Nn6eumtr wrote:
Binaries are staticly linked so that someone can't substitute a
replacement library. Otherwise you can replace the library or set
LDPRELOAD to implement a variety of attacks.
can you give an example what's wrong with
LD_PRELOAD/foo/bar/libssl.so /foo/bar/libcrypto.so
in
Is there an archive or a current snapshot
of these from any or all of the six servers
available? Thanks.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body.
Hi,
I am trying to get my head round the basics of the path selection for
circuits. I am putting together a simple simulator for tor networks to help me
understand it and see what effects changing OR values has on the circuits
built. I have read
Hopefully I've got these right...
Are the choices of the ORs in the path all based on the advertised bandwidth
(Is that the average bandwidth value or the observed)?
At the moment weighting is based on advertised bandwidth (with the exception
of the entry and exit selection which has special
On Tue, Jan 19, 2010 at 4:18 AM, Olaf Selke olaf.se...@blutmagie.de wrote:
Nn6eumtr wrote:
Binaries are staticly linked so that someone can't substitute a
replacement library. Otherwise you can replace the library or set
LDPRELOAD to implement a variety of attacks.
can you give an example
Hi Olaf,
On Tue, 19 Jan 2010 10:18:46 +0100 Olaf Selke olaf.se...@blutmagie.de
wrote:
Nn6eumtr wrote:
Binaries are staticly linked so that someone can't substitute a
replacement library. Otherwise you can replace the library or set
LDPRELOAD to implement a variety of attacks.
can you give
Hi,
can anyone explain the Torify netcat instructions at
https://wiki.torproject.org/noreply/TheOnionRouter/TorifyHOWTO/Misc#NC
please?
Neither the -X nor -x options exist in my version of nc.
Thanks,
GD
7 matches
Mail list logo