(Disclaimer: I'm not doing it, nor will I ever do it, so raiding my
place is completely pointless; and once you've ruined my life
sufficiently, you and yours will pay dearly, and in person).
Not think you're being a tad melodramatic there?
---
avast! Antivirus: Outbound message clean.
Virus
Hi,
SI VIS PACEM, PARA BELLUM
Bad idea. Right now we're not criminals, and can even convince the
interested public of that.
If we'd start shooting back we would lose public support. Which is the
factor that will decide this war.
Plus, it would never really work. Antivirus software would
Matej Kovacic schrieb:
I agree. But what about building Tor server and client into popular P2P
clients?
There is a project to spread out Tor by pre-configured
DSL-modem/WLAN-router.
http://wiki.freunde-der-freiheit.de/index.php/TOR-Campaign
They have a mailing list. I do not know, if a router
Hello
I just hardly can't believe it what I am hearing about this. From what I get,
it sounds like a full on assault on privacy and free speech, the things that
make the internet good, has begun.
I am very sorry to hear the news and am very upset for everybody, especially
those in Europe
On Nov 12, 2007 3:15 AM, algenon flower [EMAIL PROTECTED] wrote:
Hello
I just hardly can't believe it what I am hearing about this. From what I
get, it sounds like a full on assault on privacy and free speech, the things
that make the internet good, has begun.
I am very sorry to hear the
Andrew kirjoitti:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Marko Sihvo schrieb:
Eugen Leitl kirjoitti:
Yes, I agree, ordinarily this is morally despicable, but this is
war, and we haven't started it.
SI VIS PACEM, PARA BELLUM
Bad idea. Right now we're not
Apologies for nonkrauts for this spam, but this one
is urgent, and matters. Please pass it on to relevant
parties.
- Forwarded message from [EMAIL PROTECTED] -
From: [EMAIL PROTECTED]
Date: Mon, 12 Nov 2007 13:45:04 +0100
To: [EMAIL PROTECTED]
Subject: [AK-VDS-Muenchen]
On Sunday 11 November 2007 10:43, TOR Admin (gpfTOR1) wrote:
do you know what is a timestamp in terms of this law? today, 11pm
2: anon server:
In my opinion, an anon sever has to log every replacement of a
sender ID by his own ID and the time stamp of this replacement.
Tor
Timing attacs can be done only with accurate data.
What if my server has a wrong time or its clock is changing speed randomly
or ...
I think some more clever people then me will come up with an idea soon.
I am sure tor developers will soon improve tor. We should of course do a lot
in fighting
On Nov 12, 2007 12:13 PM, linux [EMAIL PROTECTED] wrote:
Timing attacs can be done only with accurate data.
What if my server has a wrong time or its clock is changing speed randomly
or ...
I think some more clever people then me will come up with an idea soon.
I am sure tor developers will
On Mon, Nov 12, 2007 at 01:13:23PM -0700, Kasimir Gabert wrote:
The Overnet idea seems a tad silly. If connections in between servers
I don't know how well hidden services and current Tor codebase scales,
but having an anonymous communication space is certainly worthwhile,
even if read-only.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi.
On Monday, 12. November 2007, algenon flower wrote:
Am I to believe from the foregoing that potentially having to
surrender a Tor servers logs (that do not compromise much) will
actually make Tor server operators criminals because they don't
On Nov 12, 2007 1:26 PM, Eugen Leitl [EMAIL PROTECTED] wrote:
On Mon, Nov 12, 2007 at 01:13:23PM -0700, Kasimir Gabert wrote:
The Overnet idea seems a tad silly. If connections in between servers
I don't know how well hidden services and current Tor codebase scales,
but having an anonymous
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Felix Eckhofer wrote:
Would it be an option to add a jurisdiction parameter to each
Tor-server?
why not using the existing family config option?
what if every german tor server will run under germany family? could
it be viable? (and I'll use italy
14 matches
Mail list logo