The final entries in a consensus document are a number of directory-
signature entries.
dir-spec.txt says:
cite
directory-signature SP identity SP signing-key-digest NL Signature
This is a signature of the status document, with the initial item
network-status-version, and the
On Fri, Jul 30, 2010 at 12:32:43PM -0700, Seth David Schoen wrote:
The simplest threat scenario for Tor users would be when an
attacker in a position to observe a particular user's traffic,
but not any exit node traffic, hypothesizes that the user is
likely to visit a particular site and
On Wed, Mar 25, 2009 at 02:24:28PM -0400, Ringo Kamens wrote:
This sounds like it could be a cool project. You might look into running
it all inside a virtual machine with Qemu or VMWare. Damn Small Linux or
Knoppix would probably be a good distro to run in the virtual machine.
One constraint
On Sat, Jan 17, 2009 at 09:28:20PM +, mikel.ander...@juno.com wrote:
I understand and agree about getting too close to the bleeding-edge.
I look forward to TBB w/FF3, with anticipation. Thank you for all
your hard work.
Tor Browser Bundle 1.1.8 now includes Firefox 3 (3.0.5 to be
On Sun, Sep 28, 2008 at 12:27:11PM +, The23rd Raccoon wrote:
This post performs some basic analysis of the utility of timing
correlation attacks against a moderately used anonymous network,
specifically with respect to the Base Rate Fallacy[1] of Bayesian
statistics. Via that same
The idea is that you then configure your IRC client to use 10.40.40.40
(or whatever IP you chose) as the server's IP address. From your description,
I couldn't tell if you had also done that or not. If not, that's probably
the reason it's not working.
David
Grozdan wrote:
I then went
thanks to you guys who helped me unsubscribe.
however, note that actually my (yahoo) address has full headers and I dont see
any way to unsubscribe, apart from how you guys said to do it.
I checked the headers and there is nothing about it, even under word search.
I think these headers only
someone tell me how to get off this list
i dont see any instructions included in any emails on how to leave
the emails are way way too much
--- On Wed, 10/8/08, F. Fox [EMAIL PROTECTED] wrote:
From: F. Fox [EMAIL PROTECTED]
Subject: Re: same first hops
To: or-talk@freehaven.net
Date:
does anyone know how i can unsubscribe from this site these emails are getting
way too many? thanks
--- On Sun, 10/5/08, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
From: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: Re: how much does opera leak?
To: or-talk@freehaven.net
Date: Sunday,
Jonathan Addington wrote:
2. On *nix systems, make it easy for snort to filter out tor traffic
on a protocol level. I realize there are plenty of legal uses for
BitTorrent, Gnutella, etc., but most of them do not require anonymity
in a strong sense. That is, they can get the same content
On Sun, Feb 03, 2008 at 02:36:10AM -0500, Silivrenion wrote:
I did notice torbrowser was in the directory format that is friendly with
PortableApps format applications, so props on that.
Interesting take, taking what Portable Tor http://portabletor.sf.net has
done and bringing it to an all
On Sun, Feb 03, 2008 at 10:19:54PM +0100, Michael Schmidt wrote:
Steven, i suggest to make it hardcoded default and a Must, that each user,
using this browser, is as well running an tor **exit** node,
tit for tat. like emule partials: upload is a MUST.
I don't think this is likely in the near
Recently I have been working on creating a distribution of Tor which
includes a pre-configured browser -- the Tor Browser Bundle. It is
intended for being run off an USB flash drive, but will probably also
be helpful to users who want an easy-to-setup packaging of Tor.
More information and
On Tue, Dec 11, 2007 at 03:59:59PM +0100, kazaam wrote:
I dunno how public it is but I found today this dissertation by
Steven Murdoch about attacking the tor-network via covert- and
sidechannels: http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf
This results discussed aren't actually
Unsubscribe
I wrote a little script a while ago that may be useful to you:
http://infosecpotpourri.blogspot.com/2006/08/listing-active-tor-servers.html
Whenever you run it, the script queries one of the authoritative
directory servers and dumps that server's list of known nodes. A
quick-and-dirty hack, to
On Wed, 10 May 2006, Arrakistor wrote:
Date: Wed, 10 May 2006 12:59:20 +0100
From: Arrakistor [EMAIL PROTECTED]
Reply-To: or-talk@freehaven.net
To: Jake Appelbaum or-talk@freehaven.net
Subject: Re[4]: TorPark mentioned on BoingBoing
Jake, et al
It appears that the CORALized mirrors had not
20 matches
Mail list logo