In the meantime, perfect-privacy.com should advise this list as soon as
its torrc files are in compliance, while the rest of us should feel free to
use the NodeFamily information I posted earlier with, apparently, the addition
of 17 more node fingerprints that I missed when I grepped the
Qualified guess: These might be so-called BitTorrent trackers.
These tracker URLs are embedded in torrent files that you download.
You can download these torrent files from various sources, not
necessarily (even rarely) from the site itself. When you load these
torrents into a BitTorrent client,
Hi everybody,
I just tried a little tool called Tortunnel which allows a user to
tunnel Tor via Privoxy/Polipo to any selected exitnode. Just one hop
instead of three relays.
Of course, if the exitnode ist evil, you're lost, but it really speeds
up the whole thing on the other hand.
Website:
Does anybody use tortunnel ?
Never heard of it before, so doubt it.
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number
of relays ?
We discourage people from reducing the circuit length since it cripples the
anonymity tor provides, makes exit nodes more tasty targets
Hi Niklas,
On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote:
Hi everybody,
I just tried a little tool called Tortunnel which allows a user to
tunnel Tor via Privoxy/Polipo to any selected exitnode. Just one hop
instead of three relays.
This works by pretending to the exit relay that you've
On Wed, May 19, 2010 at 1:48 PM, Sebastian Hahn m...@sebastianhahn.net wrote:
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number
of relays ?
Yes, unfortunately quite a few people use it.
It hurts the network by endangering exit node operators, and
by completely
Sebastian Hahn wrote:
Hi Niklas,
On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote:
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the
number
of relays ?
Yes, unfortunately quite a few people use it.
It hurts the network by endangering exit node operators, and
by
--- On Wed, 5/19/10, Stephen Carpenter thec...@gmail.com wrote:
Certainly there is a certain amount of sense to the idea
that tortunnel traffic may use another system that focuses more
on speed if tortunnel was unavailable. However, an assumption is an
assumption and I am not sure how much I
Just wondering if anybody from the Tor Project has contacted the author to
express the concerns with tortunnel. Particularly about it being
detrimental to the Tor network.
Jim
The author is a security researcher, the tool is ages old and
abandoned, as far as I know it doesn't work right
To be more specific about what I mean by equal
resources: suppose that users of system X have
5 relays, and tor has 5 relays, and both
sets of users used the same bandwidth. If all
users used one 10 relay system instead, the
total bandwidth should be similar.
Tortunnel is not a separate
The author is a security researcher, the tool is ages old and
abandoned, as far as I know it doesn't work right away unless you
change some of the code, and it was written to check what tor exit
nodes where running sslstrip or in other ways were messing with the
traffic.
I'm not really
On 19.05.2010 23:58, grarpamp wrote:
Have you looked at I2P? http://www.i2p2.de/techintro.html
It for example allows both users and services to specify their hop
length, and uses packet switching instead of circuit switching.
Phantom does this too... user specified hop counts based on their
Is there any working implementation of Phantom? I2P is widely in use,
and I must say that I really begin to like it. Code also looks much
cleaner to me (not: mature). Tor could use a complete rewrite.
Not as of yet. They have a specification whitepaper and a video with
slides to give you a
On 14.05.2010 06:56, and...@torproject.org wrote:
Can we split entrepreneurial from bad? I don't see the two as one
concept. If someone figures out a way to increase fast exit relays and
preserve user privacy/anonymity and make money, more power to them. We
as the non-profit aren't going to
Hello Everyone,
I am doing GSoC this summer with Tor. My name is Kory Kirk, I am a
Computer Science masters student at Villanova University (west of
Philadelphia); I will be graduating this weekend and then I am moving to
Austin, TX a week later. Last year I also participated in GSoC with the
On Sun, May 16, 2010 at 12:45:22AM -0500, Scott Bennett wrote:
The tor man page gives a not very edifying description of the NodeFamily
statement. The man page says that the NodeFamily statement may be used more
than once in a given torrc file. Does each use define a different Family?
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
Original Message
Subject: Re: - Medium - Tor servers, Tor community wants to disable your
nodes - General
Date: Mon, 17 May 2010 13:46:04 +0200
From: Perfect Privacy Administration ad...@perfect-privacy.com
I apologize for altering the nature of this thread, but can someone please
summarize what this discussion is about? Who is perfect-privacy.com and why are
they of concern to Tor users? I am having a difficult time following the
threads.
--
Jerzy Łogiewa -- jerz...@interia.eu
On Thu, 20 May 2010 00:25:33 -0400 Roger Dingledine a...@mit.edu
wrote:
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
Original Message
Subject: Re: - Medium - Tor servers, Tor community wants to disable your
nodes - General
Date: Mon, 17 May 2010 13:46:04
On Thu, 20 May 2010 00:40:42 -0400 =?utf-8?Q?Jerzy_=C5=81ogiewa?=
jerz...@interia.eu wrote:
I apologize for altering the nature of this thread, but can someone =
please summarize what this discussion is about? Who is =
perfect-privacy.com and why are they of concern to Tor users? I am =
20 matches
Mail list logo