On Mon, 2011-02-14 at 14:41 +0100, morphium wrote:
So, with everything said, could we now please Un-BadExit the nodes
that were affected?
Sorry, but this has been a long thread and I want to try to make sure I
understand something important.
Is it true or false that traffic was actually
On Mon, 2011-02-14 at 17:41 +, John Case wrote:
On Mon, 14 Feb 2011, Ted Smith wrote:
Sorry, but this has been a long thread and I want to try to make
sure I
understand something important.
Is it true or false that traffic was actually exiting through
gatereloaded et all?
I
On Tue, 2011-01-04 at 08:02 -0500, Praedor Atrebates wrote:
For something like skype or paying for ANYTHING via credit card/paypal or the
like, your anonymity is lost upon making payment so having to pay online
outside the tor network cannot be a privacy/anonymity violation.
I would
On Wed, 2010-12-15 at 09:38 -0500, . wrote:
On 12/15/2010 09:29 AM, Runa A. Sandvik wrote:
On Wed, Dec 15, 2010 at 2:11 PM, . pe...@aleksandrsolzhenitsyn.net wrote:
On 12/15/2010 08:46 AM, Runa A. Sandvik wrote:
On Wed, Dec 15, 2010 at 1:10 PM, . pe...@aleksandrsolzhenitsyn.net wrote:
On Thu, 2010-12-09 at 19:02 +0100, m...@kairaven.de wrote:
Hi,
i have/had problems with Tor 0.2.2.19-alpha and 0.2.1.27 (recompiled) after
the last openssl update under Ubuntu Maverick according Ubuntu Security
Notice USN-1029-1, December 08, 2010, openssl vulnerabilities, CVE-2008-7270,
On Sat, 2010-10-16 at 03:54 -0700, Mike Perry wrote:
Thus spake Eugen Leitl (eu...@leitl.org):
On Fri, Oct 15, 2010 at 02:44:59PM -0700, Mike Perry wrote:
Thus spake Eugen Leitl (eu...@leitl.org):
https://www.privacy-cd.org/index.php?option=com_contentview=articleid=66Itemid=89
On Tue, 2010-10-12 at 16:01 +0100, Matthew wrote:
If an individual is using Tor, Polipo, Torbutton, NoScript, and
BetterPrivacy then why is a VM needed?
How can VMs improve one's Tor experience?
Presume you are being pursued by the Illuminati, because you alone have
knowledge of the Holder
On Thu, 2010-10-07 at 21:26 -0700, Robert Ransom wrote:
On Thu, 7 Oct 2010 23:58:28 -0400
grarpamp grarp...@gmail.com wrote:
a free VPN
There are VPN providers that will let you pay anonymously.
Among others, I would be interested in reading posts
containing lists of VPN providers
On Wed, 2010-09-29 at 07:46 +, M wrote:
Hello agan,
whats a good program for mac equivalent to XP pidgin? I'm looking for
safe Tor configuration as well as encrypted chat.
Adium.
Is Adium safe to use with TOR? Also, does the encryption in it only
work when chatting to others using
On Sun, 2010-08-15 at 17:40 +0200, Michael Scheinost wrote:
2. Why is it offering HTTP
If duckduckgo.com really cares for the anonymity and privacy of its
users, why do they offer unencrypted HTTP?
Even if tor users are encouraged to use HTTPS, some of them will
forget
doing so.
There's no
On Sat, 2010-08-14 at 13:01 +0200, Michael Scheinost wrote:
Hi Eugen,
I'm wondering why you posted this without any comment.
On 08/13/2010 06:32 PM, Eugen Leitl wrote:
DuckDuckGo now operates one of these relays, and more importantly an exit
enclave for DDG search engine traffic.
As
On Sun, 2010-06-27 at 19:36 -0700, Mike Perry wrote:
(Though I suspect the SWIP will also help greatly. I am beginning to
believe that these abuse-bot companies deliberately pick on new
hosters who do not have their own IP allocation specified to bully
them off the net).
As in, MediaSentry
On Tue, 2010-05-25 at 01:45 -0500, Scott Bennett wrote:
I don't know who Censorship Research Center might be, but they claim
to have a development project going for another encrypted proxy service.
However, they say it will be free software, but *not* be open source, so no
one can examine what
On Tue, 2010-05-25 at 20:28 +0200, Olaf Selke wrote:
Ted Smith schrieb:
I wonder if they'll sign the binary blobs they distribute; it would be
very easy for the police in any country to distribute their own
backdoored version (via sneakernet) and just arrest everyone who uses
it.
I
On Tue, 2010-05-25 at 14:36 -0500, Scott Bennett wrote:
On Tue, 25 May 2010 13:33:23 -0400 Ted Smith ted...@gmail.com
wrote:
On Tue, 2010-05-25 at 01:45 -0500, Scott Bennett wrote:
I don't know who Censorship Research Center might be, but they claim
to have a development project going
On Thu, 2010-02-25 at 13:41 -0500, 7v5w7go9ub0o wrote:
On 02/24/10 23:16, Ted Smith wrote:
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote:
[]
Perhaps mention the benefits of TPM chips (on 'ix, they can be
configured to benefit the user, not some record company)?
Yup. Check out
On Wed, 2010-02-24 at 11:56 -0500, 7v5w7go9ub0o wrote:
On 02/24/10 00:10, Ringo wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
One update that should be noted is that this doesn't protect against
bad nanny attacks. With full disk encryption, the boot partition isn't
encrypted
On Fri, 2010-02-19 at 17:32 -0800, coderman wrote:
On Fri, Feb 19, 2010 at 4:22 PM, wuiv yccwg wuivyc...@googlemail.com wrote:
...
Basically, I am after some feedback and maybe a wish list or
suggestions. What Tor community would like to see in such kind of
service provider?
Tor is a
On Thu, 2010-02-18 at 01:15 -0500, Roger Dingledine wrote:
http://blog.freenode.net/2010/01/connecting-to-freenode-using-tor-sasl/
It looks like the freenode irc channel is trying a new approach for
handling its Tor users. (This is great, since for a long time it looked
like they were
On Thu, 2010-01-14 at 15:55 -0800, coderman wrote:
Google funding/developing large scale decentralized anonymity and
circumvention technologies would be a welcome retort against the
coming constraints in .cn and elsewhere.
Let's not forget that as far as Google is concerned, if we have
On Thu, 2010-01-14 at 18:26 -0600, Programmer In Training wrote:
On 1/14/2010 6:03 PM, Ted Smith wrote:
On Thu, 2010-01-14 at 15:55 -0800, coderman wrote:
Google funding/developing large scale decentralized anonymity and
circumvention technologies would be a welcome retort against
On Sun, 2009-12-27 at 17:24 +0530, arshad wrote:
On Sun, 2009-12-27 at 12:48 +0100, Nils Vogels wrote:
On Sun, Dec 27, 2009 at 12:26, arshad arsha...@gmail.com wrote:
i want the traffic be encrypted as well?
any workarounds?
Traffic within TOR itself is encrypted as part of the
On Sat, 2009-12-26 at 17:23 -0600, Programmer In Training wrote:
On 12/26/2009 5:13 PM, Seth David Schoen wrote:
Arshad writes:
thank you very much. then if the user uses tor for his all browsing
purposes, from the isp end how does they see this? shouldnt they know
which sites the user
On Wed, 2009-12-23 at 23:19 -0600, Programmer In Training wrote:
I get
an error saying that Tor is not an HTTP transport proxy or some such
(I
forget the exact message, this happened hours ago).
This comes from a program using Tor as an HTTP proxy. It presents itself
as a SOCKS proxy. If
On Thu, 2009-12-03 at 17:04 -0500, Erilenz wrote:
Google launched a free recursive DNS resolver service today:
http://googleblog.blogspot.com/2009/12/introducing-google-public-dns.html
It doesn't hijack NXDOMAIN or do any other sort of filtering. Just
thought I would mention it as the
On Wed, 2009-11-25 at 02:51 +0300, James Brown wrote:
In the context of the above information concerning the ban of Tor's
nodes by the LJ (and in other such cases) I have an idea to provide in
the Tor net for non-public exit-notes.
This solution will be very, very useful for residents of the
On Tue, 2009-11-24 at 19:49 -0500, Roger Dingledine wrote:
See especially point #1: even if we didn't tell clients about the
list of
relays directly, somebody could still make a lot of connections
through
Tor to a test site and build a list of the addresses they see.
I guess we could
On Tue, 2009-11-17 at 13:48 +0100, Marco Bonetti wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Erilenz wrote:
One thing you absolutely don't want to do is use a Hidden Service for
your VPN as that doubles the number of hops in the circuit.
but it raises the coolness of the whole
On Thu, 2009-10-22 at 10:23 +0400, jackwssp q wrote:
I try with trial version of kaspersky, and nothing to fear. it's looks
like just a warning about danger program.
Are you saying that the anti-virus program warns that tor is a
dangerous program?
signature.asc
Description: This is a
On Fri, 2009-09-18 at 04:25 -0400, grarpamp wrote:
Nodes usually have a max bandwitch set.
Nodes often comsume less than this.
All node to node traffic is encrypted.
Perhaps implement a random stream generator
that only runs when it or its chosen path has
free bandwidth, tags its traffic as
On Thu, 2009-09-17 at 15:59 -0400, Brian Mearns wrote:
Could you explain what psyops refers to? Psychological operations? If
I understand correctly, you're suggesting that perhaps he/his
organization doesn't really have all the capabilities he implies, but
that they're trying to scare people
On Wed, 2009-09-16 at 17:01 -0400, Rich Jones wrote:
http://www.reddit.com/r/IAmA/comments/9kwph/i_am_a_guy_who_writes_covert_software_that_runs/
Thoughts?
also, I realized that two of the posts I've made this this list have
now been reddit-related. Sorry about that. But I'd really like to
On Thu, 2009-09-10 at 20:42 -0300, Thiago PC wrote:
Hi everybody. First of all, sorry if it has already been explained,
I'm new here.
I would like to know how to change the circuit that Tor is using (like
the option Use a New Identity at Vidalia control panel). But I want
to make this only
There's a lot of FUD thrown around about how you need balls of steel to
operate a Tor exit node, but I've ever only seen this one account. Are
there any other accounts, or better yet, any actual numbers as to what
percentage of tor node operators face significant legal harassment (not
misplaced
On Wed, 2009-09-02 at 09:41 +0200, ide...@riseup.net wrote:
Quoting Ted Smith ted...@gmail.com:
I'm sorry if I was unclear. I meant my statement as a question, namely:
If we are not to use GMail, what mail service should we instead use?
aktivix.org antifa.net autistici.org boum.org
On Wed, 2009-09-02 at 14:55 -0400, grarpamp wrote:
you can be absolutely certain that all your comms will be recorded/stored
That's why there are things like VPN, IMAP/POP over SSL and StartTLS.
Which only covers your transit to them. All your mail
between providers is still wide open.
On Tue, 2009-09-01 at 16:20 +0200, Folkert van Heusden wrote:
So; what should we do? Dis-allow hidden services in Tor? Or block Tor
totally?
Banning Tor will have no effect on botnets, as others on this list have
pointed out. We should ban Windows, instead.
signature.asc
Description: This is
On Tue, 2009-09-01 at 22:43 -0400, DM wrote:
On Sep 1, 2009, at 10:36 PM, grarpamp wrote:
I've had the same experience. A $10 pay as you go phone
$10? Really? Which one and where? I see $20++ current models often,
and some $15 tmo nokia 1208's still on clearance.
works wonders for
On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote:
Hi,
I am not sure if this was on this list, but it is an interesting
information:
http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
it seems cookies could be respawned...
And there is a plugin to remove
On Thu, 2009-08-20 at 09:54 -0400, Praedor Atrebates wrote:
On Thursday 20 August 2009 09:36:40 am Ted Smith wrote:
On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote:
Hi,
I am not sure if this was on this list, but it is an interesting
information:
http://www.wired.com
On Thu, 2009-08-20 at 10:28 -0400, Andrew Lewman wrote:
On 08/20/2009 10:09 AM, Ted Smith wrote:
You don't lose most functionality by using free software.
Not picking on Ted, but this whole thread is off-topic.
Wait, what? The discussion of persistent, hidden, plugin-based storage
is off
I'm on the list, Scott, you don't need send the message twice.
On Tue, 2009-08-11 at 01:43 -0500, Scott Bennett wrote:
On Tue, 11 Aug 2009 01:10:41 -0400 Ted Smith ted...@gmail.com
wrote:
On Mon, 2009-08-10 at 23:55 -0500, Scott Bennett wrote:
On Mon, 10 Aug 2009 15:33:10 -0400 Ted Smith
On Tue, 2009-08-11 at 12:38 +0200, Niels Elgaard Larsen wrote:
Scott Bennett wrote:
On Tue, 11 Aug 2009 01:10:41 -0400 Ted Smith ted...@gmail.com
wrote:
You're conveniently ignoring countries like Sweden, Iceland, Estonia,
where socialist Internet policies have resulted in some
On Mon, 2009-08-10 at 13:39 -0500, Scott Bennett wrote:
Verizon residential service is only available at my location if I also
buy their telephone service, the combination of which would cost ~
$80/mo. and
also require a 12-month contract. I have yet to get the details on
Verizon
On Mon, 2009-08-10 at 12:28 -0700, Martin Fick wrote:
If they couldn't do this, to stay competitive, they
would charge more money for everyone and you would
suffer more. Cheap internet access and serving is
not some inherent human right, so let's not complain
about the price of gas here.
On Mon, 2009-08-10 at 13:22 -0700, Martin Fick wrote:
A right is something someone should not be able to
prevent you from doing, not something that should be
provided to you. I believe that you have the right
to be a space tourist if you want to be, but, of
course, that does not imply
On Mon, 2009-08-10 at 23:55 -0500, Scott Bennett wrote:
On Mon, 10 Aug 2009 15:33:10 -0400 Ted Smith ted...@gmail.com
wrote:
On Mon, 2009-08-10 at 12:28 -0700, Martin Fick wrote:
If they couldn't do this, to stay competitive, they=20
would charge more money for everyone and you would=20
On Tue, 2009-08-04 at 08:49 +0200, Matej Kovacic wrote:
Hi,
I added APT line for Ubuntu Jaunty Tor installation:
http://mirror.noreply.org/pub/tor jaunty
I also added GPG key of Peter Palfrader (key ID=94C09C7F).
However, I got this error:
W: GPG error: http://mirror.noreply.org
On Tue, 2009-08-04 at 16:24 +0200, gabrix wrote:
Ted Smith ha scritto:
On Tue, 2009-08-04 at 08:49 +0200, Matej Kovacic wrote:
Hi,
I added APT line for Ubuntu Jaunty Tor installation:
http://mirror.noreply.org/pub/tor jaunty
I also added GPG key of Peter Palfrader (key ID=94C09C7F
On Sun, 2009-06-28 at 11:19 -0700, Chris Humphry wrote:
I might be confused but
I thought you were writing this for standard
Linux installation? Do you mean I can use Ubuntu as the Linux OS?
(re: My goal is to make a standard Linux-Apache-MySQL-PHP installation)
Thanks for your time
You can't contact them. They come to you after you run a high-bandwidth
exit node for a few months or more, depending on your uptime and
security profile. ;-)
On Tue, 2009-06-23 at 10:17 -0400, krishna e bera wrote:
Could someone post the contact addresses for cashing in?
And perhaps some proof
On Thu, 2009-06-18 at 11:06 +0200, marcel wrote:
Ted Smith schrub in 1245290677.7339.8.ca...@stormbringer:
It would probably be best to email it to a trusted Iranian organization
or group, using OpenPGP encryption. They can disseminate it from there.
which would be…?
I wouldn't know. I'm
On Wed, 2009-06-17 at 18:26 -0700, Chris Humphry wrote:
Hi,
I have been mounting a little movement to get people to run Tor and
setup Tor Bridges to help those in Iran access the Internet.
Then I found a great message which has been going around asking people
to run Tor Bridges. So I
On Wed, 2009-06-17 at 22:11 -0400, Roger Dingledine wrote:
On Wed, Jun 17, 2009 at 06:26:43PM -0700, Chris Humphry wrote:
Please help...without proxies (ie. Bridges) the Iranian dissidents have no
voice!
Yeah, see, I'm not sure whether this is true. If ordinary bridges are
working, then
On Sat, 2009-06-13 at 10:07 +0200, Max wrote:
Tor 2 is out: www.bitblinder.com
it is faster. why? everyone is an exitnode or forwarder.
That will cause the network to stay at a very low level of popularity
because ordinary users will be continually harassed because of malicious
uses of the
On Sat, 2009-06-13 at 13:48 -0600, Jon wrote:
grarpamp wrote:
One person's legit is another's bogus. It's always been that way.
Other than routing, the use of the internet is partly chaos and
it's not changing any time soon. Packets found on an internet,
they exist, therefore they are,
On Sat, 2009-06-13 at 22:24 +0200, sigi wrote:
On Thu, Jun 11, 2009 at 03:19:31PM -0500, Scott Bennett wrote:
On Thu, 11 Jun 2009 21:23:33 +0200 Johannes Nitsche nitsc...@rambler.ru
top-posted (please learn not to do that):
broken thread (please learn not to do that - again and again)
On Thu, 2009-06-04 at 13:28 -0400, Praedor Atrebates wrote:
I have just built and installed tor-0.2.1.15-rc in replacement for my
previous
0.2.0.34 version.
Nothing has changed from before this upgrade, not the location or entries in
my torrc, not the perms on tor, not the perms on
On Sat, 2009-05-16 at 10:05 +0200, Noiano wrote:
cha...@gmail.com wrote:
Hello,
Is anyone know where find an how to use TOR against HADOPI ?
(Hadopi is the new law in france about P2P: if you download some music
or movie with a P2P system, the provider will send you a mail to say
On Tue, 2009-04-28 at 03:01 -0700, Tripple Moon wrote:
--- On Tue, 4/28/09, Scott Bennett benn...@cs.niu.edu wrote:
From: Scott Bennett benn...@cs.niu.edu Subject: Re: 25 tbreg
relays in directory To: or-talk@freehaven.net Date: Tuesday, April
28, 2009, 12:57 AM [cut for clarity]
On Sun, 2009-04-19 at 23:07 +0200, Gab wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
What about tor hidden free secure shells ?
If you mean over hidden services, that won't involve a Tor exit, so it
won't show up in these statistics.
signature.asc
Description: This is a
On Fri, 2009-03-27 at 16:38 -0700, Kyle Williams wrote:
On Fri, Mar 27, 2009 at 3:41 PM, Roger Dingledine a...@mit.edu
wrote:
In any case, we still have a ways to go before all the law
enforcement
in the world understands Tor and Internet security in
On Tue, 2009-03-24 at 22:25 -0400, krishna e bera wrote:
i wrote:
However, javascript is not required for either Torbutton or
Tor Browser Bundle functionality, so you can turn javascript off
for additional security.
Ack! For some reason i thought Torbutton was implemented purely in
On Fri, 2009-02-20 at 11:24 -0400, Freemor wrote:
On Fri, 20 Feb 2009 15:36:12 +0100 (CET)
Marco Bonetti marco.bone...@slackware.it wrote:
On Fri, February 20, 2009 15:02, Freemor wrote:
As you can see at
http://jonas.nitro.dk/bittorrent/bittorrent-rfc.html#anchor18 the ip
field
On Mon, 2009-02-16 at 10:03 -0500, Fran Litterio wrote:
On Mon, Feb 16, 2009 at 12:34 AM, Ted Smith ted...@gmail.com wrote:
Is there any way to send an error message back to BT clients
telling
them how to properly combine bittorrent with Tor
This implies
On Sun, 2009-02-15 at 21:46 -0700, Jon wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Drake Wilson wrote:
Quoth Jon scr...@datascreamer.com, on 2009-02-15 20:13:37 -0700:
Have we thought of engaging the bittorrent community on blocking the
tor nodes themselves. This would disrupt
On Tue, 2009-02-10 at 19:02 -0400, Freemor wrote:
On Tue, 10 Feb 2009 15:50:27 -0500
Roger Dingledine a...@mit.edu wrote:
(You need Torbutton 1.2 on Firefox to
have any chance of safe browsing.)
I know that his is a bit off topic so apologies in advance,
By the above are you saying
On Tue, 2009-02-10 at 18:17 -0500, Ringo Kamens wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It absolutely would. Here are some things TorButton defends against that
wouldn't be covered in your scenario:
1. Unauthenticated Updates
2. CSS Tracking (I think it does anyways)
3.
On Tue, 2009-02-10 at 16:51 -0700, mark485ander...@eml.cc wrote:
Maybe not many users because Tor's last two versions are buggy and don't
allow them to use it? Still plenty of 98se users out there and I have 3
browsers now that can use tor safely. course they will not work on .33
and .34
On Tue, 2009-02-10 at 22:26 -0500, Nick Mathewson wrote:
On Tue, Feb 10, 2009 at 06:24:27PM -0500, Ted Smith wrote:
On Tue, 2009-02-10 at 18:17 -0500, Ringo Kamens wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It absolutely would. Here are some things TorButton defends
On Thu, 2009-02-05 at 22:03 +0100, Mitar wrote:
But on the other hand I am seeing many e-mails like I would like to
contribute to Tor but my ISP/university/mom does not allow me/has
blocked me/does not want to hassle. So maybe those could cooperate in
a way of putting together such nodes.
On Fri, 2009-02-06 at 00:29 +0100, Mitar wrote:
Hi!
On Thu, Feb 5, 2009 at 11:19 PM, Ted Smith ted...@gmail.com wrote:
TorProject has a paypal donations account that people (like those people
who cannot run a node, but wish to contribute) can send donations to.
Those donations, in turn
On Fri, 2009-02-06 at 02:07 +0100, Mitar wrote:
Hi!
On Fri, Feb 6, 2009 at 1:11 AM, Ted Smith ted...@gmail.com wrote:
Why put one node online when you could put hundreds online, by creating
enough incentive to balance the potential risk of ISP complaints?
I do not see those two ideas
On Sat, 2009-01-17 at 14:10 +0300, ivvmm wrote:
Roger Dingledine wrote:
But that said, you probably won't see much traffic on your ORPort
either, yet, since you're a bridge. At this point, bridges are a future
step on the blocking resistance arms race:
On Fri, 2009-01-02 at 11:43 -0500, Erik Heidt wrote:
Tor Gurus -
So, I have just started running a Tor Relay. Currently I am in
operating in bridge mode, with a exit policy that rejects all. I
am concerned about having to deal with DCMA or other complaints, but I
want to balance that
If you run a Tor server, freenode will ban you. If you don't mind having
a nym, you can send a username and password hash signed with a PGP key
to t...@freenode.net, and then connect to their other .onion server,
5t7o4shdbhotfuzp.onion. More info here:
http://freenode.net/irc_servers.shtml#tor
On
On Tue, 2008-12-30 at 20:27 +0100, Udo van den Heuvel wrote:
Ted Smith wrote:
If you run a Tor server, freenode will ban you.
I have been for some time with no effects.
Their messaging is not very clear to say the least.
The only change I made was add an exit policy for irc recently.
I
See http://www.torproject.org/eff/tor-dmca-response.html.en , and
http://www.torproject.org/eff/tor-legal-faq.html.en#DMCA . You should
contact the EFF if you need legal help. Note also that your ISP might
have terms against running servers in your TOS, and so you might end
up getting told to shut
FLOSS Manuals Release Circumvention Book, How To Bypass Internet
Censorship
December 4, 2008, Amsterdam
A new book released by FLOSS Manuals, How to Bypass Internet Censorship,
describes circumvention tools and explains why you might want to use
them, and honestly describes the risks you must
On Thu, 2008-11-20 at 22:39 +0100, Alexander W. Janssen wrote:
Robert Hogan wrote:
Do you run a server yourself? If so, your real IP may be on the irc
server's 'tor blocklist'.
I don't think so, Freenode wouldn't send the error-message with
127.0.0.1 then, but with his public IP-address.
A VPN might be somewhat overkill to set up. You could just use an ssh
tunnel to accomplish the same thing. It'd still be cross platform, but
instead of configuring openvpn, it'd just be 'ssh -D port
[EMAIL PROTECTED]'. This is what I do to get around wifi sniffers or
school networks.
On Tue,
On Sat, 2008-11-08 at 10:27 -0500, [EMAIL PROTECTED] wrote:
It's great to see someone advocating for the positive uses of
anonymity.
http://icollaborate.blogspot.com/2008/11/david-jacovkis-on-anonymous-browsing.html
and
http://ms4kc75hlvnfcxgz.onion/
There shouldn't be any www on
On Sat, 2008-11-08 at 23:47 -0500, [EMAIL PROTECTED] wrote:
On Sat, Nov 08, 2008 at 11:29:35PM -0500, [EMAIL PROTECTED] wrote 0.8K bytes
in 33 lines about:
:
http://icollaborate.blogspot.com/2008/11/david-jacovkis-on-anonymous-browsing.html
: http://ms4kc75hlvnfcxgz.onion/
:
: There
In a similar vein, I've heard rumors of DDoS being attempted on hidden
service targets. My initial reaction was that this would just DoS the
network, but is there any chance I'm wrong?
On Thu, 2008-11-06 at 07:12 +0600, Dmitriy Kazimirov wrote:
Btw, about policy,
I'm curious what will happen if
On Mon, 2008-10-20 at 22:48 -0400, misc wrote:
Is it possible to run GnuPG through Tor? (when connecting to LDAP and HKP
servers to exchange keys)?
The way I do it is:
keyserver x-hkp://d3ettcpzlta6azsm.onion/
keyserver-options http_proxy=localhost:8118
keyserver-options auto-key-retrieve
85 matches
Mail list logo