On 1 February 2011 00:45, Aplin, Justin M jmap...@ufl.edu wrote:
Until Firefox provides a way to isolate tabs as individual processes, I
don't see such a feature being implemented.
Is there a bug filed with Mozilla which requests this feature?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
My name is Thomas Lowenthal, and I'm and undergraduate student at Princeton
University. I'm majoring in the Politics Department, with a
certificate from the
Program in Applications of Computing, and the Program in Information Technology
and Society.
On 8 January 2011 17:25, Mike Perry mikepe...@fscked.org wrote:
Try changing this last setting
(extensions.torbutton.xfer_google_cookies) to false. It is designed to
try to move your google cookies from one domain to another to avoid
requiring you to solve captchas for every google country
On 17 August 2010 17:47, Matthew pump...@cotse.net wrote:
How can... nodes be specifically referred to...?
Refer to the nodes by their unique fingerprints;.
On 20 July 2010 03:14, Moritz Bartl t...@wiredwings.com wrote:
Speaking on behalf of a good, blind friend: This is not true. Unless you
consider him not normal.
I don't want to get into the intricacies of interface design, and ableism,
but some points of note:
-blind people are not normal:
Is there a page on the wiki that contains suggested families? It's great
that we have people like Scott to find these families, and it's great that
he sends them out to the list. However, new users, new subscribers to the
list, and so on will have difficulty accessing them. The list archives are
I seem to recall that something called haystack, with a remarkably similar
webpage was the software and donations portal developed by @austinheap
during the Iran election. Since Heap's twitter is still linked from the
haystacknetworkcom page, I assume that this project remains the offspring of
Though I appreciate Jim's signature proposal, that could become difficult
and convoluted to implement quite quickly. I think that perfectprivacy's
initial suggestion was actually quite compelling: allow ``#include'' type
statements to be used in a torrc.
Currently, an operator of multiple relays
On 20 May 2010 07:44, and...@torproject.org wrote:
If Mallory lists Alice
and Bob, but neither Alice nor Bob list Mallory, it's not a valid
Family. Otherwise, Mallory could list every node in the network and
screw everyone.
Why would this screw everyone? I admit that I don't fully
On 26 April 2010 09:59, Timo Schoeler timo.schoe...@riscworks.net wrote:
When running tor, I see
i) CPU cycles being eaten up by tor almost entirely;
ii) my machine experiences things like those:
One is a chinese dialup, the other ones are from a big German ISP
(Deutsche Telekom AG). For
http://xkcd.com/463/
If you administer your server in a reasonable way, you shouldn't need any
antivirus software.
On 21 March 2010 12:19, Jon torance...@gmail.com wrote:
Seems to me I saw in one of the messages awhile back about anti-virus
software for servers. I cant seem to locate it in
On 10 March 2010 07:42, Paul Menzel paulepan...@users.sourceforge.netwrote:
So my next question is, why did the users count drop that much in the
beginning of March?
At the beginning of March, the great firewall of China blocked all (then)
known tor exits and relays, and a substantial number
On 7 March 2010 11:31, James Brown jbrownfi...@gmail.com wrote:
Many IP-addresses of exit-nodes of the Tor was banned from access to the
LJ today.
We have the next information when trying to connect with it:
You've been temporarily banned from accessing LiveJournal, perhaps
because you were
On 27 February 2010 03:46, KT listcli...@gmail.com wrote:
Tor v0.2.1.24 on XP Pro SP3. I am getting the following, but I don't
have a directory C:/msys...??
Feb 27 08:26:46.904 [info] read_file_to_str(): Could not open
C:/msys/1.0/local/share\tor\fallback-consensus: No such file or
On 25 February 2010 11:17, Stephen Carpenter thec...@gmail.com wrote:
Well how exactly would you accomplish that? You could put the tracker
on a location hidden service, that eliminates one exit node, however,
to connect with other hosts in the swarm, you need to be able to
connect to them...
On 25 February 2010 12:50, grarpamp grarp...@gmail.com wrote:
BitBlinder attempts to create a closed Tor-based network for bittorrent
traffic, including a system attempting to assure equal sharing.
It may end up being ok. But never I understand why create a separate
Tor universe. Sure, if
On 19 February 2010 20:32, Andrew Lewman and...@torproject.org wrote:
Once Firefox fixes bug 280661, we don't need a http proxy at all.
However, given the current pace of progress on 280661, we may switch to
Chrome before the fix occurs.
If the switch to Chrome was made, I assume that
On 14 February 2010 03:15, Scott Bennett benn...@cs.niu.edu wrote:
But one big problem is that you have no guarantee whatsoever that I'm
telling you the truth about my measurements. See for example Kevin
Bauer et al's Low Resource Routing Attacks Against Tor.
Yes, I've understood that
I've recently had conversations with some activists in Europe who want
to run unpublished exit nodes (meaning they set PublishServerDescriptor
0 in their torrc). Of course, one risk is the only people using this
unlisted exit node are those in the social graph of the activists.
Slightly
On 13 February 2010 14:16, Jon Cosby j...@jcosby.com wrote:
On Fri, 2010-02-12 at 23:45 -0500, and...@torproject.org wrote:
On Wed, Feb 10, 2010 at 11:27:26AM -0800, j...@jcosby.com wrote 0.3K
bytes in 10 lines about:
: I just noticed that on closing a Firefox session, google cookies are
Why couldn't your exit policy just block the IPs of the journal sites?
Because there's 1000 of them (and each would be a /32). It was
discussed in another thread at the time, and the developers led me to
the conclusion that such hugely long exit policies were a bad idea.
Could you bind
On 31 January 2010 21:58, Scott Bennett benn...@cs.niu.edu wrote:
So it appears that a) there is a new tor client bug in 0.2.2.7-alpha
that
leaves the exoassist.exit in the name passed along from its SOCKS
listener
to the destination port.
Isn't .exit deprecated because it's a
2010/1/11 Seth David Schoen sch...@eff.org
snip
I can forward the screenshot to anyone interested.
Can you attach the image, and send it to the list?
2009/12/31 emigrant fromwindowstoli...@gmail.com
hi all,
i am using the pidgin with ubuntu. and i installed TOR as well.
i want to set up TOR to one of the yahoo accounts in pidgin.
so i went to proxy settings and changed the gnome proxy setttings into
socks5 and host 127.0.0.1 and port
2009/12/27 Programmer In Training p...@joseph-a-nagy-jr.us
On 12/27/2009 10:00 PM, Andrew Lewman wrote:
Leave the http, https, ftp, ssl, gopher, whatever fields blank. only
configure the socks field as localhost:9050. If thunderbird 3 has
proper socks support, it will only use the socks
2009/11/30 Kyle Williams kyle.kwilli...@gmail.com
I've been working on a secured browser VM for the last few months, and I
feel it's to a point that it can be shared with the rest of the world.
Thanks for working on this project. One question: have you implemented the
defenses that torbutton
2009/11/26 Scott Bennett benn...@cs.niu.edu
Changing the DNS server to DNS rootservers would fix this problem.
Bzzzt!! That would eventually get an exit marked as a bad exit, too.
Why? Because the root name servers serve only information in the root
domain and the so-called top-level
Perhaps you'll just have to wait for the developer to fix the problem?
2009/11/25 Georg Sluyterman ge...@thecrew.dk
Georg Sluyterman wrote, On 2009-11-25 18:29:
---cut
I have changed it to OpenDNS now.
---cut---
Or maybe not.. It seems that i can not get an IP via DHCP and manually
I'm not sure that the correlation attacks for `bridge exits' are better than
those for normal bridges. However, the `exit risk' would likely be more
discouraging to such `bridge exits'. However, as a more general question,
making the Tor network difficult to completely enumerate might be
A number of Danish ISPs have blocked thepiratebay.org, by redirecting the
DNS entry for that domain to a page stating that the site is blocked. This
sometimes results in Danish exits giving this inappropriate result for that
domain. Should the IP addresses of those ISPs be automatically given the
My question is: do you really think it would help? If people are using
Tor inappropriately (meaning they could get what they want with a
simple anonymous proxy), what are the chances they're going to have it
configured appropriately to reduce the bandwidth they use?
I don't want to weigh in
hIf The Internet
is restricted in such ridiculous ways as Kaspersky suggests, then
other internets will just spring up to replace it.
For those who don't know, such a project already exists, run by
Freaknet: http://en.wikipedia.org/wiki/Netsukuku
Netsukuku is very interesting.
It's
The law stated that you are responsible of your connection usage. It simply
means, legally, that if someone (undercover or not) else use it, you could
be disconnected. They called it the négligence caractérisée, meaning you
didn't take any countermeasures to prevent someone else from using
http://arstechnica.com/tech-policy/news/2009/10/french-3-strikes-law-returns-now-with-judicial-oversight.ars
France's constitutional council has finally accepted the 3-strikes law. Can
anyone who's read it comment on what it means for those who operate exits in
France? Would operators (likely) be
2009/10/21 grarpamp grarp...@gmail.com
Perhaps the worldwide spread
of the Pirat Partiet will take upon this cause. But they
would need a corporate branch... like Sinn Fein to the IRA.
I don't really want to stretch this analogy too far, and I certainly don't
think that it's reasonable to
2009/10/21 Eugen Leitl eu...@leitl.org
On Wed, Oct 21, 2009 at 08:35:10AM -0400, Flamsmark wrote:
I don't really want to stretch this analogy too far, and I certainly
don't
think that it's reasonable to compare people who obtain, share and
distribute media in ways often suggested
I'd like to see some stats, or even some conjecture, as to the longevity of
a bridge, and what it means for the bridge to be born, be used, and
eventually be blocked.
I understand the mechanisms used to slowly feed bridge information to
people who request them, but even that slowness can't
2009/10/19 Martin Fick mogul...@yahoo.com
I think that unless you have a good way of telling specific people in the
need of a bridge about your bridge without telling the world, that you
should not consider being a bridge,
Is that a gut feeling, or based on some research? What about the ways
Neither. If you have a selective way of telling
people you deem in the need, than you meet my
criteria. It would likely be hard for us all to
meet that criteria though, I don't. You may tell
me that you can help me, but then I have to trust
you, which doesn't really make too much sense.
I'm having some difficulty using the script. After a day of wgetting the
archives, I run:
python exonerator.py --archive=/opt/exonerator/archives/
archive.torproject.org/tor-directory-authority-archive/ ip 2009-11-16
12:00:00
and am informed that:
We are missing consensuses and/or server
Is there a web interface to the archives, or would users of the archives
have to check manually?
On Tue, Oct 6, 2009 at 07:12, Karsten Loesing karsten.loes...@gmx.netwrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/06/2009 12:19 PM, morphium wrote:
I think this question has
Is there a way to completely stop a Tor from building circuits?!
Why would you want to stop Tor from building circuits? What exactly do you
want Tor to be doing?
It's my experience that Polipo provides for faster proxying than Privoxy
(running both on a recent Ubuntu). However, Polipo is not uniformly stable
on Windows. I use Privoxy with local Tor instances on Windows, but Polipo on
Ubuntu.
On Mon, Sep 28, 2009 at 18:00, Jim McClanahan
On the other hand, I do control a fair amount of infrastructure and
bandwidth in multiple locations ... so it's very tempting to leverage those
resources in a way that gives me tor-like anonymity, but without the
(sometimes terrible) speed and latency.
If you limit yourself to a small set
It's not clear that he said that. He was sufficiently evasive to so many
questions, that there are lots of ways to put it back together. It's also
not clear what sort of threat his software poses. Does it do OS attacks,
degradation? We just don't know what he means.
On Thu, Sep 17, 2009 at 00:25,
On Sat, Aug 22, 2009 at 05:16, Sadece Gercekler ina...@ymail.com wrote:
I'm using the Tor+Firofox browser bundle downloaded at torproject.org. I
setup a virtual Windows XP machine under my normal OS (using VMWare) and I'm
doing all my private browsing under that machine.
I need to use an rss
On Thu, Aug 20, 2009 at 17:29, Tom Hek t...@tomhek.nl wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Aug 20, 2009, at 23:02 PM, KT wrote:
Exit node freeMe69 [1] is injecting the following snippet to response
body:
script type=text/javascript
On Sat, Aug 15, 2009 at 12:47, James Brown jbrownfi...@gmail.com wrote:
I have a laptop with the Debian Lenny AMD64 and I want to start several
Tor daemons in one moment, each for every user.
How can I do it?
Why do you need to run several Tor daemons? Wouldn't it make more sense to
start
That's totally possible too. However, my point there was that those
behaviors are the easy part. The question is how to stop relaying for a
short period without ending your 'uptime'.
On Wed, Aug 12, 2009 at 12:05, Andrew Lewman and...@torproject.org wrote:
On 08/09/2009 04:00 PM, Flamsmark
Why not just a Windows kernel driver? Because it hasn't been written yet.
You're welcome to help write a kernel driver, or a VPN host or whatever else
you think is the next logical step to improving Tor. However, remember the
version number: 0.2.1.*. Tor is not a 'finished' piece of software. It
Then perhaps complaining about the direction of the work that many others
have done pro bono is a little premature, no?
On Thu, Aug 13, 2009 at 01:18, Peter necedema...@gmail.com wrote:
Heh, well, I tell you what. You send me a hundred thousand dollars,
and after the check clears I'll write
'Widespread adoption' is not the current sort-term aim. While we all think
that fast, universal, anonymous internet access would be a good thing, we
simply can't support that right now. The volunteer network of relays isn't
that big. Even now, Tor has trouble dealing with the network load. If Tor
Tor currently has an accounting system for allowing data quota limitations
to be applied. This allows a relay to enter 'hibernation', maintaining it's
'up' status, and directory-perceived uptime, without actually relaying
traffic. However, it is feasible that an operator might want to control Tor
This is potentially a less-than-ideal solution.
Torbutton for Friefox is carefully and specifically designed to address
web-browsing privacy concerns, making the user seem to belong to the largest
possible set of potential users. Simply sending Thunderbird traffic through
Tor may not provide the
54 matches
Mail list logo