Re: [tor-talk] (no subject)

2019-01-03 Thread Damon (TheDcoder)
Hello, at the end of every mail from the mailing list you should see a link to 
change your settings or unsubscribe.

On 2 January 2019 10:21:25 AM IST, Larry Martin  wrote:
>I wish to unsubscribe
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2019-01-01 Thread Jaysinh Shukla
On Tue, Jan 01, 2019 at 11:51:25PM -0500, Larry Martin wrote:
> I wish to unsubscribe

To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2019-01-01 Thread Larry Martin
I wish to unsubscribe
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-11-26 Thread john doe
On 11/26/2018 3:19 PM, Dj Blind wrote:
> Bonjour je souhaiterais savoir 6 l'application tort le navigateur web il y
> a une version pour les personnes aveugles parce que j'ai constaté que ça ne
> prend pas en charge ma synthèse vocale quand je navigue sur l'application
> aussi si on pourrait développer un script pour moi le fait que je suis
> aveugle et ça pourrait devenir accessible même pour les personnes aveugles
> qui veut utiliser l'application tord j'utilise jaws comme synthèse vocale
> laisse-moi savoir si c'est possible merci beaucoup je serai très
> reconnaissant envers vous si j'arrive à utiliser l'application tord je
> souhaite savoir si il y a un façon nous les personnes aveugles peut avoir
> accès avec cette application merci beaucoup
> 

Tor Browser is accessible with a screenreader, how ever, beginning with
"TBB for Windows" 8.0 there is an issue that is being fixed:

https://trac.torproject.org/projects/tor/ticket/27503

-- 
John Doe
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2018-11-26 Thread Dj Blind
Bonjour je souhaiterais savoir 6 l'application tort le navigateur web il y
a une version pour les personnes aveugles parce que j'ai constaté que ça ne
prend pas en charge ma synthèse vocale quand je navigue sur l'application
aussi si on pourrait développer un script pour moi le fait que je suis
aveugle et ça pourrait devenir accessible même pour les personnes aveugles
qui veut utiliser l'application tord j'utilise jaws comme synthèse vocale
laisse-moi savoir si c'est possible merci beaucoup je serai très
reconnaissant envers vous si j'arrive à utiliser l'application tord je
souhaite savoir si il y a un façon nous les personnes aveugles peut avoir
accès avec cette application merci beaucoup
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-25 Thread Mirimir
On 10/24/2018 06:23 AM, Nathaniel Suchy wrote:
> I thought this wasn't sent to the list server. Reporting the archive link
> on IRC. They can get this handled :)

From the message source, it surely seems that it was ...

...
Received: from eugeni.torproject.org (eugeni.torproject.org\
  [94.130.28.202])
  (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
  (Client CN "clientcerts/eugeni.torproject.org", Issuer\
  "auto-ca.torproject.org" (not verified))
  by mx1.riseup.net (Postfix) with ESMTPS id 394DD1A04F4;
  Wed, 24 Oct 2018 02:34:35 -0700 (PDT)
Authentication-Results: mx1.riseup.net; dkim=fail
  reason="verification failed; unprotected key"
  header.d=gmail.com header.i=@gmail.com header.b=m91qVvbr;
  dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from eugeni.torproject.org (localhost [127.0.0.1])
  by eugeni.torproject.org (Postfix) with ESMTP id 68AB1E161F;
  Wed, 24 Oct 2018 09:34:32 + (UTC)
Received: from localhost (localhost [127.0.0.1])
  by eugeni.torproject.org (Postfix) with ESMTP id 60A2BE161F
  for ; Wed, 24 Oct 2018 09:34:28\
  + (UTC)
...
Received: from eugeni.torproject.org ([127.0.0.1])
  by localhost (eugeni.torproject.org [127.0.0.1])\
  (amavisd-new, port 10024)
  with ESMTP id BX0svQDLp3CT for ;
  Wed, 24 Oct 2018 09:34:28 + (UTC)
Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com
  [IPv6:2a00:1450:4864:20::141])
  (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
  (Client CN "smtp.gmail.com",
  Issuer "Google Internet Authority G3" (not verified))
  by eugeni.torproject.org (Postfix) with ESMTPS id 3C7D4E15C0
  for ; Wed, 24 Oct 2018 09:34:28\
  + (UTC)
Received: by mail-lf1-x141.google.com with SMTP id n26-v6so3434767lfl.1
  for ; Wed, 24 Oct 2018 02:34:28\
  -0700 (PDT)
...

Unless they did a good job at spoofing. My email skills are iffy :(

> On Wed, Oct 24, 2018 at 9:10 AM Mirimir  wrote:
> 
>> On 10/24/2018 02:34 AM, Today's Yug wrote:
>>> Contact to me in case of girlfriend  trace
>>
>> So is this grounds for unsubscribing this address from the list, and
>> blocking it and its IP address from resubscribing?
>> --
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Gökşin Akdeniz
Wed, 24 Oct 2018 06:09:43 -0700 tarihinde
Mirimir  yazmış:

> On 10/24/2018 02:34 AM, Today's Yug wrote:
> > Contact to me in case of girlfriend  trace
> 
> So is this grounds for unsubscribing this address from the list, and
> blocking it and its IP address from resubscribing?
> 

Perfectly it is.
-- 
Gökşin Akdeniz 


pgpBIsgIqOa2d.pgp
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Nathaniel Suchy
I thought this wasn't sent to the list server. Reporting the archive link
on IRC. They can get this handled :)

On Wed, Oct 24, 2018 at 9:10 AM Mirimir  wrote:

> On 10/24/2018 02:34 AM, Today's Yug wrote:
> > Contact to me in case of girlfriend  trace
>
> So is this grounds for unsubscribing this address from the list, and
> blocking it and its IP address from resubscribing?
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Mirimir
On 10/24/2018 02:34 AM, Today's Yug wrote:
> Contact to me in case of girlfriend  trace

So is this grounds for unsubscribing this address from the list, and
blocking it and its IP address from resubscribing?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2018-10-24 Thread Today's Yug
Contact to me in case of girlfriend  trace
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2018-03-25 Thread Tina Henger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2017-12-23 Thread BettinaFarida Henger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2017-05-15 Thread شريف الجمهودي

اريد الدخول
Sent from Yahoo Mail on Android
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Appelbaum Subject Of Investigative Journalism

2016-08-16 Thread carlo von lynX
Still sounds a lot like JTRIG and Zersetzung to me...

http://www.zeit.de/kultur/2016-08/jacob-appelbaum-rape-sexual-abuse-allegations/komplettansicht



Jacob Appelbaum: What Has This Man Done?

The year 2016 is only a couple of hours old when the orgy in Jacob Appelbaum’s 
apartment in a pre-World War II building in Berlin’s Prenzlauer Berg district 
really gets going.

Somebody has unfolded the sofa in the living room. Two couples are having sex 
at the same time in the room. Some guests had already taken synthetic party 
drug MDMA, which induces a state of euphoria and increases the need for 
emotional warmth, at another party. A third couple is going at it in the 
bedroom. Later, a crime allegedly took place in Mr. Appelbaum’s bed or on the 
fold-out sofa.

A couple of people in the living room are prone on the floor, all of them fully 
dressed. They had turned up the music so the moaning and groaning of the others 
doesn’t bother them as much. A young journalist had made herself comfortable on 
a man’s lap, and he is massaging her back. Sitting across from them is a young 
American woman. She had gotten to know the others just a couple of days before, 
but she appears to be uncomfortable at this party. She doesn’t talk much but 
listens in a friendly manner to what is being said.

The host, Jake Appelbaum, is doing much of the talking at the New Year’s Eve 
party. Mr. Appelbaum is a 33-year-old American, and he’s a specialist in 
computer security and the equivalent of a rock star in the worldwide community 
of hackers. His name is mentioned in the same breath as the elite of digital 
dissidents such as Edward Snowden and Julian Assange. For many people, such men 
are savior-like figures.

Mr. Appelbaum’s party guests number about 20 and are programmers, hackers and 
activists from all around the world. They are united by one mission: use 
encryption technologies to fight against what they see as the hated 
surveillance state. Mr. Appelbaum has been a guru in this Berlin community 
since he fled the United States in 2013. He felt he was being persecuted by the 
intelligence agencies.

On this night, he speaks of a trip to Iraq and also his tattoo idea: he wants 
the images of mathematical formulas tattooed on his body. He shows his guests a 
sculpture. It’s a prize for investigative journalism that he won two years ago.

He had uncovered for the German magazine Der Spiegel how the U.S. National 
Security Agency (NSA) was monitoring the German chancellor’s mobile phone. The 
journalism prize is named after German journalist Henri Nannen, whose Nazi past 
incenses Mr. Appelbaum.

He asks those guests gathered around him whether he should smear the sculpture 
with blood, perhaps the blood of a Jewish activist or perhaps his own blood. Or 
with menstruation blood, says the female journalist, but she isn’t having her 
period right now. This is good for other things, Mr. Appelbaum says. A little 
while later, he disappears with her into the bedroom. Already there in bed is 
the taciturn young American woman. The three had sex together.

Mr. Appelbaum’s social downfall is sealed this evening and two others he spends 
with the American. Later, she will make serious allegations against him.

Since then, Mr. Appelbaum has been only one main thing in the public’s eye: a 
sex offender.

Mr. Appelbaum had been involved in the Tor Project, which provides online 
anonymity, the most powerful weapon in the fight against secret services and 
government surveillance. But the digital privacy group announced in early June 
that Mr. Appelbaum had stepped down. Until then, he had been an important 
developer for Tor, and the figurehead of software that not only enables what is 
termed the Darknet. People worldwide put their trust in Tor technology when 
information must remain secret, when they fear for their lives, or when they 
aim to circumvent censorship. The Tor network enables protective anonymity to a 
wide variety of people, from Iranian dissidents to whistleblowers such as 
former NSA contract employee Mr. Snowden. On the internet, Tor users can 
communicate incognito.

Shortly after the Tor Project’s announcement in June, a new website popped up: 
jacobappelbaum.net. The site was set up by people who see themselves as Mr. 
Appelbaum’s victims. Visitors to the website see photos of Mr. Appelbaum, one 
of him posing in a colorful suit as if he were the Joker in a Batman film, or 
other photos of him with microphone in hand giving lectures to fans. "Hey 
there! We're a collective of people," write the anonymous persons responsible 
for the website, "who have been harassed, plagiarized, humiliated, and abused — 
sexually, emotionally, and physically — by Jacob Appelbaum." Above almost every 
photo of Mr. Appelbaum on the website is an alleged victim’s pseudonym.

Among others, there is an account by a woman who calls herself "Forest." She 
tells of how she found herself forced to repulse his insistent advances. 

Re: [tor-talk] (no subject)

2016-06-17 Thread Cecilia Tanaka
On Jun 17, 2016 2:04 PM, "Ryan Carboni"  wrote:
>
> https://twitter.com/YourAnonCentral/status/743498759892406272

Meh, too childish...  It's becoming pretty boring!  :-/

Maybe a man can't see it, but even the most stupid woman in the world can
notice an evident *lie* in the last statment published.

The obvious efforts trying to adjust the accusations to being more
realistic and plausible, giving also more colours and emotions, are pretty
interesting.  I like it!  ;)

I didn't stop to search for some trustworthy information and for more
references in last days.

A programmer (woman) told me some 'juicy gossip' about one of alleged
victims, but it would be pretty disgusting to tell it here.  Ugh!  :-/

Well, in thesis, one of alleged victims is being hypocrite and hates
Jacob.  It was obvious since the first message, but some of the reasons
were unexpected for me, at least.  I need to search more information about
it and verify if it is really true before invite her to write a statment or
tell more about it in a trial.

Another tech woman, a brutally sincere friend who I love a lot and consider
one of the most intelligent persons that I know, perceived the lie that I
mentioned before I point it to her.  It simply does not make sense...  :-/

I always says my friend is a 'feminazi' who hates all the men and she knows
about it and says even worse things about me, hahaha!!  She is really
bitter sometimes, but pretty realistic and I do love extremely sincere
friends, haha!!  ;D

Well, she knows in person Jake, Isis and a lot of people mentioned and
doesn't like anyone.  None of them, I swear.  :P

Told me some stories about egocentrism, injured pride, politics, money,
etc, and asked me to avoid this kind of f*cking harmful crazy people
because I am too stupid to protect myself, haha!!  It makes sense, but now
I am curious about the truth, haha!!  ;D

She asked me to avoid meetings with one of alleged victims at any cost,
because "she is a f*cking sick jealous crazy b*tch", able of killing me and
tell lies about self-defense or psychotical breaks and lapses of memory in
public.  My friend is a bit neurotic, but is a good woman and is just
worried about me, hihi...  ;)

Just in case, the world is really small and I will contact one of the
ex-partners of this alleged victim in special.  I don't know him, but I
would like to know if she likes scandals, lies, breaking objects, this kind
of crazy stupid actions...  She has an ego much bigger than usual and I
know that Jake has the same problem, ugh!  :P

Warm hugs and tender kisses!!!  Ah, thank you everybody!!!  I received some
lovely messages about helping homeless people and two donations, yay!!!  ;D

(No Tor t-shirts, but some hot blankets!  <3 )
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2016-03-19 Thread Lukas Epple
Help yourself:

> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2016-03-19 Thread Cj is here
Can u plz stop sending me these emails
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2016-03-13 Thread grarpamp
> Some weeks ago Daniel briefly explained how OCv2 would work but abusing
> the HS-Directories. Unfortunately, the Tor-Project could build code the
> prevent this.
> I appreciate every idea how to run/use a database for this purpose.

That's where you have to contact Tor and jointly develop an
API for this so that it will always be there to use.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2016-02-02 Thread BM-2cTPSBeTK5RpF8A9ymciUDMaX61KzvzJu6
Dear Tor developers,

I am sorry to ask such a basic question but I am confused by
whether I should have the Tor browser set to;
a. Temporary allow this page
b. Revoke Temporary Permissions
c. allow scripts globally

After I downloaded the Tor's browser a few days ago it was working perfectly
but I did not notice after the download which of the three settings above
was set.

Today I perhaps made the error of changing the setting to revoke temporary
permissions, but after I did this an encrypted email website I just began
to use stated that it would not allow access because JavaScript needed to
be
enabled.

After changing the setting to "Temporary allow this page" then I could
again access email in one encrypted email service.  However now I can no
longer access another encrypted email service (an impressive one)which has
been working perfectly for me for weeks.

So please inform me which setting I should be using.  (Or alternatively I
could delete the Tor browser and just install it again to see the initial
setting)

Also, I thought it would be helpful to forward some important information
I just encountered today.  Please read the ARS Technica article at the
link below.  I found this by way of a Reddit thread.

...
http://arstechnica.com/security/2016/02/default-settings-in-apache-may-decloak-tor-hidden-services/

Tor is a tremendous service and everyone certainly appreciates your
diligent efforts.

Thank you and I am looking forward to your assistance.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2016-01-28 Thread Robin Kipp

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-09-19 Thread Darling Suzy
-- 
http;//www.google.comwww.google com
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-29 Thread blaatenator
Indeed, some (coincidentally???) big corps do block relays. For a while
I ran a relay from my home connection and for instance Nike was not
reachable without the use of a VPN (I don't mind, and even favor, Nike
being out of the picture, not everyone feels the same way ;) ).


On 28-08-15 18:56, Rejo Zenger wrote:
 ++ 23/08/15 15:59 -0800 - I:
 Beware though that running a Tor Relay from your home connection is
 discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en
 Running an exit from home is discouraged not a middle relay.

 Less fearmongering might help expand Tor.
 Reality is a thing of nuance: although the risks of running a middle 
 relay from home are for more limited compared to running an exit relay 
 from home, there are some things that should be taken into account.

 Most notably: the IP-address from your home connection will be listed in 
 one or more block lists, based on the criteria that these lists list all 
 none Tor relays. This may be a problem when site owners decided to deny 
 traffic from IP-addresses that are running a Tor relay. As a result of 
 that, if you run a middle relay from home, you may have difficulties 
 reaching some sites.





-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-29 Thread Roman Mamedov
On Sat, 29 Aug 2015 17:11:23 +0200
blaatenator blaatena...@openmailbox.org wrote:

 Indeed, some (coincidentally???) big corps do block relays. For a while
 I ran a relay from my home connection and for instance Nike was not
 reachable without the use of a VPN (I don't mind, and even favor, Nike
 being out of the picture, not everyone feels the same way ;) ).

It's not some big corps, it's just the same simgular entity: Akamai.
www.nike.com is using the Akamai CDN. And the issue of Akamai blocking
non-exit nodes has been raised on this list time and time again in the past.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-08-28 Thread SAID MADI
Please Almsaadh sooner that all the files are not open to me because I
know no PDF files and Word and photos and a video message, but not in
the form of image documents as follows:

what happend to your files
all of your files protected by a strong encryption with RSA-2048 CAN
BE FOUND Here
what does this mean
this meas that the structure and data within your files have been
irrevocably changed, you will not be able to work with them read them
or see them, it is the same thing as losing them forever, but with our
help, you can restore them.
how di this happen
especially for you , on our server was generated the secret key pair
RSA-2048 - public and private.
All your files were encrypted with the public key, which has been
transferred to your computer via the internet.
decrypting of your files is only possible with the help of the private
key and decrypt program, wich is on our secret server.
What do i do
alas; if you do do not take the necessary measures for the specified
time then the conditions for obtaining the private key will be
changed.
if you really value your data, then we suggest you do not waste
valuable time searching for other solutions because they do not exist.

for more specific instructions, please visit your personal home page,
there are a few different addresses pointing to your page below:


if for some reasons the addresses are not available , follow these steps:
1- download and install tor-browser :
www.torproject.org/progects/torbroser.html.en
2- after a successful installation, run the browse and wait for initialization.
3- Type in the address bar
4- follow the instructins on the site.


important information
your personal page
your personal page ( using TOR )
your personal page code (if you open the site ( or TOR's ) directly )



 I tried to find solutions and follow the steps but to no avail
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-28 Thread kleft
Hey Said,

You were injected by a virus called 'ransomware'. This software has encrypted 
your data using a private key which is only available through the attacker. 
Despite that you shouldn't pay money to anybody for decrypting your files or 
making the private key available to you. 

There are several methods available to 'clean' your computer, just google for 
'CTB removal' but I recommend you to setup your computer with a clean and fresh 
install of your OS and restore your data from a backup.

The ransomware/ virus is not affiliated with or made by the Tor Project in any 
way. 

Regards,

Kleft 

 On 28 Aug 2015, at 08:24, SAID MADI madi.sai...@gmail.com wrote:
 
 
 Please Almsaadh sooner that all the files are not open to me because I
 know no PDF files and Word and photos and a video message, but not in
 the form of image documents as follows:
 
 what happend to your files
 all of your files protected by a strong encryption with RSA-2048 CAN
 BE FOUND Here
 what does this mean
 this meas that the structure and data within your files have been
 irrevocably changed, you will not be able to work with them read them
 or see them, it is the same thing as losing them forever, but with our
 help, you can restore them.
 how di this happen
 especially for you , on our server was generated the secret key pair
 RSA-2048 - public and private.
 All your files were encrypted with the public key, which has been
 transferred to your computer via the internet.
 decrypting of your files is only possible with the help of the private
 key and decrypt program, wich is on our secret server.
 What do i do
 alas; if you do do not take the necessary measures for the specified
 time then the conditions for obtaining the private key will be
 changed.
 if you really value your data, then we suggest you do not waste
 valuable time searching for other solutions because they do not exist.
 
 for more specific instructions, please visit your personal home page,
 there are a few different addresses pointing to your page below:
 
 
 if for some reasons the addresses are not available , follow these steps:
 1- download and install tor-browser :
 www.torproject.org/progects/torbroser.html.en
 2- after a successful installation, run the browse and wait for 
 initialization.
 3- Type in the address bar
 4- follow the instructins on the site.
 
 
 important information
 your personal page
 your personal page ( using TOR )
 your personal page code (if you open the site ( or TOR's ) directly )
 
 
 
 I tried to find solutions and follow the steps but to no avail
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-28 Thread Rejo Zenger
++ 23/08/15 15:59 -0800 - I:
 Beware though that running a Tor Relay from your home connection is
 discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en

Running an exit from home is discouraged not a middle relay.

Less fearmongering might help expand Tor.

Reality is a thing of nuance: although the risks of running a middle 
relay from home are for more limited compared to running an exit relay 
from home, there are some things that should be taken into account.

Most notably: the IP-address from your home connection will be listed in 
one or more block lists, based on the criteria that these lists list all 
none Tor relays. This may be a problem when site owners decided to deny 
traffic from IP-addresses that are running a Tor relay. As a result of 
that, if you run a middle relay from home, you may have difficulties 
reaching some sites.


-- 
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J r...@zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
Signal0507 A41B F4D6 5DB4 937D  E8A1 29B6 AAA6 524F B68B
  93D4 4C6E 8BAB 7C9E 17C9  FB28 03


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread NOC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

As the Tor Relay software does not fully utilize multiple cores yet
the use of the parallel processing power is not that big. It might
help a bit but not as you would love to see it.

The choice is yours.

Beware though that running a Tor Relay from your home connection is
discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en

On 8/23/15 10:52 PM, Naseem Dillman-Hasso wrote:
 Hello, I have the ability to get a parallel processing computer. I
 was wondering if this would help run a tor relay faster, or if a
 regular computer works just as fast. Thanks so much.
 

- -- 
Tim Semeijn
Babylon Network

PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCgAGBQJV2kB7AAoJELGHAxAqVA+lDkgP/A1UAvZmnykFhmDik1W/J62v
ARW/pP4KcGtP3oX03lggSti70J00NDGd3yy1YSeChi/KklHXU2y4dhp0VPQE1Sut
IhMownEa/p4T9ZV9lnJg6Nh5ITCHP4lrUz586XLgBvFAWkF73JVF8zjlfVwBx6xl
Lx49s06Rl238qA5F6fC5Xcg8i7T2jFWaLbU5nEt6PY1TIx/8r5Fw+cYDiiR2smW2
AGQs6XKZLctoBnXeM+6Cm2ip2KopPMPdPBkcPrlU9PvmEy95qpy5tTyGejKuoQfP
evpYm1Y+TWD6FRvHf+I8UOXthLryx5o+jHN9jQn0t8H6SPaDSl5EYo/K8F8WQRcd
0mDcbDRR2662EqMwt0aZxWiMdBCpXm/XapJdXBn4LqwYPL4J8V48qb9RfiHy6Js+
rlmpJxYlAy+qNE6GsPT5Z3Sn9/YKVFa84E4AZxKi+ij9vKDnEu2EJ67r2OckWtEC
9WXF6sxgFyO4DF6TNrRe8NlKjl+E0HtLl+Y6EoDOoCiNabZ3qMe4tEjLf5E3qC5u
t/7AAJ/YvUW5JmhHXSEmllKB71POuUVwvUPeQBSUvraxKP+0E9cjBKQFEUkjHsrf
HSXDiVbgWZLoTKcIKDyiIceXy490oquR5zSzW/Em37kCqjW3Q2xLVILdVKJ8ENKn
X+3E97iVDnHySKhySjFt
=sWyn
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread I
 
 Beware though that running a Tor Relay from your home connection is
 discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en


Running an exit from home is discouraged not a middle relay.

Less fearmongering might help expand Tor.

Robert



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-08-23 Thread Naseem Dillman-Hasso
Hello, I have the ability to get a parallel processing computer. I was
wondering if this would help run a tor relay faster, or if a regular
computer works just as fast.
Thanks so much.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread NOC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

My bad, I should have explicitely mentioned exit indeed.

On August 24, 2015 1:59:31 AM GMT+02:00, I beatthebasta...@inbox.com wrote:

 Beware though that running a Tor Relay from your home connection is
 discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en


Running an exit from home is discouraged not a middle relay.

Less fearmongering might help expand Tor.

Robert



--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

- --
Tim Semeijn
Babylon Network

PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5
-BEGIN PGP SIGNATURE-
Version: APG v1.1.1
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=T0ws
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-17 Thread Nick Mathewson
On Tue, Aug 11, 2015 at 9:28 PM, Thomas White thomaswh...@riseup.net wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Does anyone in Tor want to name a price to get this task done? Can
 then be followed by a match donation to be spent with on whatever you
 wish once the multicore has been added.

Hi, Thomas, and congratulations!  You've asked a question I wasn't
prepared to answer.  Here's a thread we had about it today:

18:25  nickm So, I assume people have seen the tor-relays/tor-talk
thread about Hey Tor folks, what would you want in exchange for
making tor parallelize better
18:25  nickm Do we have a way of even answering that?
18:26  nickm If not, I think we should reply to say This is a
generous offer and we need to apologize for taking so long, but it's
not been something we had a way of answering before. We'll try to come
up with such a way and see what it outputs RSN
18:26  nickm thoughts?
18:44  arma4 sounds plausible. i think the issue is a combination of
not enough developerpower and also not enough money
18:44  arma4 a short small amount of money wouldn't be enough to
overcome the first issue,
18:45  arma4 and we need to overcome both
18:47  nickm yeah.  I think that anything less than a year fulltime
of dev time, plus overhead and incidentals, can't work out here.
18:47  nickm plus, no timeline promised
18:48  nickm arma4: thoughts?
18:49  arma4 are there any incremental steps that can be done, by
other people, in the mean time?
18:49  nickm in theory sure
18:49  arma4 it seems like a wildly unpredictable amount of work
18:50  nickm in practice nobody who isn't a Solid Wizard is going to
get much done here
18:50  arma4 and it's not even clear, to me, what architecture we
should use to parallelize cleanly
18:50  arma4 all of this ipc stuff sounds great in theory until you
try to run the program on ios or something and then boy are you
surprised
18:51  nickm I have an architecture in mind for circuit crypto
18:51  nickm for tls, I have no bloody clue
18:52  toml but would we feel good about taking a shot if there was
one full-time equivalent devoted to the problem?
18:52  arma4 maybe explaining very briefly why it isn't trivial, and
why it is going to be hard to do right, would be helpful for the folks
wondering why we don't just do it already
18:52  toml arma: I agree that we should take the opportunity to
explain the challenge
18:52  arma4 toml: and if we had said full-time developer, would
this be the most important thing to have her work on?
18:53  arma4 so far the answer has been no, other things are more important
18:53  toml well, it would be an answer to the question: what would it take?
18:53  toml so if they put cash on the barrel head, we could
dedicate. (I would bet there would be other associated benefits not
strictly related)
18:54  toml probably the cost would be too steep, but they would
know where we stand. (part of the education piece)
18:55  * nickm suggests that we just copy-and-paste this conversation
into the thread
18:56  arma4 sounds good
18:58  toml arma: and let's always use the term full-time
equivalent. There is an industry standard for a FTE amount, but we
reserve the right to apportion those funds among more than one person.
18:58  nickm any more to add ?
19:00  nickm I feel like we could safely say More than 80k and less
than 500k on this today, and if those numbers don't scare people
away, invest time into digging into getter numbers
19:01  arma4 sounds good. it is basically a big architectural change
inside tor. our work on better testing and better modularity is
(slowly) moving us in the right direction as we wait.
19:01  toml I would say minimum $100K, as this would leapfrog
several other priorities.
19:02  nickm also overhead
19:02  toml si
19:02  nickm yeah, good point, toml
19:03  nickm OTOH, we can also mention the $0 price point: for no
money at all, we will _care_ about this, because we already do. And at
some point eventually, somebody will surely work on it in their free
time, one of these days
19:03  toml (and that is too low for a FT equivalent, but it is
enought to motivate us to explore
19:03  arma4 heck, not only do we care, but we even wrote up a thing
on how it might be done
19:04  toml arma: should we share that? (or share it again?)
19:05  arma4 nickm should point to it in his response i hope
19:06  arma4 he wrote it so hopefully he knows what is the best
thing to point at :)
19:06  nickm well,it's quite old and maybe I should revise some
morning/afternoon when I am smarter
19:08  toml perhaps leave it as is — show how long we have been
thinking on this. Then maybe a add brief bit on things we have learned
since, at your leisure.
19:08  arma4 that way lies paralysis. which is almost like
parallelization, but not quite. :)
18:13  nickm ok.  So I am going to add this to topics for the
wednesday core tor dev meeting, and send it to the ml, unless somebody
objects?

I think the URL I was asked to add was

Re: [tor-talk] (no subject)

2015-08-12 Thread Apple Apple
And yeah, maybe
because other priorities, such as the need to work on other features and
keep
the code reasonably simple still outweigh the performance benefit from
proper
multi-threading.

Don't forget about security.

Is it worth having Tor run a little faster at the expense of complex multi
threaded code with more potential security vulnerabilities?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread syndikal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

 On Tue, 11 Aug 2015 21:08:45 -0700
 $20 today gets you not just a public IP address, but a whole 100 Mbit
 unmetered VM or a dedicated server to go with it, and not even just one,
 but
 easily two or three.

i'd be very interested in purchasing these if you were to share the
offers! finding hosts happy to allow exit nodes is tricky but it seems
like you've got it down.

syndikal

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJVy79zAAoJECUseDL/8z6TkpkP/0ru6awh39lckiikFnU1WTRQ
VOdJWBweyIP/YVZpsKdTqlqtOzRHtUfhkbY/S5fPXD8eGQfVv7XJ8dkYyrCRwUAj
ARqbQADzd4iW94MJYydaWEqipuVms68yN5GKz4J7KL17HqOUZi1TQ2hEloFodZR9
fB6Kdzqve/kLM8Mnwrs2WaNZyG0BpdvHi2HmQR+pmnAm4H2Vowu+0NUO7S8jDC+F
tJwrrOUuhDlJP2iCiB8HpKbidmII5CKwdSkBUpGtf0rrdO7Tef47jXIJrca3sn+1
URI/JJ0EEQDYB1YG9MqfvCbmldp7tNtgqtndUIMaT0j37Ai0CT4xdxIWPgFj5Osh
147jB35subj7DiBWd1ewtzUZT9XDIO7NdALGIrthBasYp2FJ/JopYVaaRMys8yG3
nlS+TPfRCWo2DWZSX2cHyLkvSgoHIScKJTNz9na83+Cb5M/8y+sOVkCEUdBnVQlv
XB6teY5LfOvg8LCNkTUrOY5/gsT+McEnjma0JLgXnSg0k61cN87qwMo9LYcqZZH3
FSJlKaVCLWhzPoINzAPu/xKP7/CgqW5zhINpdnQyksZUQXuRPJUdXi7LAVXaA2wJ
7dj1le0hNHGO/PyZEiQzzqduoZwvfj81d2bLI2lFXgc3fOsOKZK77k3g0em7gJCY
70dfdWN3s7KNJP0az037
=04MA
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

$20 a month for a dedicated IP is a ripoff. My point here is actually
not about the cost of multicore being added as each user can rate
limit it to curb additional expense, but the cost of actually getting
the thing coded and implemented.

For relays, being able to make more use of available bandwidth would
vastly increase the network speed, furthermore make home clients see
an improvement in their daily Tor usage. It also benefits hidden
service people as they can then run their Tor processes on more than
one core and thus handle higher volumes of traffic.

As a disclaimer, I am of course asking since my company is going live
in the next few months. But of course, that is also where my funding
proposal is coming from.

On 12/08/2015 05:08, Ryan Carboni wrote:
 Does anyone in Tor want to name a price to get this task done?
 
 
 
 The price of a public dedicated ip address is at worst, $20 a 
 month.
 
 Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
  $60,000 per year. That is perhaps the only price of no multicore 
 support. Although, many Tor nodes are hosted using dynamic IPs, so 
 perhaps the cost is closer to $1,000 per year. In any case, I'm
 not sure how many sequential operations there are.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=AUY9
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread Ryan Carboni
Last year's summer of code had someone working on Tor multicore.

This year's summer of privacy has Donncha O'Cearbhaill working on load
balancing for hidden services.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Yuri

On 08/11/2015 15:13, Ryan Carboni wrote:

Why is there no multicore support for Tor? I haven't been able to find an
answer to this question.


This is maybe because even with the quite high for the Tor network 
bitrates of 5-6MBps tor process never comes close to 100% CPU usage on 
the average hardware. So multicore capability will add no benefit.


Yuri
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Roman Mamedov
On Tue, 11 Aug 2015 15:28:01 -0700
Yuri y...@rawbw.com wrote:

 On 08/11/2015 15:13, Ryan Carboni wrote:
  Why is there no multicore support for Tor? I haven't been able to find an
  answer to this question.
 
 This is maybe because even with the quite high for the Tor network 
 bitrates of 5-6MBps tor process never comes close to 100% CPU usage on 
 the average hardware. So multicore capability will add no benefit.

 never comes close

 to 100% usage

 never

*Repeatedly headbangs on the desk*

Uhm so what was I talking about. Ah yes, I believe that's not the case. It
would add a great deal of benefit actually.

As to why it's not implemented, I think simply because no one has coded it yet.
Often things tend to not exist until someone creates them. For the reason why
it's not added, my guess is because it is rather difficult. And yeah, maybe
because other priorities, such as the need to work on other features and keep
the code reasonably simple still outweigh the performance benefit from proper
multi-threading.

Currently Tor can use about 130-150% of a CPU, so if you have 4 cores you
could run 2 copies of Tor on the same IP and attain a reasonable degree of
your resources' utilization.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-08-11 Thread Ryan Carboni
Why is there no multicore support for Tor? I haven't been able to find an
answer to this question.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Ryan Carboni
 Does anyone in Tor want to name a price to get this task done?



The price of a public dedicated ip address is at worst, $20 a month.

Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
$60,000 per year.
That is perhaps the only price of no multicore support.
Although, many Tor nodes are hosted using dynamic IPs, so perhaps the
cost is closer to $1,000 per year.
In any case, I'm not sure how many sequential operations there are.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread coderman
On 8/11/15, Roman Mamedov r...@romanrm.net wrote:
 ...
 *Repeatedly headbangs on the desk*

 Uhm so what was I talking about. Ah yes, I believe that's not the case. It
 would add a great deal of benefit actually.

it would be useful, particularly on systems with native acceleration
of supported crypto primitives.



 As to why it's not implemented, I think simply because no one has coded it
 yet.

correct. in particular, making the Tor internals efficiently
multi-threaded is difficult due to the particulars of crypto and Tor
network I/O in the implementation.

i thought i had a list of Trac tickets to the gist of this matter,
  alas i cannot find them. perhaps someone else has a convenient collection?

this also came up in context of using CUDA or OpenCL to accelerate
network crypto via CPU offload to GPU.

the good news is that it is maybe less hard now, than it was some
years ago, to make this transition to well threaded internals in Tor.
maybe soon, even closer yet. and as you mention, patches welcome since
the best fix is code under test :)


best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Does anyone in Tor want to name a price to get this task done? Can
then be followed by a match donation to be spent with on whatever you
wish once the multicore has been added.

T

On 12/08/2015 00:32, coderman wrote:
 On 8/11/15, Roman Mamedov r...@romanrm.net wrote:
 ... *Repeatedly headbangs on the desk*
 
 Uhm so what was I talking about. Ah yes, I believe that's not the
 case. It would add a great deal of benefit actually.
 
 it would be useful, particularly on systems with native
 acceleration of supported crypto primitives.
 
 
 
 As to why it's not implemented, I think simply because no one has
 coded it yet.
 
 correct. in particular, making the Tor internals efficiently 
 multi-threaded is difficult due to the particulars of crypto and
 Tor network I/O in the implementation.
 
 i thought i had a list of Trac tickets to the gist of this matter, 
 alas i cannot find them. perhaps someone else has a convenient
 collection?
 
 this also came up in context of using CUDA or OpenCL to accelerate 
 network crypto via CPU offload to GPU.
 
 the good news is that it is maybe less hard now, than it was some 
 years ago, to make this transition to well threaded internals in
 Tor. maybe soon, even closer yet. and as you mention, patches
 welcome since the best fix is code under test :)
 
 
 best regards,
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=5Wd9
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Roman Mamedov
On Tue, 11 Aug 2015 21:08:45 -0700
Ryan Carboni rya...@gmail.com wrote:

  Does anyone in Tor want to name a price to get this task done?
 
 
 
 The price of a public dedicated ip address is at worst, $20 a month.

What. More like $3-5, and that's indeed at worst, with the price more
commonly being around $1-2.

$20 today gets you not just a public IP address, but a whole 100 Mbit
unmetered VM or a dedicated server to go with it, and not even just one, but
easily two or three.

I get it that you want to influence the decision making, but using comically
wrong estimates will not get you anywhere.

 Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
 $60,000 per year.
 That is perhaps the only price of no multicore support.
 Although, many Tor nodes are hosted using dynamic IPs, so perhaps the
 cost is closer to $1,000 per year.
 In any case, I'm not sure how many sequential operations there are.


-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-07-27 Thread Bill Cunningham
https://www.torproject.org/download/download-easy.html.en

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-22 Thread Çağıl P . Şesto
On Sun, Jun 21, 2015 at 10:35:09PM -0700, Andy Iwanski wrote:
 I'm screwed.  But it they ain't getting my money.  
 My files weren't that valuable to me or anyone else. 
 We can never let the terrorists win.

See https://blog.torproject.org/category/tags/ransomware and
beisdes that, it is considered good practice to do backups.

There may be tools available thay may decrypt your data.

https://en.wikipedia.org/wiki/Backup
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-22 Thread I
 -Original Message-
 From: aiwan...@cox.net
 
 I'm screwed.  But it they ain't getting my money.  My files weren't that
 valuable to me or anyone else.  We can never let the terrorists win.


The term terrorism is now virtually useless and does not fit your situation.

https://firstlook.org/theintercept/2015/06/19/refusal-call-charleston-shootings-terrorism-shows-meaningless-propaganda-term/

Robert


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Mirimir
On 06/21/2015 12:29 PM, Andrew F wrote:
 Would Linux work as a rescue disk for him?

If Joe is right about the cause, no.

His stuff is encrypted, and he needs the passphrase.

SNIP
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Andy Iwanski
I'm screwed.  But it they ain't getting my money.  My files weren't that 
valuable to me or anyone else.  We can never let the terrorists win. 




 Mirimir miri...@riseup.net wrote: 
On 06/21/2015 12:29 PM, Andrew F wrote:
 Would Linux work as a rescue disk for him?

If Joe is right about the cause, no.

His stuff is encrypted, and he needs the passphrase.

SNIP
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Andrew F
Would Linux work as a rescue disk for him?


On Friday, June 19, 2015, Joe Btfsplk joebtfs...@gmx.com wrote:


 On 6/19/2015 4:17 AM, Andy Iwanski wrote:

 Can someone please help me.  I have lost access to all my files.  I do
 not understand any of this and need to access my stuff.  I can be reached
 at XXX-XXX-.  I tried following the directions but it didn't work.

  Also, it's a bad idea to post personal data (phone #, home addresses,
 etc.) anywhere on the internet that the general public* could access it.
 * Meaning, spammers, marketers, but possibly also persons w/ some
 malicious intent.
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-19 Thread Joe Btfsplk


On 6/19/2015 4:17 AM, Andy Iwanski wrote:

Can someone please help me.  I have lost access to all my files.  I do not 
understand any of this and need to access my stuff.  I can be reached at 
XXX-XXX-.  I tried following the directions but it didn't work.

Also, it's a bad idea to post personal data (phone #, home addresses, 
etc.) anywhere on the internet that the general public* could access it.
* Meaning, spammers, marketers, but possibly also persons w/ some 
malicious intent.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-19 Thread Geoff Down
If you are the victim of ransomware, you have my sympathy. Note however
that Tor is not connected to the malware that has encrypted your files,
nor to the criminals. It's just software for browsing the private web.
There is a small chance that this blog post may help you:
http://krebsonsecurity.com/2014/08/new-site-recovers-files-locked-by-cryptolocker-ransomware/
 If you are intent upon paying the ransom and need to get Tor working,
 then this list is the right place for help getting Tor working - but
 only that. Note that you can also access .onion sites via
 https://tor2web.org/ .
Good luck
GD

On Fri, Jun 19, 2015, at 10:17 AM, Andy Iwanski wrote:
 Can someone please help me.  I have lost access to all my files.  I do
 not understand any of this and need to access my stuff.  I can be reached
 at 480-688-1048.  I tried following the directions but it didn't work. 
 
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
http://www.fastmail.com - Choose from over 50 domains or use your own

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-06-19 Thread Andy Iwanski
Can someone please help me.  I have lost access to all my files.  I do not 
understand any of this and need to access my stuff.  I can be reached at 
480-688-1048.  I tried following the directions but it didn't work. 


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2015-05-20 Thread Darling Suzy

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-12-06 Thread EGOTISTICALSHALLOT

Tor community, Martin Peck, Diane Roark..

Whonix Qubes has been called out in a US Gov court document of a NSA  
related whistleblower case of Diane Roark, inside a recent affidavit  
of Martin Peck's.


http://cryptome.org/2014/12/peck-roark-affidavit.pdf

Quote:

EGOTISTICALSHALLOT was created in 2014 by Tailored Access Operations  
as a QUANTUMTHEORY Computer Network Exploitation component effective  
against hardened Whoonix Qubes users on the Tor Network.


Extensive details of this instance have been documented here..

https://www.whonix.org/forum/index.php/topic,805.0.html

Would Martin Peck or Diane Roark please promptly inform the community  
of the known origins of this NSA EGOTISTICALSHALLOT text written in  
their documents, and any knowledge of its authenticity as being real  
or fake.


And if anyone else has any additional information regarding this  
EGOTISTICALSHALLOT mention-/-codename-/-program then please contribute.


Thx


-

VFEmail.net - http://www.vfemail.net
ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the 
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!  
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!  
--

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] no subject

2014-11-13 Thread Alec Muffett
Ah, apologies for the mis-send.

- alec

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-10 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 GUYS still looking for ed snowden. i am a producer in l.a. and want to do
 his entire life story, get his exclusive permission, a 1 or 2 yr option.
 please help connect us gregcurcio at gmail thanks men

This is the wrong venue for this request. I am highly doubtful that
anyone here knows Edward Snowden.  This is comparable to walking
into the auto dealership where Snowden bought his car and yelling,
Yo does anyone here know this guy.  You got a few no's and a
couple of suggestions for where to look.  Shouting further will
not likely net you any further leads.

Now if you'd like to buy a car... (discuss Tor and Tor related topics)

Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP
X6HKkqQ/S7RfUn5qdIK4Jic=
=Wzlm
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-10 Thread Greg Curcio
sorry, wont happen again, frustrated about what i read, oliver stone

Greg Curcio

On Fri, Oct 10, 2014 at 6:17 AM, Derric Atzrott 
datzr...@alizeepathology.com wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

  GUYS still looking for ed snowden. i am a producer in l.a. and want to do
  his entire life story, get his exclusive permission, a 1 or 2 yr option.
  please help connect us gregcurcio at gmail thanks men

 This is the wrong venue for this request. I am highly doubtful that
 anyone here knows Edward Snowden.  This is comparable to walking
 into the auto dealership where Snowden bought his car and yelling,
 Yo does anyone here know this guy.  You got a few no's and a
 couple of suggestions for where to look.  Shouting further will
 not likely net you any further leads.

 Now if you'd like to buy a car... (discuss Tor and Tor related topics)

 Thank you,
 Derric Atzrott
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.2 (MingW32)

 iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP
 X6HKkqQ/S7RfUn5qdIK4Jic=
 =Wzlm
 -END PGP SIGNATURE-

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-10-09 Thread ben ho
get bridges
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread ben ho
get bridges

2014-10-10 1:35 GMT+08:00, ben ho b10pok...@gmail.com:
 get bridges

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread ben ho
get bridges

2014-10-10 1:23 GMT+08:00, ben ho b10pok...@gmail.com:
 get bridges

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread Seth David Schoen
ben ho writes:

 get bridges

Hi,

Unfortunately you sent this to a public discussion list for talking
about Tor, which isn't the right address for requesting bridges.

The right place to send that request is brid...@bridges.torproject.org.

If you do that and your bridges don't work, you can also try other
resources at

https://bridges.torproject.org/

Good luck!

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread Greg Curcio
GUYS still looking for ed snowden. i am a producer in l.a. and want to do
his entire life story, get his exclusive permission, a 1 or 2 yr option.
please help connect us gregcurcio at gmail thanks men

Greg Curcio

On Thu, Oct 9, 2014 at 10:37 AM, ben ho b10pok...@gmail.com wrote:

 get bridges

 2014-10-10 1:23 GMT+08:00, ben ho b10pok...@gmail.com:
  get bridges
 
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread I
Look at https://firstlook.org/theintercept/staff/ for Glenn Greenwald's address.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-10-01 Thread peterholy SARRIS
SARRIS good day I need help . running tor onion  browser bundle on a
Panasonic Toughbook cf-29  running on 32bit 14.04 Ubuntu oS only  .
Microsoft  windows has been removed out of the thoughbook . like you to
send to me a how to run tor onion browser via command prompt  on a
Panasonic thoughbook cf-29 running only on a 32 bit 14.04 Ubuntu operating
system .
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-09-30 Thread René Pedersen
 Hello is it possible to set a router to relay tor, all the time like 
portforwarding.
Because I will help tor, also ween my pc is shut off
  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-09-30 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hy there,

maybe you want to take a look at this.

https://elrippoisland.net/public/how_to/anonymity.html

Kind regards,
elrippo

On 30. September 2014 12:52:10 MESZ, René Pedersen kpdenm...@hotmail.com 
wrote:
Hello is it possible to set a router to relay tor, all the time like
portforwarding.
Because I will help tor, also ween my pc is shut off
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

- --
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net

Encrypted messages are welcome.
0x84DF1F7E6AE03644

- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.11 (GNU/Linux)
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=otlL
- -END PGP PUBLIC KEY BLOCK-


-BEGIN PGP SIGNATURE-
Version: APG v1.1.1

iQJcBAEBCgBGBQJUKpqPPxxlbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0
ZWQpIDxlbHJpcHBvQGVscmlwcG9pc2xhbmQubmV0PgAKCRAkQ93r2VDR68/ID/wM
X9uhbgNoZ5Q04l7XDCWR8d6dF9R2deL/azDioMC2ixCJfdY++SRbvFCQ9hqHbyqS
/KKz3ojo1K+BthiaGCE24GXgSaDLcv1P9Wie0iGM3rJF1CNzDTim5u7pKhCjSGma

[tor-talk] (no subject)

2014-07-29 Thread cav78
Hallo everybody.

I would like to know if it's necessary to 
install or configure a web proxy (privoxy or polipo) with Tor Browser 
Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
Orbot
 (a software for Android) includes Polipo, but I don't see it in Tor 
Browser. Is it really important or we can do without it? Sorry for my 
english if it's not so perfect. Bye.


  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread krishna e bera
On 14-07-29 04:44 PM, cav78 wrote:
 I would like to know if it's necessary to 
 install or configure a web proxy (privoxy or polipo) with Tor Browser 
 Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
 Orbot
  (a software for Android) includes Polipo, but I don't see it in Tor 
 Browser. Is it really important or we can do without it? Sorry for my 
 english if it's not so perfect. Bye.

Polipo was removed a long time ago because it is no longer needed.  See:
https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0

Privoxy performed the same functions so it also isnt needed.

The FAQ item explaining this was removed as well, but a dangling
reference to it remained behind:
https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter

Polipo is still mentioned in the new FAQ (even in association with
Mozilla) which could lead to confusion.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread Mirimir
On 07/29/2014 02:44 PM, cav78 wrote:
 Hallo everybody.
 
 I would like to know if it's necessary to 
 install or configure a web proxy (privoxy or polipo) with Tor Browser 
 Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
 Orbot
  (a software for Android) includes Polipo, but I don't see it in Tor 
 Browser. Is it really important or we can do without it? Sorry for my 
 english if it's not so perfect. Bye.

No, it's not necessary for using the Tor browser. Firefox no longer
requires it. You only need Polipo for other apps that need a web proxy,
and won't work with Tor's SOCKS5 proxy. For apps without any native
proxy support, you need something like torsocks.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread ideas buenas
Do you mean TBB over a VPN?


On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera k...@cyblings.on.ca wrote:

 On 14-07-29 04:44 PM, cav78 wrote:
  I would like to know if it's necessary to
  install or configure a web proxy (privoxy or polipo) with Tor Browser
  Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
  Orbot
   (a software for Android) includes Polipo, but I don't see it in Tor
  Browser. Is it really important or we can do without it? Sorry for my
  english if it's not so perfect. Bye.

 Polipo was removed a long time ago because it is no longer needed.  See:
 https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0

 Privoxy performed the same functions so it also isnt needed.

 The FAQ item explaining this was removed as well, but a dangling
 reference to it remained behind:

 https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter

 Polipo is still mentioned in the new FAQ (even in association with
 Mozilla) which could lead to confusion.

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-27 Thread obx
 I would like to know if it's necessary to 
 install or configure a web proxy (privoxy or polipo) with Tor Browser 
 Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.

No, this is not necessary.

 Orbot
  (a software for Android) includes Polipo, but I don't see it in Tor 
 Browser. Is it really important or we can do without it? Sorry for my 
 english if it's not so perfect. Bye.

Not sure why they do this, but I assume it's to provide Tor to
applications that are unable to use socks5.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-07-26 Thread cav78
Hallo everybody.

I would like to know if it's necessary to 
install or configure a web proxy (privoxy or polipo) with Tor Browser 
Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
Orbot
 (a software for Android) includes Polipo, but I don't see it in Tor 
Browser. Is it really important or we can do without it? Sorry for my 
english if it's not so perfect. Bye.

  
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-05 Thread Geoff Down


On Fri, Jul 4, 2014, at 11:42 PM, ideas buenas wrote:
 Do a Whois lookup of  the addreses I gave u before  and check that all of
 this resolve to markmonitor.  s3-us-west-2-w.amazonaws.com
 amazonaws.com is registered with Markmonitor, yes: The 'registrar' is
 MarkMonitor, Inc and the 'registrant' is Amazon.com, Inc.
Nothing bad about that, Markmonitor are a big Registrar - if you don't
understand what 'registrar' and 'registrant' mean, see
http://en.wikipedia.org/wiki/Domain_name_system#Domain_name_registration


 http://edge-star-shv-04-gru1.facebook.com
 just when I was visiting www.lemonde.fr ?
 If you mean that address appears in the status bar when page
 http://www.lemonde.fr/ is loading, look at the bottom of that page.
 There is a Facebook logo.
Le Monde have a Facebook account, and they are letting Facebook put
tracking links in their webpages:
http://en.wikipedia.org/wiki/Web_analytics
 So they are trying to track you, but probably only to sell you things.
This is something that Torbrowser is designed to stop, as long as you
clear cookies between sessions.
GD

-- 
http://www.fastmail.fm - Send your email first class

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
I don think is chatbeat. How many inindetifed servers do u have?


On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote:

 See https://chartbeat.com/faq/what-is-ping-chartbeat-net
 for what I think you are seeing - website analytics.

 On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
  Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
  this,please. Nor in Whois
 
 
  On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
  wrote:
 
   Another example is this   s3-website-eu-west-1.amazonaws.comOR
   edge-star-shv-08-gru1.facebook.com  OR
   ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
   markmonitor.com
  
  
   On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com
   wrote:
  
   I'm not referring to this.I'm talking of a lot of URI that appears
 when I
   try to link to any site. Every one of those Remote Address start with
 a
   couple o letters followed by numbers like this:
   server-54-230-83-145.mia50.r.cloudfront.net  .
  
  
  
  
   On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
 wrote:
  
   ideas buenas writes:
  
Why is markmonitor.com and its derivates in my TBB? How can I do
 to
   delete
this ? Are they watching me?
  
   Hi,
  
   Are you talking about seeing a markmonitor.com rule in the HTTPS
   Everywhere
   Enable/Disable Rules menu?
  
  
 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
  
   If so, this is one of thousands of HTTPS Everywhere rewrite rules
 that
   are included with HTTPS Everywhere, which is included with the Tor
   Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
   is to automatically access as many sites as possible with secure
 HTTPS
   connections.
  
   HTTPS Everywhere typically does not make your browser access sites or
   services that it would not otherwise have accessed, so it shouldn't
 help
   sites monitor your web browsing if they would otherwise not have been
   able to.  There are definitely lots of sites that can monitor some
   aspects
   of your web browsing because the site operator has included content
   loaded
   from those sites in their web page (so your browser automatically
   retrieves
   that content when you visit the page that embedded the content).  For
   example, there are ad networks whose ads are embedded in thousands or
   millions of different sites, and if you visit any of those sites
 without
   blocking those ads, the ad network operator will get some information
   about your visit when your browser loads the embedded content from
 those
   servers.
  
   The monitor in the name of markmonitor is not a reference to
 monitoring
   users' web browsing.  Instead, it's part of the name of the company
   MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
   Internet services mostly to very large companies.
  
   https://www.markmonitor.com/
  
   Their name is supposed to suggest that they can monitor their
 clients'
   trademarks, but not specifically by spying on Internet (or Tor)
 users'
   web browsing.  It seems that one of their original lines of business
 was
   letting companies know about trademark infringement on web sites, so
 that
   MarkMonitor's customers could threaten to sue those web sites'
 operators.
   They subsequently went into other more infrastructural lines of
 business.
  
   There was an article a few years ago criticizing the large amount of
   power that MarkMonitor has, but most of that power seems to have
 arisen
   mainly because it's an infrastructure provider that some very popular
   sites decided to sign up with for various purposes (primarily to
 register
   Internet domain names, because MarkMonitor's domain name registration
   services make it extremely difficult for somebody else to take over
   control of a domain name illicitly).
  
   The markmonitor.com HTTPS Everywhere rule is one of thousands of
 HTTPS
   Everywhere rules, and its goal is solely to make sure that if you're
   visiting a web page hosted at (or loading content from)
 markmonitor.com
   itself, that your browser's connection to markmonitor.com's servers
 will
   be a secure HTTPS connection instead of an insecure HTTP connection.
  It
   is not trying to give any additional information to those servers or
 to
   cause your browser to connect to those servers when it would not
   otherwise have done so.
  
   (You can see the rule itself in the atlas link toward the beginning
 of
   my message, and see that its effect is to rewrite some http:// links
   into
   corresponding https:// links, just like other HTTPS Everywhere rules
   do.)
  
   Having HTTPS Everywhere rules that relate to a site does not
 necessarily
   mean that your browser has ever visited that site or will ever visit
   that site.  We've tried to make this clear because many of the rules
   do relate to controversial or unpopular sites, or sites that somebody
   could 

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
I don't have any unidentified servers - I don't know what you mean by
that. Which webpage are you visiting? Have you compared what happens
when visiting with Torbrowser and visiting with normal Firefox over the
normal internet?

On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
 I don think is chatbeat. How many inindetifed servers do u have?
 
 
 On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net
 wrote:
 
  See https://chartbeat.com/faq/what-is-ping-chartbeat-net
  for what I think you are seeing - website analytics.
 
  On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
   Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
   this,please. Nor in Whois
  
  
   On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
   wrote:
  
Another example is this   s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com  OR
ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
markmonitor.com
   
   
On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com
wrote:
   
I'm not referring to this.I'm talking of a lot of URI that appears
  when I
try to link to any site. Every one of those Remote Address start with
  a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net  .
   
   
   
   
On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
  wrote:
   
ideas buenas writes:
   
 Why is markmonitor.com and its derivates in my TBB? How can I do
  to
delete
 this ? Are they watching me?
   
Hi,
   
Are you talking about seeing a markmonitor.com rule in the HTTPS
Everywhere
Enable/Disable Rules menu?
   
   
  https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
   
If so, this is one of thousands of HTTPS Everywhere rewrite rules
  that
are included with HTTPS Everywhere, which is included with the Tor
Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
is to automatically access as many sites as possible with secure
  HTTPS
connections.
   
HTTPS Everywhere typically does not make your browser access sites or
services that it would not otherwise have accessed, so it shouldn't
  help
sites monitor your web browsing if they would otherwise not have been
able to.  There are definitely lots of sites that can monitor some
aspects
of your web browsing because the site operator has included content
loaded
from those sites in their web page (so your browser automatically
retrieves
that content when you visit the page that embedded the content).  For
example, there are ad networks whose ads are embedded in thousands or
millions of different sites, and if you visit any of those sites
  without
blocking those ads, the ad network operator will get some information
about your visit when your browser loads the embedded content from
  those
servers.
   
The monitor in the name of markmonitor is not a reference to
  monitoring
users' web browsing.  Instead, it's part of the name of the company
MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
Internet services mostly to very large companies.
   
https://www.markmonitor.com/
   
Their name is supposed to suggest that they can monitor their
  clients'
trademarks, but not specifically by spying on Internet (or Tor)
  users'
web browsing.  It seems that one of their original lines of business
  was
letting companies know about trademark infringement on web sites, so
  that
MarkMonitor's customers could threaten to sue those web sites'
  operators.
They subsequently went into other more infrastructural lines of
  business.
   
There was an article a few years ago criticizing the large amount of
power that MarkMonitor has, but most of that power seems to have
  arisen
mainly because it's an infrastructure provider that some very popular
sites decided to sign up with for various purposes (primarily to
  register
Internet domain names, because MarkMonitor's domain name registration
services make it extremely difficult for somebody else to take over
control of a domain name illicitly).
   
The markmonitor.com HTTPS Everywhere rule is one of thousands of
  HTTPS
Everywhere rules, and its goal is solely to make sure that if you're
visiting a web page hosted at (or loading content from)
  markmonitor.com
itself, that your browser's connection to markmonitor.com's servers
  will
be a secure HTTPS connection instead of an insecure HTTP connection.
   It
is not trying to give any additional information to those servers or
  to
cause your browser to connect to those servers when it would not
otherwise have done so.
   
(You can see the rule itself in the atlas link toward the beginning
  of
my message, and see that its effect is to rewrite 

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Visiting the same website with Tor or normal Firefox its gave me the same
Remote Address:
s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com
as an example. While ones repeat themselves in both browsers, others not.

One class of unidentifies servers are the ones that not respond to a whois
lookup. Other class use an address that not resolve in whois with that
address and instead belongs to other




On Fri, Jul 4, 2014 at 2:47 PM, Geoff Down geoffd...@fastmail.net wrote:

 I don't have any unidentified servers - I don't know what you mean by
 that. Which webpage are you visiting? Have you compared what happens
 when visiting with Torbrowser and visiting with normal Firefox over the
 normal internet?

 On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
  I don think is chatbeat. How many inindetifed servers do u have?
 
 
  On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net
  wrote:
 
   See https://chartbeat.com/faq/what-is-ping-chartbeat-net
   for what I think you are seeing - website analytics.
  
   On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois
   
   
On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
wrote:
   
 Another example is this   s3-website-eu-west-1.amazonaws.comOR
 edge-star-shv-08-gru1.facebook.com  OR
 ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
 markmonitor.com


 On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
 ideasbue...@gmail.com
 wrote:

 I'm not referring to this.I'm talking of a lot of URI that appears
   when I
 try to link to any site. Every one of those Remote Address start
 with
   a
 couple o letters followed by numbers like this:
 server-54-230-83-145.mia50.r.cloudfront.net  .




 On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
 
   wrote:

 ideas buenas writes:

  Why is markmonitor.com and its derivates in my TBB? How can I
 do
   to
 delete
  this ? Are they watching me?

 Hi,

 Are you talking about seeing a markmonitor.com rule in the HTTPS
 Everywhere
 Enable/Disable Rules menu?


  
 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

 If so, this is one of thousands of HTTPS Everywhere rewrite rules
   that
 are included with HTTPS Everywhere, which is included with the
 Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite
 rules
 is to automatically access as many sites as possible with secure
   HTTPS
 connections.

 HTTPS Everywhere typically does not make your browser access
 sites or
 services that it would not otherwise have accessed, so it
 shouldn't
   help
 sites monitor your web browsing if they would otherwise not have
 been
 able to.  There are definitely lots of sites that can monitor
 some
 aspects
 of your web browsing because the site operator has included
 content
 loaded
 from those sites in their web page (so your browser automatically
 retrieves
 that content when you visit the page that embedded the content).
  For
 example, there are ad networks whose ads are embedded in
 thousands or
 millions of different sites, and if you visit any of those sites
   without
 blocking those ads, the ad network operator will get some
 information
 about your visit when your browser loads the embedded content
 from
   those
 servers.

 The monitor in the name of markmonitor is not a reference to
   monitoring
 users' web browsing.  Instead, it's part of the name of the
 company
 MarkMonitor, a subsidiary of Thomson Reuters, that provides
 certain
 Internet services mostly to very large companies.

 https://www.markmonitor.com/

 Their name is supposed to suggest that they can monitor their
   clients'
 trademarks, but not specifically by spying on Internet (or Tor)
   users'
 web browsing.  It seems that one of their original lines of
 business
   was
 letting companies know about trademark infringement on web
 sites, so
   that
 MarkMonitor's customers could threaten to sue those web sites'
   operators.
 They subsequently went into other more infrastructural lines of
   business.

 There was an article a few years ago criticizing the large
 amount of
 power that MarkMonitor has, but most of that power seems to have
   arisen
 mainly because it's an infrastructure provider that some very
 popular
 sites decided to sign up with for various purposes (primarily to
   register
 Internet domain names, because MarkMonitor's domain name
 registration
 services make it extremely difficult for somebody else to take
 over
 control of a domain name illicitly).

 The markmonitor.com 

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down


On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
 Visiting the same website with Tor or normal Firefox its gave me the same

 So this is nothing to do with Tor.

 Remote Address:
 s3-us-west-2-w.amazonaws.com
 ec2-174-129-247-121.compute-1.amazonaws.com
 edge-star-shv-04-gru1.facebook.com
 as an example. 

While ones repeat themselves in both browsers, others not.

That's not particularly unusual - the website you are visiting is seeing
accesses from different countries, and so may be serving slightly
different content to suit those countries.
It may also server slightly different content at different times.

 
 One class of unidentifies servers are the ones that not respond to a
 whois lookup. 
 If you mean that there is no Whois entry for
 s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
 provides data for second-level domains (in this case amazonaws.com),
 not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
 for example) provided only limited information - which they are
 entitled to do. 

 Other class use an address that not resolve in whois with that
 address and instead belongs to other
 
 I don't understand this, sorry. Can you give an example?
GD

-- 
http://www.fastmail.fm - Choose from over 50 domains or use your own

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Do a Whois lookup of  the addreses I gave u before  and check that all of
this resolve to markmonitor.  s3-us-west-2-w.amazonaws.com
 ec2-174-129-247-121.compute-1.amazonaws.com
 edge-star-shv-04-gru1.facebook.com st
http://edge-star-shv-04-gru1.facebook.com
just when I was visiting www.lemonde.fr ?
http://edge-star-shv-04-gru1.facebook.com


On Fri, Jul 4, 2014 at 4:51 PM, Geoff Down geoffd...@fastmail.net wrote:



 On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
  Visiting the same website with Tor or normal Firefox its gave me the same

  So this is nothing to do with Tor.

  Remote Address:
  s3-us-west-2-w.amazonaws.com
  ec2-174-129-247-121.compute-1.amazonaws.com
  edge-star-shv-04-gru1.facebook.com
  as an example.

 While ones repeat themselves in both browsers, others not.

 That's not particularly unusual - the website you are visiting is seeing
 accesses from different countries, and so may be serving slightly
 different content to suit those countries.
 It may also server slightly different content at different times.

 
  One class of unidentifies servers are the ones that not respond to a
  whois lookup.
  If you mean that there is no Whois entry for
  s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
  provides data for second-level domains (in this case amazonaws.com),
  not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
  for example) provided only limited information - which they are
  entitled to do.

  Other class use an address that not resolve in whois with that
  address and instead belongs to other
 
  I don't understand this, sorry. Can you give an example?
 GD

 --
 http://www.fastmail.fm - Choose from over 50 domains or use your own

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject) HTTPS Everywhere

2014-07-03 Thread krishna e bera
On 14-07-02 10:59 PM, Seth David Schoen wrote:
 ideas buenas writes:
 
 Why is markmonitor.com and its derivates in my TBB? How can I do to delete
 this ? Are they watching me?
 
 Hi,
 
 Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
 Enable/Disable Rules menu?
 
 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
 
 If so, this is one of thousands of HTTPS Everywhere rewrite rules that
 are included with HTTPS Everywhere, which is included with the Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
 is to automatically access as many sites as possible with secure HTTPS
 connections.
 
 HTTPS Everywhere typically does not make your browser access sites or
 services that it would not otherwise have accessed, so it shouldn't help
 sites monitor your web browsing if they would otherwise not have been
 able to.  

typically does not?!  Why is that not never?
i am guessing either
a) rogue or buggy HTTPS Everywhere rules
b) sites that redirect SSL/TLS connections elsewhere



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
I'm not referring to this.I'm talking of a lot of URI that appears when I
try to link to any site. Every one of those Remote Address start with a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net  .



On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote:

 ideas buenas writes:

  Why is markmonitor.com and its derivates in my TBB? How can I do to
 delete
  this ? Are they watching me?

 Hi,

 Are you talking about seeing a markmonitor.com rule in the HTTPS
 Everywhere
 Enable/Disable Rules menu?

 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

 If so, this is one of thousands of HTTPS Everywhere rewrite rules that
 are included with HTTPS Everywhere, which is included with the Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
 is to automatically access as many sites as possible with secure HTTPS
 connections.

 HTTPS Everywhere typically does not make your browser access sites or
 services that it would not otherwise have accessed, so it shouldn't help
 sites monitor your web browsing if they would otherwise not have been
 able to.  There are definitely lots of sites that can monitor some aspects
 of your web browsing because the site operator has included content loaded
 from those sites in their web page (so your browser automatically retrieves
 that content when you visit the page that embedded the content).  For
 example, there are ad networks whose ads are embedded in thousands or
 millions of different sites, and if you visit any of those sites without
 blocking those ads, the ad network operator will get some information
 about your visit when your browser loads the embedded content from those
 servers.

 The monitor in the name of markmonitor is not a reference to monitoring
 users' web browsing.  Instead, it's part of the name of the company
 MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
 Internet services mostly to very large companies.

 https://www.markmonitor.com/

 Their name is supposed to suggest that they can monitor their clients'
 trademarks, but not specifically by spying on Internet (or Tor) users'
 web browsing.  It seems that one of their original lines of business was
 letting companies know about trademark infringement on web sites, so that
 MarkMonitor's customers could threaten to sue those web sites' operators.
 They subsequently went into other more infrastructural lines of business.

 There was an article a few years ago criticizing the large amount of
 power that MarkMonitor has, but most of that power seems to have arisen
 mainly because it's an infrastructure provider that some very popular
 sites decided to sign up with for various purposes (primarily to register
 Internet domain names, because MarkMonitor's domain name registration
 services make it extremely difficult for somebody else to take over
 control of a domain name illicitly).

 The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
 Everywhere rules, and its goal is solely to make sure that if you're
 visiting a web page hosted at (or loading content from) markmonitor.com
 itself, that your browser's connection to markmonitor.com's servers will
 be a secure HTTPS connection instead of an insecure HTTP connection.  It
 is not trying to give any additional information to those servers or to
 cause your browser to connect to those servers when it would not
 otherwise have done so.

 (You can see the rule itself in the atlas link toward the beginning of
 my message, and see that its effect is to rewrite some http:// links into
 corresponding https:// links, just like other HTTPS Everywhere rules do.)

 Having HTTPS Everywhere rules that relate to a site does not necessarily
 mean that your browser has ever visited that site or will ever visit
 that site.  We've tried to make this clear because many of the rules
 do relate to controversial or unpopular sites, or sites that somebody
 could disagree with or be unhappy about in some way.  Each rule just
 tries to make your connection more secure if and when you as the end
 user of HTTPS Everywhere decide to visit a site that loads content from
 the servers in question.

 You can disable the markmonitor.com HTTPS Everywhere rule from within the
 Enable/Disable Rules menu -- but that won't stop your web browser from
 loading things from markmonitor.com's servers if and when you visit pages
 that refer to content that's hosted on those servers.  It will just stop
 HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs.

 --
 Seth Schoen  sch...@eff.org
 Senior Staff Technologist   https://www.eff.org/
 Electronic Frontier Foundation  https://www.eff.org/join
 815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another example is this   s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com  OR
ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
markmonitor.com


On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote:

 I'm not referring to this.I'm talking of a lot of URI that appears when I
 try to link to any site. Every one of those Remote Address start with a
 couple o letters followed by numbers like this:
 server-54-230-83-145.mia50.r.cloudfront.net  .




 On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote:

 ideas buenas writes:

  Why is markmonitor.com and its derivates in my TBB? How can I do to
 delete
  this ? Are they watching me?

 Hi,

 Are you talking about seeing a markmonitor.com rule in the HTTPS
 Everywhere
 Enable/Disable Rules menu?

 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

 If so, this is one of thousands of HTTPS Everywhere rewrite rules that
 are included with HTTPS Everywhere, which is included with the Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
 is to automatically access as many sites as possible with secure HTTPS
 connections.

 HTTPS Everywhere typically does not make your browser access sites or
 services that it would not otherwise have accessed, so it shouldn't help
 sites monitor your web browsing if they would otherwise not have been
 able to.  There are definitely lots of sites that can monitor some aspects
 of your web browsing because the site operator has included content loaded
 from those sites in their web page (so your browser automatically
 retrieves
 that content when you visit the page that embedded the content).  For
 example, there are ad networks whose ads are embedded in thousands or
 millions of different sites, and if you visit any of those sites without
 blocking those ads, the ad network operator will get some information
 about your visit when your browser loads the embedded content from those
 servers.

 The monitor in the name of markmonitor is not a reference to monitoring
 users' web browsing.  Instead, it's part of the name of the company
 MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
 Internet services mostly to very large companies.

 https://www.markmonitor.com/

 Their name is supposed to suggest that they can monitor their clients'
 trademarks, but not specifically by spying on Internet (or Tor) users'
 web browsing.  It seems that one of their original lines of business was
 letting companies know about trademark infringement on web sites, so that
 MarkMonitor's customers could threaten to sue those web sites' operators.
 They subsequently went into other more infrastructural lines of business.

 There was an article a few years ago criticizing the large amount of
 power that MarkMonitor has, but most of that power seems to have arisen
 mainly because it's an infrastructure provider that some very popular
 sites decided to sign up with for various purposes (primarily to register
 Internet domain names, because MarkMonitor's domain name registration
 services make it extremely difficult for somebody else to take over
 control of a domain name illicitly).

 The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
 Everywhere rules, and its goal is solely to make sure that if you're
 visiting a web page hosted at (or loading content from) markmonitor.com
 itself, that your browser's connection to markmonitor.com's servers will
 be a secure HTTPS connection instead of an insecure HTTP connection.  It
 is not trying to give any additional information to those servers or to
 cause your browser to connect to those servers when it would not
 otherwise have done so.

 (You can see the rule itself in the atlas link toward the beginning of
 my message, and see that its effect is to rewrite some http:// links into
 corresponding https:// links, just like other HTTPS Everywhere rules do.)

 Having HTTPS Everywhere rules that relate to a site does not necessarily
 mean that your browser has ever visited that site or will ever visit
 that site.  We've tried to make this clear because many of the rules
 do relate to controversial or unpopular sites, or sites that somebody
 could disagree with or be unhappy about in some way.  Each rule just
 tries to make your connection more secure if and when you as the end
 user of HTTPS Everywhere decide to visit a site that loads content from
 the servers in question.

 You can disable the markmonitor.com HTTPS Everywhere rule from within the
 Enable/Disable Rules menu -- but that won't stop your web browser from
 loading things from markmonitor.com's servers if and when you visit pages
 that refer to content that's hosted on those servers.  It will just stop
 HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs.

 --
 Seth Schoen  sch...@eff.org
 Senior Staff Technologist   https://www.eff.org/
 Electronic 

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois


On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote:

 Another example is this   s3-website-eu-west-1.amazonaws.comOR
 edge-star-shv-08-gru1.facebook.com  OR
 ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
 markmonitor.com


 On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com
 wrote:

 I'm not referring to this.I'm talking of a lot of URI that appears when I
 try to link to any site. Every one of those Remote Address start with a
 couple o letters followed by numbers like this:
 server-54-230-83-145.mia50.r.cloudfront.net  .




 On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote:

 ideas buenas writes:

  Why is markmonitor.com and its derivates in my TBB? How can I do to
 delete
  this ? Are they watching me?

 Hi,

 Are you talking about seeing a markmonitor.com rule in the HTTPS
 Everywhere
 Enable/Disable Rules menu?

 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

 If so, this is one of thousands of HTTPS Everywhere rewrite rules that
 are included with HTTPS Everywhere, which is included with the Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
 is to automatically access as many sites as possible with secure HTTPS
 connections.

 HTTPS Everywhere typically does not make your browser access sites or
 services that it would not otherwise have accessed, so it shouldn't help
 sites monitor your web browsing if they would otherwise not have been
 able to.  There are definitely lots of sites that can monitor some
 aspects
 of your web browsing because the site operator has included content
 loaded
 from those sites in their web page (so your browser automatically
 retrieves
 that content when you visit the page that embedded the content).  For
 example, there are ad networks whose ads are embedded in thousands or
 millions of different sites, and if you visit any of those sites without
 blocking those ads, the ad network operator will get some information
 about your visit when your browser loads the embedded content from those
 servers.

 The monitor in the name of markmonitor is not a reference to monitoring
 users' web browsing.  Instead, it's part of the name of the company
 MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
 Internet services mostly to very large companies.

 https://www.markmonitor.com/

 Their name is supposed to suggest that they can monitor their clients'
 trademarks, but not specifically by spying on Internet (or Tor) users'
 web browsing.  It seems that one of their original lines of business was
 letting companies know about trademark infringement on web sites, so that
 MarkMonitor's customers could threaten to sue those web sites' operators.
 They subsequently went into other more infrastructural lines of business.

 There was an article a few years ago criticizing the large amount of
 power that MarkMonitor has, but most of that power seems to have arisen
 mainly because it's an infrastructure provider that some very popular
 sites decided to sign up with for various purposes (primarily to register
 Internet domain names, because MarkMonitor's domain name registration
 services make it extremely difficult for somebody else to take over
 control of a domain name illicitly).

 The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
 Everywhere rules, and its goal is solely to make sure that if you're
 visiting a web page hosted at (or loading content from) markmonitor.com
 itself, that your browser's connection to markmonitor.com's servers will
 be a secure HTTPS connection instead of an insecure HTTP connection.  It
 is not trying to give any additional information to those servers or to
 cause your browser to connect to those servers when it would not
 otherwise have done so.

 (You can see the rule itself in the atlas link toward the beginning of
 my message, and see that its effect is to rewrite some http:// links
 into
 corresponding https:// links, just like other HTTPS Everywhere rules
 do.)

 Having HTTPS Everywhere rules that relate to a site does not necessarily
 mean that your browser has ever visited that site or will ever visit
 that site.  We've tried to make this clear because many of the rules
 do relate to controversial or unpopular sites, or sites that somebody
 could disagree with or be unhappy about in some way.  Each rule just
 tries to make your connection more secure if and when you as the end
 user of HTTPS Everywhere decide to visit a site that loads content from
 the servers in question.

 You can disable the markmonitor.com HTTPS Everywhere rule from within
 the
 Enable/Disable Rules menu -- but that won't stop your web browser from
 loading things from markmonitor.com's servers if and when you visit
 pages
 that refer to content that's hosted on those servers.  It will just stop
 HTTPS 

[tor-talk] (no subject)

2014-07-02 Thread ideas buenas
Why is markmonitor.com and its derivates in my TBB? How can I do to delete
this ? Are they watching me?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-02 Thread Joe Btfsplk


On 7/2/2014 6:56 PM, ideas buenas wrote:

Why is markmonitor.com and its derivates in my TBB? How can I do to delete
this ? Are they watching me?
In your computer in what sense?  How does it manifest itself? What are 
its derivatives?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-02 Thread Seth David Schoen
ideas buenas writes:

 Why is markmonitor.com and its derivates in my TBB? How can I do to delete
 this ? Are they watching me?

Hi,

Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
Enable/Disable Rules menu?

https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

If so, this is one of thousands of HTTPS Everywhere rewrite rules that
are included with HTTPS Everywhere, which is included with the Tor
Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
is to automatically access as many sites as possible with secure HTTPS
connections.

HTTPS Everywhere typically does not make your browser access sites or
services that it would not otherwise have accessed, so it shouldn't help
sites monitor your web browsing if they would otherwise not have been
able to.  There are definitely lots of sites that can monitor some aspects
of your web browsing because the site operator has included content loaded
from those sites in their web page (so your browser automatically retrieves
that content when you visit the page that embedded the content).  For
example, there are ad networks whose ads are embedded in thousands or
millions of different sites, and if you visit any of those sites without
blocking those ads, the ad network operator will get some information
about your visit when your browser loads the embedded content from those
servers.

The monitor in the name of markmonitor is not a reference to monitoring
users' web browsing.  Instead, it's part of the name of the company
MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
Internet services mostly to very large companies.

https://www.markmonitor.com/

Their name is supposed to suggest that they can monitor their clients'
trademarks, but not specifically by spying on Internet (or Tor) users'
web browsing.  It seems that one of their original lines of business was
letting companies know about trademark infringement on web sites, so that
MarkMonitor's customers could threaten to sue those web sites' operators.
They subsequently went into other more infrastructural lines of business.

There was an article a few years ago criticizing the large amount of
power that MarkMonitor has, but most of that power seems to have arisen
mainly because it's an infrastructure provider that some very popular
sites decided to sign up with for various purposes (primarily to register
Internet domain names, because MarkMonitor's domain name registration
services make it extremely difficult for somebody else to take over
control of a domain name illicitly).

The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
Everywhere rules, and its goal is solely to make sure that if you're
visiting a web page hosted at (or loading content from) markmonitor.com
itself, that your browser's connection to markmonitor.com's servers will
be a secure HTTPS connection instead of an insecure HTTP connection.  It
is not trying to give any additional information to those servers or to
cause your browser to connect to those servers when it would not
otherwise have done so.

(You can see the rule itself in the atlas link toward the beginning of
my message, and see that its effect is to rewrite some http:// links into
corresponding https:// links, just like other HTTPS Everywhere rules do.)

Having HTTPS Everywhere rules that relate to a site does not necessarily
mean that your browser has ever visited that site or will ever visit
that site.  We've tried to make this clear because many of the rules
do relate to controversial or unpopular sites, or sites that somebody
could disagree with or be unhappy about in some way.  Each rule just
tries to make your connection more secure if and when you as the end
user of HTTPS Everywhere decide to visit a site that loads content from
the servers in question.

You can disable the markmonitor.com HTTPS Everywhere rule from within the
Enable/Disable Rules menu -- but that won't stop your web browser from
loading things from markmonitor.com's servers if and when you visit pages
that refer to content that's hosted on those servers.  It will just stop
HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs.

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-22 Thread Joe Btfsplk

On 3/20/2014 12:47 PM, Patrick Schleizer wrote:

Joe Btfsplk:

1) I doubt you'll be able to run  1 instance of TBB - at once - if
that's part of what you want.
Others can correct me, if wrong.

This is possible. Simpler since TBB 3.x. Although undocumented. Bits can
be found here:
- https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers
-
https://www.whonix.org/wiki/Advanced_Security_Guide#More_than_one_Tor_Browser_in_Whonix
Yes, I discovered 2 (or more?) instances of Fx can be run.  Even for the 
same Fx .exe file / version, I can start one;
either clicking a shortcut or thru profile manager.  It allows me to 
start a 2nd instance, where I've mostly used profile manager.


The -no-remote command can also be used from Run (Windows) or command 
line / prompt.
This article explains different scenarios pretty well. 
http://kb.mozillazine.org/Opening_a_new_instance_of_Firefox_with_another_profile


NOTE:  under all scenarios, a different profile must be used for the 
2nd, 3rd Firefox instance.  Or, you'll get a Profile is already in use 
error.


In this case, the warning is valid - as the same profile is trying to be 
used by 2 instances.  That wouldn't work, as possible changes from each 
instance might try to make conflicting changes for the same prefs in 
same profile.  Thus, the warning.  That same error message in stand 
alone Profile Mgr (*when the selected profile is NOT already in use*) is 
a bug.  But if a selected profile WAS already in use, you wouldn't want 
to use it in another Fx instance.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-18 Thread muhammed gokce
If you want to buy a few pc's for me 

 Op 18 mrt. 2014 om 03:56 heeft krishna e bera k...@cyblings.on.ca het 
 volgende geschreven:
 
 On 14-03-17 12:27 PM, muhammed gokce wrote:
 No, I don't want to run 1 instance of TBB. I wan't to run a few instances of 
 TBB, but all with an other IP-adress. Like you can make profiles in firefox. 
 So you can log in with different accounts at a site. But all the accounts 
 must own an own IP.
 
 
 Some options:
 
 1) get more than 1 pc
 
 2) modify the source code to do what you need, or offer money to Tor
 Project to develop what you need
 
 3) run a TBB in separate virtual machines on a single pc
 
 4) have a single TBB with separate tabs or windows open, and each window
 connects to a separate 3rd party vpn or proxy (to get a different ip
 address), and then to the destination.
 
 5) if you dont care about relatively good anonymity, run multiple Tor
 client instances each listening on a distinct SOCKS port and connect a
 regular Firefox (with separate profile) to each one.
 
 You can also ask on IRC for detailed help with any of the above.
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-17 Thread krishna e bera
On 14-03-17 12:27 PM, muhammed gokce wrote:
 No, I don't want to run 1 instance of TBB. I wan't to run a few instances of 
 TBB, but all with an other IP-adress. Like you can make profiles in firefox. 
 So you can log in with different accounts at a site. But all the accounts 
 must own an own IP.


Some options:

1) get more than 1 pc

2) modify the source code to do what you need, or offer money to Tor
Project to develop what you need

3) run a TBB in separate virtual machines on a single pc

4) have a single TBB with separate tabs or windows open, and each window
connects to a separate 3rd party vpn or proxy (to get a different ip
address), and then to the destination.

5) if you dont care about relatively good anonymity, run multiple Tor
client instances each listening on a distinct SOCKS port and connect a
regular Firefox (with separate profile) to each one.

You can also ask on IRC for detailed help with any of the above.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-16 Thread muhammed gokce
I've downloaded the profile manager, selected the TBB firefox.exe, he opened 
the TBB, but! But, he said The proxy server is refusing connections.. And it's 
like firefox, without the button to choose new identity.

So this is not working, I wan't different profiles, so I can open different 
TBB's with each a own IP-adress..


 Op 14 mrt. 2014 om 23:57 heeft muhammed gokce muhammed_go...@hotmail.com 
 het volgende geschreven:
 
 And how do I create in torbrowser different profiles, I still don't 
 understand it..
 
 Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het 
 volgende geschreven:
 
 It probably won't allow 2 instances of Firefox (TBB) running at once.
 
 You may be able to use the stand alone profile mgr for Firefox 
 https://developer.mozilla.org/en-US/docs/Profile_Manager
 You'd have to add an entry in the profile mgr, to the location of TBB 
 (firefox.exe).   So you can specify which Fx version to use w/ which profile.
 
 Also have to create a new profile for TBB (in a location you choose), then 
 launch TBB using that profile  do any modifications.
 To use different TBB profiles, you'd have to launch the profile mgr each 
 time (not a big deal).
 
 Or, you could use the TBB / firefox ESR's native profile mgr, to create a 
 2nd, 3rd profile - perhaps? in same general location, but different folder.
 Then you'd have to use one of the profile mgrs to select the profile to 
 start each time.  Unless, most times you only use one - then it can be the 
 default profile  only when needing a non-default profile would you need to 
 start profile mgr to select that profile.
 
 On any of these, it's a possibility you may have to manually edit 
 profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)
 
 
 On 3/14/2014 10:30 AM, muhammed gokce wrote:
 Thanks, but copy the browser and trying to open it twice doesn't work.
 
 I wan't different tor browsers(profiles). Like you kan make it in firefox.
 
 Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het 
 volgende geschreven:
 
 Unless you hope for a TOR dev to anwser you should just go ahead and try
 it out as its not documented. It is probably either 16 or 32 bits which
 would be around either 32.000 and about 2 milion.
 In any case TOR should warn you if you have an invalid value set in your
 config.
 
 I believe (I dont know for sure) that there is already a specific
 profile defined for your TOR session hence it wouldnt be wise to create
 a different one.
 Why dont you just copy the TOR browser folder and swap out the config
 values you need in one copy.
 
 Am 14.03.14 15:20, schrieb muhammed gokce:
 Hi, thanks for the help!
 I've got a few questions more, what is; does the TrackHostExistExpire a 
 limit for the max. seconds, or can I put just 999 behind it ?
 
 And how can I make diffirent profiles in tor browser like firefox, in 
 windows 7?
 
 Thanking you!
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-16 Thread Joe Btfsplk
1) I doubt you'll be able to run  1 instance of TBB - at once - if 
that's part of what you want.

Others can correct me, if wrong.

WARNING:  Be careful about what you modify in a TBB profile.  You could 
compromise your anonymity.
Making changes in about:config, etc., w/o *really knowing* how they 
might affect TBB's ability to preserve anonymity, could be risky.


If you tell us your main objectives are for multiple TBB profiles, maybe 
someone can make suggestions.  Possibly, don't do it.  It depends.


Same for installing plugins, extensions.  They may not observe 
instructions to use only the Tor network / port. Or may affect anonymity 
in other ways.
Generally, the fewer modifications to TBB preferences / default options 
 the fewer extensions installed, the better.


2) proxy server is refusing connections probably has nothing to do w/ 
(any) profile manager.  It doesn't choose how to connect - it only opens 
a profile you select (either from existing ones, or new one(s) you 
create), and uses the file  path you specify, to which ever version of 
Fx you want to use.
It's possible that using profile mgr to start TBB, it bypassing the 
start Tor Browser.exe (or other files)  is causing some problem in 
connecting.

That might be fixable, but I don't have time to play w/ it.

3) If you just want multiple TBB profiles, you could install TBB to a 
few different folders, then customize each one.
Start each TBB installation (w/ its own profile) by creating shortcuts 
for Start Tor Browser.exe, from each installation folder.


Again, some TBB modifications (say, to the UI) can make your copy of TBB 
look different than TBB with default settings, to sites that query, log 
 compare browser characteristics.  For purposes of developing a browser 
fingerprint so you can be identified later on the same site, or at other 
sites run by the same people, or that are monitored by tracking 
companies / profile builders.




On 3/16/2014 5:35 AM, muhammed gokce wrote:

I've downloaded the profile manager, selected the TBB firefox.exe, he opened 
the TBB, but! But, he said The proxy server is refusing connections.. And it's 
like firefox, without the button to choose new identity.

So this is not working, I wan't different profiles, so I can open different 
TBB's with each a own IP-adress..



Op 14 mrt. 2014 om 23:57 heeft muhammed gokce muhammed_go...@hotmail.com 
het volgende geschreven:

And how do I create in torbrowser different profiles, I still don't understand 
it..


Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het volgende 
geschreven:

It probably won't allow 2 instances of Firefox (TBB) running at once.

You may be able to use the stand alone profile mgr for Firefox 
https://developer.mozilla.org/en-US/docs/Profile_Manager
You'd have to add an entry in the profile mgr, to the location of TBB 
(firefox.exe).   So you can specify which Fx version to use w/ which profile.

Also have to create a new profile for TBB (in a location you choose), then launch 
TBB using that profile  do any modifications.
To use different TBB profiles, you'd have to launch the profile mgr each time 
(not a big deal).

Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 
3rd profile - perhaps? in same general location, but different folder.
Then you'd have to use one of the profile mgrs to select the profile to start each 
time.  Unless, most times you only use one - then it can be the default profile 
 only when needing a non-default profile would you need to start profile mgr 
to select that profile.

On any of these, it's a possibility you may have to manually edit profiles.ini 
(in Windows path:  Tor Browser\Data\Browser\profiles.ini.)



On 3/14/2014 10:30 AM, muhammed gokce wrote:
Thanks, but copy the browser and trying to open it twice doesn't work.

I wan't different tor browsers(profiles). Like you kan make it in firefox.


Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het 
volgende geschreven:

Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:

Hi, thanks for the help!
I've got a few questions more, what is; does the TrackHostExistExpire a limit 
for the max. seconds, or can I put just 999 behind it ?

And how can I make diffirent profiles in tor browser like firefox, in windows 7?

Thanking you!

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to

Re: [tor-talk] (no subject)

2014-03-14 Thread Rick Ross
Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:
 Hi, thanks for the help!
 I've got a few questions more, what is; does the TrackHostExistExpire a limit 
 for the max. seconds, or can I put just 999 behind it ?

 And how can I make diffirent profiles in tor browser like firefox, in windows 
 7?

 Thanking you!


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread Joe Btfsplk

It probably won't allow 2 instances of Firefox (TBB) running at once.

You may be able to use the stand alone profile mgr for Firefox 
https://developer.mozilla.org/en-US/docs/Profile_Manager
You'd have to add an entry in the profile mgr, to the location of TBB 
(firefox.exe).   So you can specify which Fx version to use w/ which 
profile.


Also have to create a new profile for TBB (in a location you choose), 
then launch TBB using that profile  do any modifications.
To use different TBB profiles, you'd have to launch the profile mgr each 
time (not a big deal).


Or, you could use the TBB / firefox ESR's native profile mgr, to create 
a 2nd, 3rd profile - perhaps? in same general location, but different 
folder.
Then you'd have to use one of the profile mgrs to select the profile to 
start each time.  Unless, most times you only use one - then it can be 
the default profile  only when needing a non-default profile would you 
need to start profile mgr to select that profile.


On any of these, it's a possibility you may have to manually edit 
profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)



On 3/14/2014 10:30 AM, muhammed gokce wrote:

Thanks, but copy the browser and trying to open it twice doesn't work.

I wan't different tor browsers(profiles). Like you kan make it in firefox.


Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het 
volgende geschreven:

Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:

Hi, thanks for the help!
I've got a few questions more, what is; does the TrackHostExistExpire a limit 
for the max. seconds, or can I put just 999 behind it ?

And how can I make diffirent profiles in tor browser like firefox, in windows 7?

Thanking you!


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread muhammed gokce
And how do I create in torbrowser different profiles, I still don't understand 
it..

 Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het 
 volgende geschreven:
 
 It probably won't allow 2 instances of Firefox (TBB) running at once.
 
 You may be able to use the stand alone profile mgr for Firefox 
 https://developer.mozilla.org/en-US/docs/Profile_Manager
 You'd have to add an entry in the profile mgr, to the location of TBB 
 (firefox.exe).   So you can specify which Fx version to use w/ which profile.
 
 Also have to create a new profile for TBB (in a location you choose), then 
 launch TBB using that profile  do any modifications.
 To use different TBB profiles, you'd have to launch the profile mgr each time 
 (not a big deal).
 
 Or, you could use the TBB / firefox ESR's native profile mgr, to create a 
 2nd, 3rd profile - perhaps? in same general location, but different folder.
 Then you'd have to use one of the profile mgrs to select the profile to start 
 each time.  Unless, most times you only use one - then it can be the default 
 profile  only when needing a non-default profile would you need to start 
 profile mgr to select that profile.
 
 On any of these, it's a possibility you may have to manually edit 
 profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)
 
 
 On 3/14/2014 10:30 AM, muhammed gokce wrote:
 Thanks, but copy the browser and trying to open it twice doesn't work.
 
 I wan't different tor browsers(profiles). Like you kan make it in firefox.
 
 Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het 
 volgende geschreven:
 
 Unless you hope for a TOR dev to anwser you should just go ahead and try
 it out as its not documented. It is probably either 16 or 32 bits which
 would be around either 32.000 and about 2 milion.
 In any case TOR should warn you if you have an invalid value set in your
 config.
 
 I believe (I dont know for sure) that there is already a specific
 profile defined for your TOR session hence it wouldnt be wise to create
 a different one.
 Why dont you just copy the TOR browser folder and swap out the config
 values you need in one copy.
 
 Am 14.03.14 15:20, schrieb muhammed gokce:
 Hi, thanks for the help!
 I've got a few questions more, what is; does the TrackHostExistExpire a 
 limit for the max. seconds, or can I put just 999 behind it ?
 
 And how can I make diffirent profiles in tor browser like firefox, in 
 windows 7?
 
 Thanking you!
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread Joe Btfsplk

On 3/14/2014 4:57 PM, muhammed gokce wrote:

And how do I create in torbrowser different profiles, I still don't understand 
it..

Please go to the MDN (mozilla) link I gave.  Like anything, there's some 
reading on how to use the profile manager, but it's child's play 
compared to using a browser.
They have online help section to use the utility (which doesn't need 
installing.)
There's also an article in Mozillazine knowledge base on creating 
profiles.  If one can't read  master the steps needed to do this, maybe 
they might shouldn't be creating multiple profiles, esp. to use in TBB.  
Just sayin'.


You use the menu options in the profile manager to create new profiles.  
About a 10 sec. operation, once you know basic menu options.  In the 
same way the native Fx profile manager does.
The native manager would also work, it's just that the stand alone 
manager from MDN has more features, flexibility.  It's not difficult 
(unless one refuses to read simple instructions).


One thing:  The MDN profile manager (or Firefox) has a known bug - which 
doesn't really bother anything.
When the manager is used to open a profile that's previously been 
*opened* (but is now closed), it will show a message that the profile 
you selected appears to be in use  starting Fx with it could damage 
stuff.
Unless Firefox IS running, with the profile SELECTED,  the profiles 
aren't open  starting them doesn't damage anything.


The only time that might be the case, is if you actually had a running 
instance of Fx / TBB; in which case you'd see it running in Task Manager 
or equivalent running processes monitor in other OSes.
As long as [the profile you've selected] isn't started / running, the 
warnings about it in Profile Manager can be ignored.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-01-18 Thread andrew
Cc
Bcc: 
Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences
 with pseudonymous project development
Reply-To: 
In-Reply-To: 52da7d13.4010...@riseup.net
X-PhaseofMoon: The Moon is Waning Gibbous (95% of Full)

On Sat, Jan 18, 2014 at 01:09:39PM +, adrela...@riseup.net wrote 2.0K bytes 
in 0 lines about:
: speak at conferences, to attend key singing parties, to meet up with

I know this is a typo, but a key singing party sounds far better than
the pgp parties I've attended so far. :)

-- 
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-01-18 Thread Patrick Schleizer
and...@torproject.is:
 Cc
 Bcc: 
 Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences
  with pseudonymous project development
 Reply-To: 
 In-Reply-To: 52da7d13.4010...@riseup.net
 X-PhaseofMoon: The Moon is Waning Gibbous (95% of Full)
 
 On Sat, Jan 18, 2014 at 01:09:39PM +, adrela...@riseup.net wrote 2.0K 
 bytes in 0 lines about:
 : speak at conferences, to attend key singing parties, to meet up with
 
 I know this is a typo, but a key singing party sounds far better than
 the pgp parties I've attended so far. :)
 

Indeed. The task is to sign your public key. Preparation for next superstar.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2014-01-17 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hy there.

Maybe the developers from orbot might find the first android based 
snoop-proof cellphone [1] interesting.

 [1] 
http://news.discovery.com/tech/gear-and-gadgets/the-worlds-first-snoop-proof-phone-140116.htm?utm_source=DNFButm_medium=DNewsutm_campaign=DNewsSocial
- --
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net

Encrypted messages are welcome.
0x84DF1F7E6AE03644

- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.11 (GNU/Linux)

mQINBFH797MBEAC0Y0NeI7lmDR9szTEcWuHuRe0r/WjSRC0Nr5nXsghuMcxpJ3Dd
BOBimi4hdMMK4iqPVMwNw6GpKYR3A9LHHjbYRXHUKrJmB+BaJVyzJXN5H6XvxTTb
UfX+DaXAGJW/G+3cBB3qm/QaU8QGkBKfXq0DLTaTGPkGKxEAldj/8onGZhawdJs+
B92JrW+S2HDh15pIuXzSqe7eCcIOdvvwfWe0fJi2AraA7LYGpxP6GcC/b9JJpbq5
Y6DfE2Aun9ZK3iHqURyrms0Whbv1CgmUahL2MVYCsTsXwe0GwlAxxKvjXAiXuo+R
9wO5wsXvVVSVNqsk9Yqi+wYzdPKndTU0GyxSApQHroF+cxaZ8Lk0xloj18+LdCSs
e5IiTSXH0MMsDdWWdHlrgk+bgDG+0Gu3ne4vMwGdKO7AhYgQW/ueMy4RnkG/nsV9
jry5BO4gGAI1Ij8KvqUzEnvJFGE3ptJogU+zazWWDUWmL3ecKb3aDRlJFnZ3kJ5h
q8GolZVjpk99V+4B5WVRPXdej/p5J19tXycK/jdNmr4oC8NyUhIpe8xHELnfoB4z
+rxiTx+KMnW0rY8EQg8O2ixEYt5my90IwQkxcxIxextVrqjJjYn8extc2/v8yGzI
KmTEJxdADB5v/Jx4HiLHNDSfBUb8gfONCkNSTYvTcSwTjWzHOkXeE/9ZbQARAQAB
tD5lbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0ZWQpIDxlbHJpcHBvQGVs
cmlwcG9pc2xhbmQubmV0PokCOAQTAQIAIgUCUfv3swIbLwYLCQgHAwIGFQgCCQoL
BBYCAwECHgECF4AACgkQhN8ffmrgNkT8+BAAoAXBqu4/O2Cs5FSWWZpzgScNEgq7
uHhOKeYmRfgKlOUPoYlPB1DBqdOAXSKb9OvsmyOvpoGnqijB7aAJBoyQYW/OCQgd
U8L4eTCf4yRZnfFLdgskcPfN1p0Rs/yinGEooBJFtYa7mT6J0UTW2JjCLZK2AFCW
oF+KBu5JICXGBXigb2ZbX1jWjxP5H1RidQw6HF5z4z34SjLWAOOeZ8B/Xfz6Fs0s
IAuLu2O4HE4DI8Qu196LhSVHHgr3uMTkvN1t5nKwyjrRQztwXXk9qIomII3ydNYb
BYAGdWNNMfLb1kmDwC5wQHAFvSP1aiMF3aKAY+gl2wXSGO6JqM0SteJS3dytIljI
kzu0atc9HuGs/HDQgdmpAS4WU2YefEr/WieltSiAKlwuC+3wg+CONJ6TE1vgNDU/
axerttb0jq7UQb/nAp05bsrB7XH1Vs+1ON9lUPEfWRmwQcrVK5JUrUWa/4tA/UeM
XvFcPFtFluGTlLewgJIqcvjPXFwpbDZprXJsMkwew/A6B6n3+0sbgf7p3QSGkVbi
dwQAymTbHdYqLnbcnKZhjto3Wjw1J5QB2wuiRYlpjV3i7AWTGlqoSTOWCCV+HamQ
qeFYNYAWNFx3+J/oi7xDi8t9bHVNA205equ+y2sj3G5uGJ6LSHQ8AXp9uOipUUvU
1MJN0yLXr9PIwvi5Ag0EUfv3swEQAL0+MnxHGrTjSYdfdua4SBpmytDONM1EngeY
s+WyaC/760MughKbaysI/nK2LB1vnwEY7f3NM4fxBx8u2T7VBm6Ez6Fs23Bb8Rkz
f97bPSdxCmg64GPHfLA9uwTIXcYS+MpI86WOf6eWY0rRpf7Y9Nl7YoUNvzOyUPqc
ggdcnHce8zYv7A/WS8flZDm8tVFPsHrQDEwNMws7ZhiNnHkeZeRJrvCuB7oEVich
O/ROYoA5o6NozWYQbjxe1f6Yur4Q10qgVcxVnyLFJSbg6vZSzL7KYh3Z5iBOzPHt
7cwEDrW8W4Kl2Qj8rhJ4Wxs94CAtua7IXK44sVZWQbyHcOXRikgGMZKkEZzVCQa5
KD1u1ZrcBCyuMAir0hsmS3jhCUwpiE2c3SRk8O8CgixhTcBk0X/k9ZFu3Hbi1JMB
FLzs/Nq3tYAYvVivhPloSxmYBPsafYHCZM83yBNNsralXh5zjB+di90G+AMXt2PN
LTcdovZuWtC0s8/jrx+zv/AA4FAGYU9OVl+YL9ybFX8gSdMEcixyzQcKfiFBjpWv
5iFrwIuDlaXMcheyrhc9aGOxfx44OXc505+VjO/1Q/8EOWlJ6UwOi6GMkj5T+RFJ
MDyP0UixS7dt6wTuD5t6PRuyWWxZswgrbL9hjwGFr154Z19TWeNWc23pWtUvQJos
UCxl2nFHABEBAAGJBD4EGAECAAkFAlH797MCGy4CKQkQhN8ffmrgNkTBXSAEGQEC
AAYFAlH797MACgkQJEPd69lQ0evA+Q/+M7lSFlrQWiRsFqDjh+kTJc+0OEBCvnfo
N2KPyXXbfc//qup55PfEygE6C60zvrlv3WE33GZ5GS5MLuDMP82b+a5Yt16NQU7L
WtAg1g0S0BvazW+28TgnfO8bhbGaFeE9ccw3xLmlbwZQ3f3LtMKdwFIROiG6hvAs
9U54QYti3tv9DowRYYWpdr0Ga8RqeGNtCKc0v2opy51MpzKWjwUW0i3XlSlyY8Lj
1KT8PyznNPw32nYpmDizz+0OUJNnn/kT+GnFoR3DJnFosTOrnxFJp+N+nejMp/gW
r9NM0/E7H+P53IiytBOt5/0vsOaCFGdYGhKEjmJi3dHS4Xk1ObD1mjdD1YDOlWWU
3Md6BDHd4W7Q8gT7oQfTIMLd3HzV+WNPIdocPLBaeA/tRD8Pg5CCmncAmSub4F5T
An7FlnACtSOv3cIWQ0TymS42DihDaJ5d1RvNzKw+zHYdPvf471JFZR3TDhkPbLIr
9czR7kbpnXRwchgwXQn306NVWf37TgA8wpbnFTazZ38iOeqcb9oKprqnbgEdr3PN
OhKSlMTkzAqf3MEi2Fyua4BADMhS3oBwCRgDTlt6wquEytpNSlZaHnyiyIgOpekF
Uy5K3w8NhHqeifRPrNb/UcCbXtXz+puqIEZHMenpv6FRlTTKpdoHoVXSkp1TPMGN
/VaCiLbP4Z3xEw/9EbAJJkhmmx1Qw3ueoqc4h1MmhUtIdxSZ/oA9SjwlnY++zvaZ
6w1wTS4P+OUkETNDtItdpxXMJ9qfSy9voAQc2K43WMZCCmpPJYSdqaZZNPFj+Ne8
6FNtNKuUkXREybpHwlVAXnHzInmFOOM9RAmF70r3zEmKt77W1ztBLo2o9X79gPgL
u9ThgrH6Oc2k46n+9nc3joccr7miiX/bp976DNWcWdOYThiSSOCb8Zw9/Zs935i1
wUVkYTj24tmBH4H5ov9ib7RPmU21ru458RbUKG0ONAqBtAHNyXHzUnXsrke+D4VW
MI06YcXSk8YeYgQ8GxgHQc+W2bb8LIbKN1hEYJ0wzM62vKR2/Oiwuf8lXutIKTuz
+v7Vj1PQd66DGHsxtWRaWnr1c54JTL2wICHJYKFH4grp7864+GL/uQ1O/Z/XxVku
E1JQ/AnwBGU1M1S6otwWGWVRjzEzQtxsfcCEPvV/9td3FIFQAbGTPb+48XFU+TY9
8AlcXBlDzXq7c5f8Evn/oSIsZDt63K4HNTmMGqOTl/p1aA0e4eyX76LczY06rDP5
GMSNs+AHmYgZiS4RYhRUIvS9uLXMnnDAMYst0SDl2orDUUeHBTzu0rchyknBZMGP
p5wQuWQ9CFlV+dj3UYbrBwC1lTkAMXRG2vlhA0V0TZqos7A5D4VHgSUQQjE=
=otlL
- -END PGP PUBLIC KEY BLOCK-
-BEGIN PGP SIGNATURE-
Version: APG v1.0.9

iQJcBAEBCABGBQJS2aVyPxxlbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0
ZWQpIDxlbHJpcHBvQGVscmlwcG9pc2xhbmQubmV0PgAKCRAkQ93r2VDR66yhD/98
kYDIAM4jhNvX+FQxBNusDWwJzDVNqNl+eugwtXTAN1Jirl420Jn19qwOc2DhrCGu
/t9u05dIH37w5VzRh39vjcxpZgVq4f/6sXt7VPcYygr5RdG+2CPlYqxwWs/59v2W
AlQzOIOOU31OizkYkWHT0oqXOy6+LB33CFT+vgraXuDDw7Iyy/en2QjYg7po9lT8
k9SIvF1glK0jh4I/aGmVe19BaGjhxIgwH+xMIcrJgJhImjgvyOOzvQ+x5gcwRN7n
8OJVzm2sgaxPnmzH6Qff4Xk3jJrelDhNNu7Hp4ryA1s4JBMV+XIUq4Vt0TGCYPtL
PTmRE8tfQeXcFkF9Q+zj1i5CwTPD53UmgSOqE6Kv8dh4lCe3hCGlRkyVZ0xNgij9

[tor-talk] (no subject)

2013-12-11 Thread hassan moujdi
HI ; i am a student in networking and security system, i working in a
project  to make a global private navigation to web by create a
distribution based in Ubuntu . the project will include more interesting
tools to make a secure connection with servers  like a private cloud
computing ,also a secure navigator 'TOR' ,  reprogramming the kernel by
adding a backdoor to diminutive the espionage  risks PRISM .I have a big
idea to make our navigator in a high level of security so i hope to join
the team. By the way I receive some propositions to continue my project in
university Laval Canada , university tel-aviv in Israel ...  but i
believe that the tor project have all the potentials to make a secure
navigation .So i ll be waiting a favorite answer to join your team , thank
you .
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-12-10 Thread Yuri

On 12/09/2013 22:22, Nishaanth_Kumar wrote:

I am Nishaanth,Undergrad in India.
I would love to contribute to Tor.
But I am stuck with questions like where to start and what should I know.
I can code comfortably with C,C++,HTML and know certain stuff about Python.
It would be really helpful if you can me out.


A good way to contribute to any open source project is to review the 
list of open bug reports, find one that you think really matters and you 
feel comfortable you can correct, and work on it.


Yuri
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2013-12-09 Thread Nishaanth_Kumar
Hi,

I am Nishaanth,Undergrad in India.
I would love to contribute to Tor.
But I am stuck with questions like where to start and what should I know.
I can code comfortably with C,C++,HTML and know certain stuff about Python.
It would be really helpful if you can me out.
:)


-- 
*Nishaanth Sekeran.*
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] (no subject)

2013-11-19 Thread jamie hyatt
looking for small amount of good grade snow to buy.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


  1   2   >