Hi
want to know, if tor is as well an email mixmaster,
e.g. we have an email client, which is sending only pgp encrypted emails,
then the ISP is excluded as he cannot read, but data retention laws allow to
log the IP from where the email is sent and the email server knows the last
exit point of
Hi,
No not yet to my knowledge. However we are building an anonymized e-mail
system based on Tor. Some information is to be found at
http://www.smallsister.org/ Before the end of the year we will have the
tool available.
Cheers,
Brenno
M. Peterson schreef:
Hi
want to know, if tor is as
Hi,
someone has setup an open SMTP relay as hidden service:
oogjrxidhkttf6vl.onionport: 587
May be, it works. I did not test it. :-(
Karsten N.
M. Peterson schrieb:
Hi
want to know, if tor is as well an email mixmaster,
e.g. we have an email client, which is sending only pgp
is it possible to make a kind of tor button, so that all users using a kind
of email client are a outproxy or hidden service, or must it be hidden
service?
so a torbutton with default on smtp relay /exitnode for email?
On Sun, Nov 9, 2008 at 2:00 PM, Karsten N.
[EMAIL PROTECTED]wrote:
Hi,
On Sun, Nov 09, 2008 at 02:03:53PM +0100, [EMAIL PROTECTED] wrote 3.5K bytes in
68 lines about:
: is it possible to make a kind of tor button, so that all users using a kind
: of email client are a outproxy or hidden service, or must it be hidden
: service?
: so a torbutton with default on smtp
[EMAIL PROTECTED] schreef:
On Sun, Nov 09, 2008 at 02:03:53PM +0100, [EMAIL PROTECTED] wrote 3.5K bytes
in 68 lines about:
: is it possible to make a kind of tor button, so that all users using a kind
: of email client are a outproxy or hidden service, or must it be hidden
: service?
: so a
Hi Andrew, you missed one important point, tor-email-button is done in an
email client, which is sending openPGP encrypted emails only,
then you have an exit node, sending the packet to the mail server - or not,
if the mail has not been delivered, the mail was not going out, so the smtp
server
I've been running a Tor node on my personal VPS for several months as
a way to give back to the community with some of my unused
bandwidth. My one gripe was that the Tor daemon in 0.1.X sucked a lot
of my very limited memory allocation, even when not accepting exits.
Having recently upgraded to
On Sun, Nov 09, 2008 at 03:40:30PM -0600, Matt LaPlante wrote:
bandwidth. My one gripe was that the Tor daemon in 0.1.X sucked a lot
of my very limited memory allocation, even when not accepting exits.
It sure did. Mainly on Linux.
Having recently upgraded to 0.2.X due to its inclusion in
Hi,
yes, i started my TOR exit node with port 25 open (default is close)
and half a year later my provide sent me a letter that my PC is
sending many spam mails permanent and that i should check my PC
for malware.
Because i could not find an email relay i could forward the mails to,
i closed port
Hi Roger,
Im in same situation as Matt. Im running Tor exit on VPS, version 0.2.0.x.
So each MB of memory is quite bit expensive for me :). Do you personally
think that running 0.2.1.x (so experimental branch, but less memory usage)
on production machine is a good idea? Stability is the main
So that design would work:
http://smallsister.org/show_image.php?id=5
On Sun, Nov 9, 2008 at 10:54 PM, [EMAIL PROTECTED] wrote:
Hi,
yes, i started my TOR exit node with port 25 open (default is close)
and half a year later my provide sent me a letter that my PC is
sending many spam mails
On Sun, Nov 09, 2008 at 09:58:22PM -0500, Roc Admin wrote:
I just read this article in the SANS reading room called Detecting and
Preventing Anonymous Proxy Usage
http://www.sans.org/reading_room/whitepapers/detection/32943.php
From the article:
Wireshark's ability to reconstitute a TCP
On Sun, Nov 09, 2008 at 09:54:53PM -0500, Roc Admin wrote:
I just read this article in the SANS reading room called Detecting and
Preventing Anonymous Proxy Usage
http://www.sans.org/reading_room/whitepapers/detection/32943.php
Cosmetic issues:
1) It's Tor, not TOR.
2) The paper
I found the keys, they're in ~/.tor/keys .
The dynamic IP problem persists.
GD
Begin forwarded message:
From: Geoff Down [EMAIL PROTECTED]
Date: 4 November 2008 04:53:21 GMT
To: or-talk@freehaven.net
Subject: Problem with dynamic IP
Reply-To: or-talk@freehaven.net
Hi,
the Tor FAQs mentions
I just read this article in the SANS reading room called Detecting and
Preventing Anonymous Proxy Usage
http://www.sans.org/reading_room/whitepapers/detection/32943.php
From the article:
Wireshark's ability to reconstitute a TCP stream was used to observe the
content being sent and received. I
On Fri, Nov 07, 2008 at 01:38:28PM +0100, Eugen Leitl wrote:
I've seen continuous table state increase since about 3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this? Any alternative explanation to DoS? (ISP
throttling?).
Judging by the timing, I'd think it might be
On Mon, Nov 10, 2008 at 12:15:36AM +0100, slush wrote:
Im in same situation as Matt. Im running Tor exit on VPS, version 0.2.0.x.
So each MB of memory is quite bit expensive for me :). Do you personally
think that running 0.2.1.x (so experimental branch, but less memory usage)
on production
Doesn't matter for me, if Tor fails under Windows because Im using
mainstream :-). I will try it for week on my home server before running on
production.
Thanks,
Marek
2008/11/10 Roger Dingledine [EMAIL PROTECTED]
Tor 0.2.0.x is somewhat more stable than 0.2.1.x-alpha in general. For
I just read this article in the SANS reading room called Detecting and
Preventing Anonymous Proxy Usage
http://www.sans.org/reading_room/whitepapers/detection/32943.php
From the article:
Wireshark's ability to reconstitute a TCP stream was used to observe the
content being sent and received. I
On Sun, Nov 09, 2008 at 02:00:36PM +0100, Karsten N. wrote:
Hi,
someone has setup an open SMTP relay as hidden service:
oogjrxidhkttf6vl.onionport: 587
May be, it works. I did not test it. :-(
Unfortunately, this doesn't seem to be running. The idea is
interesting, though. It
21 matches
Mail list logo