. wrote:
Ringo Kamens schrieb:
I'm working on a presentation where I teach people how to install Tor. I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'm working on a presentation where I teach people how to install Tor. I
have always heard it is best practice to use NoScript and TorButton, but
TorButton automatically hooks dangerous javascript. Is there any
reason to have noscript installed after
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Gitano wrote:
On 2008-08-05 my Tor-Server 'Gypsy' has been shut down by 'ovh.de' -
supposed due to massive violation of their standard form contracts.
No chance to get it back.
Sorry folks.
Thanks for keeping us updated. Let us know if
proxy,
so as long as it's TCP traffic, Tor will be able to forward it.
Comrade Ringo Kamens
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFIoNJTmBTzXUpNYqQRAmuFAJ0e4GBNELFlPy1EybQEP9FOx64jDQCfWwQJ
kXb74FVBVXDWVRC0Fxint/s=
=iQ+i
-END PGP SIGNATURE-
most of the time and I would be
happy to run these in the background to help Tor. If I find malicious
nodes do I post it to the list or is there some other place I send it?
What is the most recent version of Snakes on a Tor (I found .5)?
Solidarity,
Comrade Ringo Kamens
-BEGIN PGP SIGNATURE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
This looks really cool, thanks for all of your hard work!
Comrade Ringo Kamens
Domenik Bork wrote:
Hey list,
a few of you may know me from IRC, ohers may not. I'm one of this years
Google Summer of Code students. My project is about implementing
usage?
best wishes,
dawn
I would also be interested in something like this, as I've wondered the
same thing.
Comrade Ringo Kamens
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFIb437mBTzXUpNYqQRAtTPAJ4nrl4mfaD1X
that needed.
Comrade Ringo Kamens
[EMAIL PROTECTED] wrote:
Hi,
Sorry if this sounds a bit stupid but looking for some
clarification. I've read that using HTTPS over Tor actually reduces
your security due to the bypass of your local proxy (Privoxy, etc) -
is this the case for all usage or does
some hell over it. (And
let me know personally, I'd love to help)
Comrade Ringo Kamens
Binary Freedom Boston
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iD8DBQFIa9ijmBTzXUpNYqQRAnwGAKC+fv45npV5XSCm0MlDnysaMk97
This is awesome! I was just looking for something like this for a
wireless network I was setting up. Thanks for your hard work!
Comrade Ringo Kamens
On Tue, Jun 24, 2008 at 2:33 PM, Bernhard Fischer [EMAIL PROTECTED] wrote:
On Sunday 22 June 2008, Arjan wrote:
Installation is easy (but because
From my understanding of the networking model, tor could be
de-centralized if more people ran authoritative directory servers. ie
if every client was a server and every server was a directory...
Comrade Ringo Kamens
On Tue, Jun 17, 2008 at 2:34 AM, eugen gmail [EMAIL PROTECTED] wrote:
--- F
Here is information on how to get a more updated version by adding the
NoReply package repos:
https://wiki.torproject.org/noreply/TheOnionRouter/TorOnDebian
Comrade Ringo Kamens
On Mon, Jun 16, 2008 at 12:24 AM, Roger Dingledine [EMAIL PROTECTED] wrote:
On Sun, Jun 15, 2008 at 02:05:49PM -0700
Try connecting to the servers in the logfile, such as
http://86.59.21.38/ using a browser. Does it work?
Comrade Ringo Kamens
On Sun, Jun 15, 2008 at 5:05 PM, Luis Maceira [EMAIL PROTECTED] wrote:
Jun 15 16:22:23.376 [notice] Tor 0.1.2.17 opening log
file.
Jun 15 16:22:36.737 [notice] We now
That doesn't look like they're blocking. Have you tried connecting
through different HTTP proxies? Other versions of tor? Is the log mode
set on debug? Something more verbose could help.
Comrade Ringo Kamens
On Sun, Jun 15, 2008 at 9:19 PM, Luis Maceira [EMAIL PROTECTED] wrote:
signed-directory
Did this change after you upgraded KTorrent or something along those
lines? ie What changes could have caused it.
Comrade Ringo Kamens
On Sat, Jun 14, 2008 at 10:30 PM, sigi [EMAIL PROTECTED] wrote:
Hi all,
I always used ktorrent and tor with its option http-tracker-proxy set to
127.0.0.1
I don't know much about Ktorrent so I can't help you, but hopefully
somebody else can. If you're open to alternatives, you can try azereus
which does have an option to specify http proxying ; /
Comrade Ringo Kamens
On Sat, Jun 14, 2008 at 10:47 PM, sigi [EMAIL PROTECTED] wrote:
On Sat, Jun 14
appreciated,
Comrade Ringo Kamens
come it says it can't get any network status documents?
3. What next?
Any help is appreciated,
Comrade Ringo Kamens
On 5/7/08, Ringo Kamens [EMAIL PROTECTED] wrote:
I took a look at that document, and the only suggested options that seemed to
work were:
EnforceDistinctSubnets 0
Sorry to hear you have been targeted. Solidarity and support. If you need to
pay legal fees, we might be able to send you like fifty bucks if you can
give us an address or a paypal or something.
Comrade Ringo Kamens
Anarchist Black Cross of Northern Michigan
On Mon, Apr 28, 2008 at 2:14 PM, erwin
, if
you've sucessfully run Tor over a private network or have some experience in
it, any related advice is appreciated.
Thanks in advance,
Comrade Ringo Kamens
Cover traffic is very expensive. Have you ever thought of a spidering
program like YaCy?
Comrade Ringo Kamens
On Sat, Apr 12, 2008 at 9:51 PM, [EMAIL PROTECTED] wrote:
This is in regards to
https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ#GoogleSpyw
are
A while back, I found advice
I haven't tried compiling tor with the patch, but this appears to be very
useful, especially to people who just want to circumvent a filter or hide
their traffic from others on their wireless network.
Thanks for your work,
Comrade Ringo Kamens
On Mon, Apr 7, 2008 at 4:27 AM, robo mojo [EMAIL
Are you on Windows? Linux?
Comrade Ringo Kamens
On 3/9/08, TorOp [EMAIL PROTECTED] wrote:
I started up my Tor node just now and noticed some strange behavior.
First, the node CPU utilization went to and stayed at 100%. Second, the
bandwidth graph lines moved so fast that I could barely see
Thanks for that, I've been looking for something like this. If it isn't
there already, put it on the Tor wiki hosted on noreply.org
there are so many dawns which have yet to break,
Comrade Ringo Kamens
Armed Division, 35th Parallel
On Sun, Feb 24, 2008 at 4:11 AM, Noiano [EMAIL PROTECTED] wrote
I've used tor on 6.06 desktop and never experienced this, or at least I've
never had it get to the point where the impact on my machine was noticeable.
Hmm...
Comrade Ringo Kamens
On Sun, Feb 24, 2008 at 4:34 AM, Dietrich Schmidt
[EMAIL PROTECTED] wrote:
On my internet server, tor has a memory
Thanks for keeping us updated. If you ever need money for legal fees, a
support campaign, or anything like that: let me know. I can round up a lot
of assistance through BinaryFreedom and the Anarchist Black Cross.
Comrade Ringo Kamens
Armed Division, 35th Parallel
On Feb 20, 2008 11:22 AM, Tom
We are here to help if you need it.
Solidarity,
Comrade Ringo Kamens
Anarchist Black Cross Northern Michigan
On Jan 26, 2008 6:44 PM, maillist [EMAIL PROTECTED] wrote:
Hello
I'm not sure if my last email reached the list but just wanted to let
you know.
Tor exit-node SpongeBob was raided
Sorry, I didn't mean for it to sound like I was saying Konqueror was
insecure. I think it's an excellent browser for tor, it just requires more
advanced knowledge than others.
Comrade Ringo Kamens
On Jan 20, 2008 7:43 AM, [EMAIL PROTECTED] wrote:
Hi,
for anonymity konqueror is one of the best
don't
you just run it in a torjail?
Comrade Ringo Kamens
On Jan 19, 2008 6:47 PM, Ned Bun [EMAIL PROTECTED] wrote:
Hi Roger,
Thanks for the link info. I've visited dozens of the pages with
information on how to setup SOCKS in Firefox on Windows and Linux, but
nothing on Konqueror settings
This looks very cool. Can anybody with some experience go into how exactly
this works? Based on the site, it doesn't look like running it over tor
would add any extra security.
On Jan 19, 2008 7:38 PM, Michael Schmidt [EMAIL PROTECTED] wrote:
Hi please have a look at the http://offsystem.sf.net
One idea might to have a network raid drive that is shared by mirror servers
and acessible via tor.
Comrade Ringo Kamens
On Jan 14, 2008 11:45 AM, Vlad SATtva Miller [EMAIL PROTECTED] wrote:
Hi guys,
I'm currently working on the new project of tightly secured collabo-
rative/wiki environment
Couldn't you just make your node a middleman and ban tor from connecting to
your Internet One Connection?
Comrade Ringo Kamens
On Jan 9, 2008 12:40 PM, Nathaniel Fairfield [EMAIL PROTECTED] wrote:
F. Fox wrote:
Another thing: How would the PKI work over Internet2? AFAIK, Tor needs
Changing the IPs has the added benefit of helping users behind firewalls
that block tor.
Comrade Ringo Kamens
On Jan 7, 2008 5:26 PM, [EMAIL PROTECTED] wrote:
Hi,
If this or things like it continue people who see a need to block (or
otherwise treat differently) users from TOR will simply
Ok, so that problem solves the gmail problem but pretty much every spam
filter at least takes in the SORBS etc. databases as a factor. Thanks
though, I'll do that.
Comrade Ringo Kamens
On Jan 5, 2008 7:14 PM, KT [EMAIL PROTECTED] wrote:
On Jan 5, 2008 11:18 PM, Comrade Ringo Kamens [EMAIL
out on
top,
Comrade Ringo Kamens
On Jan 3, 2008 5:01 AM, accept no limits [EMAIL PROTECTED] wrote:
Hello everybody,
on the 1st of January 2008 the web server provider shinjiru (Malaysia)
kicked my exit node acceptnolimits (traffic about 10 GB per day)
because of abuse.
Before the contract
Also, see http://www.schneier.com/essay-198.html
And yeah, I was talking about the NSA key.
Comrade Ringo Kamens
On Jan 2, 2008 4:24 PM, Nick Mathewson [EMAIL PROTECTED] wrote:
On Wed, Jan 02, 2008 at 02:47:11PM -0600, Eugene Y. Vasserman wrote:
Thus spake Ringo Kamens on Sun, 23 Dec 2007
Thanks for the response. It sounds like torify and tsocks may not be the
best solution. Are there any other good *nix applications/workarounds that
people have been using?
Comrade Ringo Kamens
On Jan 2, 2008 4:52 PM, Nick Mathewson [EMAIL PROTECTED] wrote:
On Wed, Jan 02, 2008 at 04:41:32PM
A new vista service pack just upgraded to that backdoored random number
algorithm. Suit yourself in believing Microsoft.
Comade Ringo Kamens
On Jan 2, 2008 9:42 PM, Eugene Y. Vasserman [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Thus spake Ringo Kamens, on 1/2
If you're using tor for privacy and anonymity it's highly reccommended that
you don't use internet explorer.
Comrasde Ringo Kamens
On Dec 31, 2007 6:26 AM, [EMAIL PROTECTED] wrote:
On Mon, Dec 31, 2007 at 10:28:21AM +0100, Ben Stover wrote:
Is there something similar like Torbutton FF plugin
repositories still have this problem (for instance,
when I do an apt-get install tor it automatically installs torify and
tsocks)? Would you suggest using the patch?
Thanks
Comrade Ringo Kamens
Just so you know, gmail filtered this as spam.
Comrade Ringo Kamens
On Dec 27, 2007 10:16 PM, Kyle Williams [EMAIL PROTECTED] wrote:
Download at: http://www.janusvm.com/pub/Tor-UPNP.zip
Tor-UPNP is based on the PERL
I'd be interested in participating.
Comrade Ringo Kamens
On Dec 20, 2007 11:34 PM, Andrew Del Vecchio [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Speaking of the devil, I've actually thought about this an came up with
an entire system about a year or so ago, but I
Are you interested in starting a letter-writing campaign to encourage them
to change their decision?
Comrade Ringo Kamens
On Dec 16, 2007 11:51 AM, Gitano [EMAIL PROTECTED] wrote:
kazaam wrote:
could someone please drop a copy of the email or letter you received by
the 1blu Ag, in which
works.
Comrade Ringo Kamens
On Dec 16, 2007 4:54 PM, Ricky Fitz [EMAIL PROTECTED] wrote:
Am Sonntag, den 16.12.2007, 12:09 +0100 schrieb marcel:
(e.G. Überlassung an anonyme Dritte, abandonment for anonymous
thirds)
but maybe you just have to change your name, after they recognize
You can specify which exit node to use, but this makes you less anonymous
because tor can't randomize your circuits. The best way (AFAIK) is to block
all nodes except those in the particular country you want to use.
Comrade Ring Kamens
On Dec 2, 2007 5:22 PM, David Hill [EMAIL PROTECTED] wrote:
Thanks for continuing to fight for tor in Germany. You have all of our
support. Is there anything people outside Germany can do to help?
An injury to one is an injury to all,
Comrade Ringo Kamen
On Nov 14, 2007 10:43 AM, Mirko Thiesen [EMAIL PROTECTED] wrote:
Hm, so I send a letter with a faked
I pledge $10 if the fund starts. Please allow mail donations.
Hopefully others can also pledge.
Comrade Ringo Kamens
On Nov 14, 2007 7:41 PM, Alexander W. Janssen
[EMAIL PROTECTED] wrote:
Am Donnerstag, den 15.11.2007, 01:19 +0100 schrieb [EMAIL PROTECTED]:
[... Privacy Foundation ...]
Ich
It would certainly help if you could translate them and put them in
the wiki or contact the tor developers who can put it on the site.
Also, if you think he can help, it would help to contact Pei Hanru.
Comrade Ringo Kamens
On Nov 14, 2007 10:47 PM, yuxuan huang [EMAIL PROTECTED] wrote:
Hi
Can you try pining the DNS backup to see if you can reach it?
Comrade Ringo Kamens
On 10/29/07, algenon flower [EMAIL PROTECTED] wrote:
Hello TOR people, Yay! I did finally get server up, but all is not
completely good: Anyone interested please note log entries.Thanks for advice
and support
Thanks, this seems like a cool tool. I'll try it out.
Comrade Ringo Kamens
On 10/29/07, Csaba Kiraly [EMAIL PROTECTED] wrote:
Dear all,
My virtual machine based Tor framework is available at
http://minerva.netgroup.uniroma2.it/discreet/wiki/TorLabProject
It provides an easy way to set up
Thanks for the clarification. It's much easier to understand now.
Comrade Ringo Kamens
On 10/26/07, Nick 'Zaf' Clifford [EMAIL PROTECTED] wrote:
Nick 'Zaf' Clifford wrote:
Hey ya,
Just noticed one small problem with Tor + Firefox + IPv6.
I'm aware that Tor doesn't yet support IPv6, but I
It might help to make links to certain sites in this list topic so
that google will index them. For instance:
awxcnx dotde/tor-i2p-proxy-en.htm?JASDJHSDF.ONION
That way, google gets to them and can do all of the hard indexing leg
work. The wikis would be a good place to link to.
Comrade Ringo
It sounds like you haven't enabled port forwarding on your firewall.
Even if the ports are unblocked, the traffic might not go to the
server. You need to forward all traffic coming to the firewall on
ports 9001 and 9030 to your tor server.
Comrade Ringo Kamens
On 10/23/07, algenon flower [EMAIL
to their link pages.
Keep up the good work,
Comrade Ringo Kamens
On 9/17/07, John Galt [EMAIL PROTECTED] wrote:
I installed Tor for the first time in months and was disappointed
to see that the default hidden wiki is
dead. Well, at least it's not doing much.
If you'd like, you can direct folks to http
, but not sure about
Germany.
Comrade Ringo Kamens
On 9/16/07, Scott Bennett [EMAIL PROTECTED] wrote:
On Sun, 16 Sep 2007 12:08:27 +0200 Thomas Hluchnik
[EMAIL PROTECTED] wrote:
Am Sonntag, 16. September 2007 07:41 schrieb Martin Senftleben:
Hello,
Please get with the program
I'm using gmail which doesn't give me an option unless I'm using a pop3 client.
Comrade Ringo Kamens
On 9/16/07, Scott Bennett [EMAIL PROTECTED] wrote:
On Sun, 16 Sep 2007 09:06:25 -0400 Ringo Kamens [EMAIL PROTECTED]
still didn't get it:
I know they aren't directly related, but it could
this? They might be able to help.
Comrade Ringo Kamens
On 9/15/07, Alexander W. Janssen [EMAIL PROTECTED] wrote:
On 9/16/07, Ryan Wagner [EMAIL PROTECTED] wrote:
There's still the possibility that a server op is using their Tor node
as a scapegoat and really is doing bad things (I don't mean to imply
that harassing and attacking tor node operators is
not acceptable. Also, being able to mail in money would also be nice ;
)
Comrade Ringo Kamens
On 9/15/07, Alexander W. Janssen [EMAIL PROTECTED] wrote:
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
Is there any way that people can donate to help cover
My main criticism of pickaproxy is... why? Why do that when you can
program a tor controller to do exactly the same thing with a offline
database?
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
Why would
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run
in question connected to you 20 seconds before
the alleged connection was made, so that's who it probably was. This
should be all explained in the docs somewhere.
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:
I don't think you get
The best option is to run a squid server on localhost with a block by
country filter. Then, route your tor client through it.
Comrade Ringo Kamens
On 9/14/07, misc [EMAIL PROTECTED] wrote:
I'm using Tor on windows
I prefer to avoid tor nodes from certain countries. I know that I can
manually
Thanks for your hard work. We all appreciate it.
Comrade Ringo Kamens
On 8/19/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Hi,
just dropping a quick word to say I added a Tor Network Status interface
to Hermetix router.
The url is: http://tns.hermetix.org/
I'd appreciate it if other
@Mike: Good to know. I'll just use the etch version for now since
feisty isn't out.
Comrade Ringo Kamens
On 8/11/07, Florian Reitmeir [EMAIL PROTECTED] wrote:
On Fri, 10 Aug 2007, Kyle Williams wrote:
This is not true. The affects of the bug are very sever, and it DOES NOT
require
Respect and stay safe. You are a hero.
Comrade Ringo Kamens
On 8/11/07, Matthew [EMAIL PROTECTED] wrote:
I just put up a new hidden wiki. It's at http://624eb2rznzhtq2cz.onion/
With a little googling, I found a page that had the main page of the
old hidden wiki, so I put it up as the main
and wait out the storm until a new version is
released. Is the package maintainer busy or..?
Comrade Ringo Kamens
By debian linux are we talking about all major debian-based distros
(IE ubuntu and it's variants)? How about non-debian based Linux
distros such as red-hat based ones? Good news.
Comrade Ringo Kamens
On 8/10/07, Florian Reitmeir [EMAIL PROTECTED] wrote:
On Fri, 10 Aug 2007, Ringo Kamens wrote
if you're on the old version like me.
Comrade Ringo Kamens
On 8/10/07, Kyle Williams [EMAIL PROTECTED] wrote:
This is not true. The affects of the bug are very sever, and it DOES NOT
require the config to be saved! An attacker could still cause you to loose
your anonymity.
UPDATE, UPDATE, UPDATE
drive. Then you would have a
network raid array that ran over tor, so when a wiki edit was made it
was made to that raid array and everything would be updated, almost
instantly. Does anybody see any potential problems there?
Comrade Ringo Kamens
On 8/9/07, Josh McFarlane [EMAIL PROTECTED] wrote:
On 8
is a
distributed search engine and I think there's at least one active node
indexing tor. Is there any program like YaCy that would generate link
directories?
Comrade Ringo Kamens
On 8/9/07, Josh McFarlane [EMAIL PROTECTED] wrote:
On 8/9/07, Ringo Kamens [EMAIL PROTECTED] wrote:
The way we were
I think you can just compile torK and run it in gnome even though it's
based on KDE. Also, blossom provides a nice web interface.
Comrade Ringo Kamens
On 8/8/07, HF [EMAIL PROTECTED] wrote:
hey list,
is there any GUI for Tor (and privoxy?) available für GNOME?
something like Vidalia under OSX
I like the distributed private key idea. Each wiki copy would have a
separate email address so that if one server got compromised, the
operators could be informed and change the private key. My question
is: what would determine which server got chosen?
Comrade Ringo Kamens
On 8/8/07, Eduardo
Has anybody tried using the RPMs on ubuntu using Alien?
Comrade Ringo Kamens
On 8/8/07, Matt Edman [EMAIL PROTECTED] wrote:
On Wed, Aug 08, 2007 at 01:53:30PM -0400, Ringo Kamens wrote:
Last time I checked, it wasn't in the ubuntu repositories and it's a
bitch to compile and run because
Ringo Kamens
On 8/8/07, Eduardo Costa Lisboa [EMAIL PROTECTED] wrote:
On 8/8/07, Ringo Kamens [EMAIL PROTECTED] wrote:
I like the distributed private key idea. Each wiki copy would have a
separate email address so that if one server got compromised, the
operators could be informed and change
attacks much easier).
Perhaps a linux machine that has a network-raid volume with the other
servers (over tor) acting as sections of the RAID volume?
Comrade Ringo Kamens
On 8/8/07, Karsten Loesing [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I like
Well I think that just through system-backups, maintenance, restarting
etc. that the descriptor upload times would be fairly random anyways,
especially if a random-turn-off function was implemented.
Comrade Ringo Kamens
On 8/8/07, Robert Hogan [EMAIL PROTECTED] wrote:
On Wednesday 08 August 2007
.
Comrade Ringo Kamens
On 8/8/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Hello Karsten, Ringo and Eduardo,
Feel free to experiment, it's fun... But:
In my opinion it's MUCH easier to:
-have one well known hidden wiki
-have one or more well known backups of the hidden wiki, with the edit
It's not the issue of a great wall attack where a person can't
access a public wiki with onion links, it's an issue of whether that
wiki could even exist. You'd have to crazy to host that on a public
machine.
Comrade Ringo Kamens
On 8/8/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
If you use
censorship-resistant. So go forth.
Comrade Ringo Kamens
On 8/7/07, Frozen Flame [EMAIL PROTECTED] wrote:
Hello, guys. Is anyone interested on the return of the hidden wiki?
I've got a hidden service running idly for months, and with no chances of
going down so soon. The URL is http
I didn't think that exes were available for alpha releases. You can
always compile from source but in general alpha releases are less
secure and stable because the problems haven't been worked out yet.
Comrade Ringo Kamens
On 8/6/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Hello,
I see
You would need an external application in order to do that. Would you
be doing this on Windows or *Nix?
Comrade Ringo Kamens
On 8/5/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Thanks Comrade - so blocking connections from other countries...is
that something that is built into Tor or would I
is interested in this. Basically, you
have to use an IP-geo database to do this but even those aren't
foolproof. Looks like there might be some help available at
http://lists.netfilter.org/pipermail/netfilter/2004-September/056081.html
Good luck,
Comrade Ringo Kamens
On 8/5/07, [EMAIL PROTECTED
1 - 100 of 213 matches
Mail list logo