Re: [tor-talk] (no subject)
Hello, at the end of every mail from the mailing list you should see a link to change your settings or unsubscribe. On 2 January 2019 10:21:25 AM IST, Larry Martin wrote: >I wish to unsubscribe >-- >tor-talk mailing list - tor-talk@lists.torproject.org >To unsubscribe or change other settings go to >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- Sent from my Android device with K-9 Mail. Please excuse my brevity. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Tue, Jan 01, 2019 at 11:51:25PM -0500, Larry Martin wrote: > I wish to unsubscribe To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk signature.asc Description: Digital signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
I wish to unsubscribe -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 11/26/2018 3:19 PM, Dj Blind wrote: > Bonjour je souhaiterais savoir 6 l'application tort le navigateur web il y > a une version pour les personnes aveugles parce que j'ai constaté que ça ne > prend pas en charge ma synthèse vocale quand je navigue sur l'application > aussi si on pourrait développer un script pour moi le fait que je suis > aveugle et ça pourrait devenir accessible même pour les personnes aveugles > qui veut utiliser l'application tord j'utilise jaws comme synthèse vocale > laisse-moi savoir si c'est possible merci beaucoup je serai très > reconnaissant envers vous si j'arrive à utiliser l'application tord je > souhaite savoir si il y a un façon nous les personnes aveugles peut avoir > accès avec cette application merci beaucoup > Tor Browser is accessible with a screenreader, how ever, beginning with "TBB for Windows" 8.0 there is an issue that is being fixed: https://trac.torproject.org/projects/tor/ticket/27503 -- John Doe -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Bonjour je souhaiterais savoir 6 l'application tort le navigateur web il y a une version pour les personnes aveugles parce que j'ai constaté que ça ne prend pas en charge ma synthèse vocale quand je navigue sur l'application aussi si on pourrait développer un script pour moi le fait que je suis aveugle et ça pourrait devenir accessible même pour les personnes aveugles qui veut utiliser l'application tord j'utilise jaws comme synthèse vocale laisse-moi savoir si c'est possible merci beaucoup je serai très reconnaissant envers vous si j'arrive à utiliser l'application tord je souhaite savoir si il y a un façon nous les personnes aveugles peut avoir accès avec cette application merci beaucoup -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 10/24/2018 06:23 AM, Nathaniel Suchy wrote: > I thought this wasn't sent to the list server. Reporting the archive link > on IRC. They can get this handled :) From the message source, it surely seems that it was ... ... Received: from eugeni.torproject.org (eugeni.torproject.org\ [94.130.28.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "clientcerts/eugeni.torproject.org", Issuer\ "auto-ca.torproject.org" (not verified)) by mx1.riseup.net (Postfix) with ESMTPS id 394DD1A04F4; Wed, 24 Oct 2018 02:34:35 -0700 (PDT) Authentication-Results: mx1.riseup.net; dkim=fail reason="verification failed; unprotected key" header.d=gmail.com header.i=@gmail.com header.b=m91qVvbr; dkim-adsp=none (unprotected policy); dkim-atps=neutral Received: from eugeni.torproject.org (localhost [127.0.0.1]) by eugeni.torproject.org (Postfix) with ESMTP id 68AB1E161F; Wed, 24 Oct 2018 09:34:32 + (UTC) Received: from localhost (localhost [127.0.0.1]) by eugeni.torproject.org (Postfix) with ESMTP id 60A2BE161F for ; Wed, 24 Oct 2018 09:34:28\ + (UTC) ... Received: from eugeni.torproject.org ([127.0.0.1]) by localhost (eugeni.torproject.org [127.0.0.1])\ (amavisd-new, port 10024) with ESMTP id BX0svQDLp3CT for ; Wed, 24 Oct 2018 09:34:28 + (UTC) Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com [IPv6:2a00:1450:4864:20::141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (not verified)) by eugeni.torproject.org (Postfix) with ESMTPS id 3C7D4E15C0 for ; Wed, 24 Oct 2018 09:34:28\ + (UTC) Received: by mail-lf1-x141.google.com with SMTP id n26-v6so3434767lfl.1 for ; Wed, 24 Oct 2018 02:34:28\ -0700 (PDT) ... Unless they did a good job at spoofing. My email skills are iffy :( > On Wed, Oct 24, 2018 at 9:10 AM Mirimir wrote: > >> On 10/24/2018 02:34 AM, Today's Yug wrote: >>> Contact to me in case of girlfriend trace >> >> So is this grounds for unsubscribing this address from the list, and >> blocking it and its IP address from resubscribing? >> -- >> tor-talk mailing list - tor-talk@lists.torproject.org >> To unsubscribe or change other settings go to >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk >> -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Wed, 24 Oct 2018 06:09:43 -0700 tarihinde Mirimir yazmış: > On 10/24/2018 02:34 AM, Today's Yug wrote: > > Contact to me in case of girlfriend trace > > So is this grounds for unsubscribing this address from the list, and > blocking it and its IP address from resubscribing? > Perfectly it is. -- Gökşin Akdeniz pgpBIsgIqOa2d.pgp Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I thought this wasn't sent to the list server. Reporting the archive link on IRC. They can get this handled :) On Wed, Oct 24, 2018 at 9:10 AM Mirimir wrote: > On 10/24/2018 02:34 AM, Today's Yug wrote: > > Contact to me in case of girlfriend trace > > So is this grounds for unsubscribing this address from the list, and > blocking it and its IP address from resubscribing? > -- > tor-talk mailing list - tor-talk@lists.torproject.org > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 10/24/2018 02:34 AM, Today's Yug wrote: > Contact to me in case of girlfriend trace So is this grounds for unsubscribing this address from the list, and blocking it and its IP address from resubscribing? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Contact to me in case of girlfriend trace -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
اريد الدخول Sent from Yahoo Mail on Android -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Appelbaum Subject Of Investigative Journalism
Still sounds a lot like JTRIG and Zersetzung to me... http://www.zeit.de/kultur/2016-08/jacob-appelbaum-rape-sexual-abuse-allegations/komplettansicht Jacob Appelbaum: What Has This Man Done? The year 2016 is only a couple of hours old when the orgy in Jacob Appelbaum’s apartment in a pre-World War II building in Berlin’s Prenzlauer Berg district really gets going. Somebody has unfolded the sofa in the living room. Two couples are having sex at the same time in the room. Some guests had already taken synthetic party drug MDMA, which induces a state of euphoria and increases the need for emotional warmth, at another party. A third couple is going at it in the bedroom. Later, a crime allegedly took place in Mr. Appelbaum’s bed or on the fold-out sofa. A couple of people in the living room are prone on the floor, all of them fully dressed. They had turned up the music so the moaning and groaning of the others doesn’t bother them as much. A young journalist had made herself comfortable on a man’s lap, and he is massaging her back. Sitting across from them is a young American woman. She had gotten to know the others just a couple of days before, but she appears to be uncomfortable at this party. She doesn’t talk much but listens in a friendly manner to what is being said. The host, Jake Appelbaum, is doing much of the talking at the New Year’s Eve party. Mr. Appelbaum is a 33-year-old American, and he’s a specialist in computer security and the equivalent of a rock star in the worldwide community of hackers. His name is mentioned in the same breath as the elite of digital dissidents such as Edward Snowden and Julian Assange. For many people, such men are savior-like figures. Mr. Appelbaum’s party guests number about 20 and are programmers, hackers and activists from all around the world. They are united by one mission: use encryption technologies to fight against what they see as the hated surveillance state. Mr. Appelbaum has been a guru in this Berlin community since he fled the United States in 2013. He felt he was being persecuted by the intelligence agencies. On this night, he speaks of a trip to Iraq and also his tattoo idea: he wants the images of mathematical formulas tattooed on his body. He shows his guests a sculpture. It’s a prize for investigative journalism that he won two years ago. He had uncovered for the German magazine Der Spiegel how the U.S. National Security Agency (NSA) was monitoring the German chancellor’s mobile phone. The journalism prize is named after German journalist Henri Nannen, whose Nazi past incenses Mr. Appelbaum. He asks those guests gathered around him whether he should smear the sculpture with blood, perhaps the blood of a Jewish activist or perhaps his own blood. Or with menstruation blood, says the female journalist, but she isn’t having her period right now. This is good for other things, Mr. Appelbaum says. A little while later, he disappears with her into the bedroom. Already there in bed is the taciturn young American woman. The three had sex together. Mr. Appelbaum’s social downfall is sealed this evening and two others he spends with the American. Later, she will make serious allegations against him. Since then, Mr. Appelbaum has been only one main thing in the public’s eye: a sex offender. Mr. Appelbaum had been involved in the Tor Project, which provides online anonymity, the most powerful weapon in the fight against secret services and government surveillance. But the digital privacy group announced in early June that Mr. Appelbaum had stepped down. Until then, he had been an important developer for Tor, and the figurehead of software that not only enables what is termed the Darknet. People worldwide put their trust in Tor technology when information must remain secret, when they fear for their lives, or when they aim to circumvent censorship. The Tor network enables protective anonymity to a wide variety of people, from Iranian dissidents to whistleblowers such as former NSA contract employee Mr. Snowden. On the internet, Tor users can communicate incognito. Shortly after the Tor Project’s announcement in June, a new website popped up: jacobappelbaum.net. The site was set up by people who see themselves as Mr. Appelbaum’s victims. Visitors to the website see photos of Mr. Appelbaum, one of him posing in a colorful suit as if he were the Joker in a Batman film, or other photos of him with microphone in hand giving lectures to fans. "Hey there! We're a collective of people," write the anonymous persons responsible for the website, "who have been harassed, plagiarized, humiliated, and abused — sexually, emotionally, and physically — by Jacob Appelbaum." Above almost every photo of Mr. Appelbaum on the website is an alleged victim’s pseudonym. Among others, there is an account by a woman who calls herself "Forest." She tells of how she found herself forced to repulse his insistent advances.
Re: [tor-talk] (no subject)
On Jun 17, 2016 2:04 PM, "Ryan Carboni"wrote: > > https://twitter.com/YourAnonCentral/status/743498759892406272 Meh, too childish... It's becoming pretty boring! :-/ Maybe a man can't see it, but even the most stupid woman in the world can notice an evident *lie* in the last statment published. The obvious efforts trying to adjust the accusations to being more realistic and plausible, giving also more colours and emotions, are pretty interesting. I like it! ;) I didn't stop to search for some trustworthy information and for more references in last days. A programmer (woman) told me some 'juicy gossip' about one of alleged victims, but it would be pretty disgusting to tell it here. Ugh! :-/ Well, in thesis, one of alleged victims is being hypocrite and hates Jacob. It was obvious since the first message, but some of the reasons were unexpected for me, at least. I need to search more information about it and verify if it is really true before invite her to write a statment or tell more about it in a trial. Another tech woman, a brutally sincere friend who I love a lot and consider one of the most intelligent persons that I know, perceived the lie that I mentioned before I point it to her. It simply does not make sense... :-/ I always says my friend is a 'feminazi' who hates all the men and she knows about it and says even worse things about me, hahaha!! She is really bitter sometimes, but pretty realistic and I do love extremely sincere friends, haha!! ;D Well, she knows in person Jake, Isis and a lot of people mentioned and doesn't like anyone. None of them, I swear. :P Told me some stories about egocentrism, injured pride, politics, money, etc, and asked me to avoid this kind of f*cking harmful crazy people because I am too stupid to protect myself, haha!! It makes sense, but now I am curious about the truth, haha!! ;D She asked me to avoid meetings with one of alleged victims at any cost, because "she is a f*cking sick jealous crazy b*tch", able of killing me and tell lies about self-defense or psychotical breaks and lapses of memory in public. My friend is a bit neurotic, but is a good woman and is just worried about me, hihi... ;) Just in case, the world is really small and I will contact one of the ex-partners of this alleged victim in special. I don't know him, but I would like to know if she likes scandals, lies, breaking objects, this kind of crazy stupid actions... She has an ego much bigger than usual and I know that Jake has the same problem, ugh! :P Warm hugs and tender kisses!!! Ah, thank you everybody!!! I received some lovely messages about helping homeless people and two donations, yay!!! ;D (No Tor t-shirts, but some hot blankets! <3 ) -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Help yourself: > To unsubscribe or change other settings go to > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Can u plz stop sending me these emails -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
> Some weeks ago Daniel briefly explained how OCv2 would work but abusing > the HS-Directories. Unfortunately, the Tor-Project could build code the > prevent this. > I appreciate every idea how to run/use a database for this purpose. That's where you have to contact Tor and jointly develop an API for this so that it will always be there to use. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Dear Tor developers, I am sorry to ask such a basic question but I am confused by whether I should have the Tor browser set to; a. Temporary allow this page b. Revoke Temporary Permissions c. allow scripts globally After I downloaded the Tor's browser a few days ago it was working perfectly but I did not notice after the download which of the three settings above was set. Today I perhaps made the error of changing the setting to revoke temporary permissions, but after I did this an encrypted email website I just began to use stated that it would not allow access because JavaScript needed to be enabled. After changing the setting to "Temporary allow this page" then I could again access email in one encrypted email service. However now I can no longer access another encrypted email service (an impressive one)which has been working perfectly for me for weeks. So please inform me which setting I should be using. (Or alternatively I could delete the Tor browser and just install it again to see the initial setting) Also, I thought it would be helpful to forward some important information I just encountered today. Please read the ARS Technica article at the link below. I found this by way of a Reddit thread. ... http://arstechnica.com/security/2016/02/default-settings-in-apache-may-decloak-tor-hidden-services/ Tor is a tremendous service and everyone certainly appreciates your diligent efforts. Thank you and I am looking forward to your assistance. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-- http;//www.google.comwww.google com -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Indeed, some (coincidentally???) big corps do block relays. For a while I ran a relay from my home connection and for instance Nike was not reachable without the use of a VPN (I don't mind, and even favor, Nike being out of the picture, not everyone feels the same way ;) ). On 28-08-15 18:56, Rejo Zenger wrote: ++ 23/08/15 15:59 -0800 - I: Beware though that running a Tor Relay from your home connection is discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en Running an exit from home is discouraged not a middle relay. Less fearmongering might help expand Tor. Reality is a thing of nuance: although the risks of running a middle relay from home are for more limited compared to running an exit relay from home, there are some things that should be taken into account. Most notably: the IP-address from your home connection will be listed in one or more block lists, based on the criteria that these lists list all none Tor relays. This may be a problem when site owners decided to deny traffic from IP-addresses that are running a Tor relay. As a result of that, if you run a middle relay from home, you may have difficulties reaching some sites. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Sat, 29 Aug 2015 17:11:23 +0200 blaatenator blaatena...@openmailbox.org wrote: Indeed, some (coincidentally???) big corps do block relays. For a while I ran a relay from my home connection and for instance Nike was not reachable without the use of a VPN (I don't mind, and even favor, Nike being out of the picture, not everyone feels the same way ;) ). It's not some big corps, it's just the same simgular entity: Akamai. www.nike.com is using the Akamai CDN. And the issue of Akamai blocking non-exit nodes has been raised on this list time and time again in the past. -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Please Almsaadh sooner that all the files are not open to me because I know no PDF files and Word and photos and a video message, but not in the form of image documents as follows: what happend to your files all of your files protected by a strong encryption with RSA-2048 CAN BE FOUND Here what does this mean this meas that the structure and data within your files have been irrevocably changed, you will not be able to work with them read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. how di this happen especially for you , on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the internet. decrypting of your files is only possible with the help of the private key and decrypt program, wich is on our secret server. What do i do alas; if you do do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. if you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. for more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: if for some reasons the addresses are not available , follow these steps: 1- download and install tor-browser : www.torproject.org/progects/torbroser.html.en 2- after a successful installation, run the browse and wait for initialization. 3- Type in the address bar 4- follow the instructins on the site. important information your personal page your personal page ( using TOR ) your personal page code (if you open the site ( or TOR's ) directly ) I tried to find solutions and follow the steps but to no avail -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Hey Said, You were injected by a virus called 'ransomware'. This software has encrypted your data using a private key which is only available through the attacker. Despite that you shouldn't pay money to anybody for decrypting your files or making the private key available to you. There are several methods available to 'clean' your computer, just google for 'CTB removal' but I recommend you to setup your computer with a clean and fresh install of your OS and restore your data from a backup. The ransomware/ virus is not affiliated with or made by the Tor Project in any way. Regards, Kleft On 28 Aug 2015, at 08:24, SAID MADI madi.sai...@gmail.com wrote: Please Almsaadh sooner that all the files are not open to me because I know no PDF files and Word and photos and a video message, but not in the form of image documents as follows: what happend to your files all of your files protected by a strong encryption with RSA-2048 CAN BE FOUND Here what does this mean this meas that the structure and data within your files have been irrevocably changed, you will not be able to work with them read them or see them, it is the same thing as losing them forever, but with our help, you can restore them. how di this happen especially for you , on our server was generated the secret key pair RSA-2048 - public and private. All your files were encrypted with the public key, which has been transferred to your computer via the internet. decrypting of your files is only possible with the help of the private key and decrypt program, wich is on our secret server. What do i do alas; if you do do not take the necessary measures for the specified time then the conditions for obtaining the private key will be changed. if you really value your data, then we suggest you do not waste valuable time searching for other solutions because they do not exist. for more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: if for some reasons the addresses are not available , follow these steps: 1- download and install tor-browser : www.torproject.org/progects/torbroser.html.en 2- after a successful installation, run the browse and wait for initialization. 3- Type in the address bar 4- follow the instructins on the site. important information your personal page your personal page ( using TOR ) your personal page code (if you open the site ( or TOR's ) directly ) I tried to find solutions and follow the steps but to no avail -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
++ 23/08/15 15:59 -0800 - I: Beware though that running a Tor Relay from your home connection is discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en Running an exit from home is discouraged not a middle relay. Less fearmongering might help expand Tor. Reality is a thing of nuance: although the risks of running a middle relay from home are for more limited compared to running an exit relay from home, there are some things that should be taken into account. Most notably: the IP-address from your home connection will be listed in one or more block lists, based on the criteria that these lists list all none Tor relays. This may be a problem when site owners decided to deny traffic from IP-addresses that are running a Tor relay. As a result of that, if you run a middle relay from home, you may have difficulties reaching some sites. -- Rejo Zenger E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl T @rejozenger | J r...@zenger.nl OpenPGP 1FBF 7B37 6537 68B1 2532 A4CB 0994 0946 21DB EFD4 XMPP OTR 271A 9186 AFBC 8124 18CF 4BE2 E000 E708 F811 5ACF Signal0507 A41B F4D6 5DB4 937D E8A1 29B6 AAA6 524F B68B 93D4 4C6E 8BAB 7C9E 17C9 FB28 03 signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 As the Tor Relay software does not fully utilize multiple cores yet the use of the parallel processing power is not that big. It might help a bit but not as you would love to see it. The choice is yours. Beware though that running a Tor Relay from your home connection is discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en On 8/23/15 10:52 PM, Naseem Dillman-Hasso wrote: Hello, I have the ability to get a parallel processing computer. I was wondering if this would help run a tor relay faster, or if a regular computer works just as fast. Thanks so much. - -- Tim Semeijn Babylon Network PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5 -BEGIN PGP SIGNATURE- Version: GnuPG/MacGPG2 v2.0.19 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBCgAGBQJV2kB7AAoJELGHAxAqVA+lDkgP/A1UAvZmnykFhmDik1W/J62v ARW/pP4KcGtP3oX03lggSti70J00NDGd3yy1YSeChi/KklHXU2y4dhp0VPQE1Sut IhMownEa/p4T9ZV9lnJg6Nh5ITCHP4lrUz586XLgBvFAWkF73JVF8zjlfVwBx6xl Lx49s06Rl238qA5F6fC5Xcg8i7T2jFWaLbU5nEt6PY1TIx/8r5Fw+cYDiiR2smW2 AGQs6XKZLctoBnXeM+6Cm2ip2KopPMPdPBkcPrlU9PvmEy95qpy5tTyGejKuoQfP evpYm1Y+TWD6FRvHf+I8UOXthLryx5o+jHN9jQn0t8H6SPaDSl5EYo/K8F8WQRcd 0mDcbDRR2662EqMwt0aZxWiMdBCpXm/XapJdXBn4LqwYPL4J8V48qb9RfiHy6Js+ rlmpJxYlAy+qNE6GsPT5Z3Sn9/YKVFa84E4AZxKi+ij9vKDnEu2EJ67r2OckWtEC 9WXF6sxgFyO4DF6TNrRe8NlKjl+E0HtLl+Y6EoDOoCiNabZ3qMe4tEjLf5E3qC5u t/7AAJ/YvUW5JmhHXSEmllKB71POuUVwvUPeQBSUvraxKP+0E9cjBKQFEUkjHsrf HSXDiVbgWZLoTKcIKDyiIceXy490oquR5zSzW/Em37kCqjW3Q2xLVILdVKJ8ENKn X+3E97iVDnHySKhySjFt =sWyn -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Beware though that running a Tor Relay from your home connection is discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en Running an exit from home is discouraged not a middle relay. Less fearmongering might help expand Tor. Robert -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Hello, I have the ability to get a parallel processing computer. I was wondering if this would help run a tor relay faster, or if a regular computer works just as fast. Thanks so much. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 My bad, I should have explicitely mentioned exit indeed. On August 24, 2015 1:59:31 AM GMT+02:00, I beatthebasta...@inbox.com wrote: Beware though that running a Tor Relay from your home connection is discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en Running an exit from home is discouraged not a middle relay. Less fearmongering might help expand Tor. Robert -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk - -- Tim Semeijn Babylon Network PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5 -BEGIN PGP SIGNATURE- Version: APG v1.1.1 iQI3BAEBCgAhBQJV2mCJGhxOT0MgPG5vY0BiYWJ5bG9uLm5ldHdvcms+AAoJELGH AxAqVA+lBX4P/idE5dWUxNRgu0gjOfXFWiz+4ua+ZiHJHtLQs/m5CMSiyaCC5Huc 8LCUICaT9REUnocEb03D+ouC1Vgf+ck0Kx5VCT5p6BJqUv2/2OkLzyRIOoPLFsiE NlzM+42GM73BVMn+RoaUJUDdK7vAX4d7eFzhaLWd5scVK9Wbi2kOxf4ulRdVAJzV LRi6ZCoiiyqH2znEz7tB0Hfz01a3Duze7HQDsTCrLQsvV8h5euE1EGmrMYaGJykH jM1AGY5CHt8Vu9H181Dn9/A1X28Vv0Sqq0VCxrOEzA+0bR6UDYxMvcnEoG1n3P5T loZkyoiisX/I4Uh+iye2CDhCHcFuz7wKMRAB2IiOMQVtq6R/Ah54fA00cZvlf8mH T7TUi/lvEcMYR8qrlu5/P7GnjV+W5NsdZme/TO/9kTsKzTkVGWFUlD0USws16Eru fEFU8YdtzgP4Gl2eZQ/WMnh3HG739Ltpubn3YLIe3FBbhhfPe05J0QxRfUeM5ImX fHBozkPhSQnoQfw7VkOWXSYLB+o2h8oHKmPwk5i019LldbXrhTamhIoRRi3k9K8B njTxtX4p44K4UEZ/LHJW1GUh/mRmEt8GaQI3roqVl/1dvioyOISr3ttGlEvF0IyZ gv3JDDvFSuOGNVcyN9yGI/0/ZXc1jWBRL4d344oWwUWgJMvGiLfsDk9U =T0ws -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Tue, Aug 11, 2015 at 9:28 PM, Thomas White thomaswh...@riseup.net wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Does anyone in Tor want to name a price to get this task done? Can then be followed by a match donation to be spent with on whatever you wish once the multicore has been added. Hi, Thomas, and congratulations! You've asked a question I wasn't prepared to answer. Here's a thread we had about it today: 18:25 nickm So, I assume people have seen the tor-relays/tor-talk thread about Hey Tor folks, what would you want in exchange for making tor parallelize better 18:25 nickm Do we have a way of even answering that? 18:26 nickm If not, I think we should reply to say This is a generous offer and we need to apologize for taking so long, but it's not been something we had a way of answering before. We'll try to come up with such a way and see what it outputs RSN 18:26 nickm thoughts? 18:44 arma4 sounds plausible. i think the issue is a combination of not enough developerpower and also not enough money 18:44 arma4 a short small amount of money wouldn't be enough to overcome the first issue, 18:45 arma4 and we need to overcome both 18:47 nickm yeah. I think that anything less than a year fulltime of dev time, plus overhead and incidentals, can't work out here. 18:47 nickm plus, no timeline promised 18:48 nickm arma4: thoughts? 18:49 arma4 are there any incremental steps that can be done, by other people, in the mean time? 18:49 nickm in theory sure 18:49 arma4 it seems like a wildly unpredictable amount of work 18:50 nickm in practice nobody who isn't a Solid Wizard is going to get much done here 18:50 arma4 and it's not even clear, to me, what architecture we should use to parallelize cleanly 18:50 arma4 all of this ipc stuff sounds great in theory until you try to run the program on ios or something and then boy are you surprised 18:51 nickm I have an architecture in mind for circuit crypto 18:51 nickm for tls, I have no bloody clue 18:52 toml but would we feel good about taking a shot if there was one full-time equivalent devoted to the problem? 18:52 arma4 maybe explaining very briefly why it isn't trivial, and why it is going to be hard to do right, would be helpful for the folks wondering why we don't just do it already 18:52 toml arma: I agree that we should take the opportunity to explain the challenge 18:52 arma4 toml: and if we had said full-time developer, would this be the most important thing to have her work on? 18:53 arma4 so far the answer has been no, other things are more important 18:53 toml well, it would be an answer to the question: what would it take? 18:53 toml so if they put cash on the barrel head, we could dedicate. (I would bet there would be other associated benefits not strictly related) 18:54 toml probably the cost would be too steep, but they would know where we stand. (part of the education piece) 18:55 * nickm suggests that we just copy-and-paste this conversation into the thread 18:56 arma4 sounds good 18:58 toml arma: and let's always use the term full-time equivalent. There is an industry standard for a FTE amount, but we reserve the right to apportion those funds among more than one person. 18:58 nickm any more to add ? 19:00 nickm I feel like we could safely say More than 80k and less than 500k on this today, and if those numbers don't scare people away, invest time into digging into getter numbers 19:01 arma4 sounds good. it is basically a big architectural change inside tor. our work on better testing and better modularity is (slowly) moving us in the right direction as we wait. 19:01 toml I would say minimum $100K, as this would leapfrog several other priorities. 19:02 nickm also overhead 19:02 toml si 19:02 nickm yeah, good point, toml 19:03 nickm OTOH, we can also mention the $0 price point: for no money at all, we will _care_ about this, because we already do. And at some point eventually, somebody will surely work on it in their free time, one of these days 19:03 toml (and that is too low for a FT equivalent, but it is enought to motivate us to explore 19:03 arma4 heck, not only do we care, but we even wrote up a thing on how it might be done 19:04 toml arma: should we share that? (or share it again?) 19:05 arma4 nickm should point to it in his response i hope 19:06 arma4 he wrote it so hopefully he knows what is the best thing to point at :) 19:06 nickm well,it's quite old and maybe I should revise some morning/afternoon when I am smarter 19:08 toml perhaps leave it as is — show how long we have been thinking on this. Then maybe a add brief bit on things we have learned since, at your leisure. 19:08 arma4 that way lies paralysis. which is almost like parallelization, but not quite. :) 18:13 nickm ok. So I am going to add this to topics for the wednesday core tor dev meeting, and send it to the ml, unless somebody objects? I think the URL I was asked to add was
Re: [tor-talk] (no subject)
And yeah, maybe because other priorities, such as the need to work on other features and keep the code reasonably simple still outweigh the performance benefit from proper multi-threading. Don't forget about security. Is it worth having Tor run a little faster at the expense of complex multi threaded code with more potential security vulnerabilities? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Tue, 11 Aug 2015 21:08:45 -0700 $20 today gets you not just a public IP address, but a whole 100 Mbit unmetered VM or a dedicated server to go with it, and not even just one, but easily two or three. i'd be very interested in purchasing these if you were to share the offers! finding hosts happy to allow exit nodes is tricky but it seems like you've got it down. syndikal -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJVy79zAAoJECUseDL/8z6TkpkP/0ru6awh39lckiikFnU1WTRQ VOdJWBweyIP/YVZpsKdTqlqtOzRHtUfhkbY/S5fPXD8eGQfVv7XJ8dkYyrCRwUAj ARqbQADzd4iW94MJYydaWEqipuVms68yN5GKz4J7KL17HqOUZi1TQ2hEloFodZR9 fB6Kdzqve/kLM8Mnwrs2WaNZyG0BpdvHi2HmQR+pmnAm4H2Vowu+0NUO7S8jDC+F tJwrrOUuhDlJP2iCiB8HpKbidmII5CKwdSkBUpGtf0rrdO7Tef47jXIJrca3sn+1 URI/JJ0EEQDYB1YG9MqfvCbmldp7tNtgqtndUIMaT0j37Ai0CT4xdxIWPgFj5Osh 147jB35subj7DiBWd1ewtzUZT9XDIO7NdALGIrthBasYp2FJ/JopYVaaRMys8yG3 nlS+TPfRCWo2DWZSX2cHyLkvSgoHIScKJTNz9na83+Cb5M/8y+sOVkCEUdBnVQlv XB6teY5LfOvg8LCNkTUrOY5/gsT+McEnjma0JLgXnSg0k61cN87qwMo9LYcqZZH3 FSJlKaVCLWhzPoINzAPu/xKP7/CgqW5zhINpdnQyksZUQXuRPJUdXi7LAVXaA2wJ 7dj1le0hNHGO/PyZEiQzzqduoZwvfj81d2bLI2lFXgc3fOsOKZK77k3g0em7gJCY 70dfdWN3s7KNJP0az037 =04MA -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 $20 a month for a dedicated IP is a ripoff. My point here is actually not about the cost of multicore being added as each user can rate limit it to curb additional expense, but the cost of actually getting the thing coded and implemented. For relays, being able to make more use of available bandwidth would vastly increase the network speed, furthermore make home clients see an improvement in their daily Tor usage. It also benefits hidden service people as they can then run their Tor processes on more than one core and thus handle higher volumes of traffic. As a disclaimer, I am of course asking since my company is going live in the next few months. But of course, that is also where my funding proposal is coming from. On 12/08/2015 05:08, Ryan Carboni wrote: Does anyone in Tor want to name a price to get this task done? The price of a public dedicated ip address is at worst, $20 a month. Two tor nodes max per IP address, so roughly $20*6000 relays / 2 = $60,000 per year. That is perhaps the only price of no multicore support. Although, many Tor nodes are hosted using dynamic IPs, so perhaps the cost is closer to $1,000 per year. In any case, I'm not sure how many sequential operations there are. -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBAgAGBQJVy0cSAAoJEIC+hZxcLl/k5UsP/1iesTyti7a47o0qUsu4kFp4 Qq6Z4rHe3VxxJuKOis0VcG8RP5LnuhfRyTfAmiD2g5mrwbOUfjldo4B2q0kIhIWt GUyh4ulZs4DdeXahE2Z3YyIdDQzYVW0SYGTKlp4RwZYyZQSYgqucLboho2JANy3p fOb5KNX+3+3UQRKBI86bXFDm0vnmk9UZMyhQ3UavWPrQhpp3BE9DHlJzhjqOCBCy ANE3xJmZET4tVnDDKIE+u6QDihqHInojxJfcUomKq5FBdVcBvPjUZ7WYt1Y6GN/n AWKV2xDkfiW0ZLEciRUOgaCPsIm9erWHUWBYv9HS2npYExQg0XDZpmRJgQk528a8 2I7eESkltLkGH8dZOgBtKjtIF6Hwxz03qYA8U8oPRercFJX8tKzcqyMoBhjQrL7T ++xEw/j/+fH54GZ/i3pEO0H395qBa24yt4tQ/6uHqrSR7Uc7WXWSXDSkSZxBcAyV WRA1WotsZ0MZmpALHxuPGAzSXOGCL0TKHSxGHDlUd4+glqsqvcoMTZZSd6E5E3Vm GlP2OyagRnW4pj+ykqy0SYjWaaMc9AMB2/R7r3exQ+moeP43idseJPDO6fvA3lrh aZ9VPcF1fEIB7SJggEjCDXeMN/XzD0fhhODxPGgs816NiD0DCt7D74bFAoddBlWk 3WeY2mUgQHMfo7TiOkRP =AUY9 -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Last year's summer of code had someone working on Tor multicore. This year's summer of privacy has Donncha O'Cearbhaill working on load balancing for hidden services. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 08/11/2015 15:13, Ryan Carboni wrote: Why is there no multicore support for Tor? I haven't been able to find an answer to this question. This is maybe because even with the quite high for the Tor network bitrates of 5-6MBps tor process never comes close to 100% CPU usage on the average hardware. So multicore capability will add no benefit. Yuri -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Tue, 11 Aug 2015 15:28:01 -0700 Yuri y...@rawbw.com wrote: On 08/11/2015 15:13, Ryan Carboni wrote: Why is there no multicore support for Tor? I haven't been able to find an answer to this question. This is maybe because even with the quite high for the Tor network bitrates of 5-6MBps tor process never comes close to 100% CPU usage on the average hardware. So multicore capability will add no benefit. never comes close to 100% usage never *Repeatedly headbangs on the desk* Uhm so what was I talking about. Ah yes, I believe that's not the case. It would add a great deal of benefit actually. As to why it's not implemented, I think simply because no one has coded it yet. Often things tend to not exist until someone creates them. For the reason why it's not added, my guess is because it is rather difficult. And yeah, maybe because other priorities, such as the need to work on other features and keep the code reasonably simple still outweigh the performance benefit from proper multi-threading. Currently Tor can use about 130-150% of a CPU, so if you have 4 cores you could run 2 copies of Tor on the same IP and attain a reasonable degree of your resources' utilization. -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Why is there no multicore support for Tor? I haven't been able to find an answer to this question. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Does anyone in Tor want to name a price to get this task done? The price of a public dedicated ip address is at worst, $20 a month. Two tor nodes max per IP address, so roughly $20*6000 relays / 2 = $60,000 per year. That is perhaps the only price of no multicore support. Although, many Tor nodes are hosted using dynamic IPs, so perhaps the cost is closer to $1,000 per year. In any case, I'm not sure how many sequential operations there are. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 8/11/15, Roman Mamedov r...@romanrm.net wrote: ... *Repeatedly headbangs on the desk* Uhm so what was I talking about. Ah yes, I believe that's not the case. It would add a great deal of benefit actually. it would be useful, particularly on systems with native acceleration of supported crypto primitives. As to why it's not implemented, I think simply because no one has coded it yet. correct. in particular, making the Tor internals efficiently multi-threaded is difficult due to the particulars of crypto and Tor network I/O in the implementation. i thought i had a list of Trac tickets to the gist of this matter, alas i cannot find them. perhaps someone else has a convenient collection? this also came up in context of using CUDA or OpenCL to accelerate network crypto via CPU offload to GPU. the good news is that it is maybe less hard now, than it was some years ago, to make this transition to well threaded internals in Tor. maybe soon, even closer yet. and as you mention, patches welcome since the best fix is code under test :) best regards, -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Does anyone in Tor want to name a price to get this task done? Can then be followed by a match donation to be spent with on whatever you wish once the multicore has been added. T On 12/08/2015 00:32, coderman wrote: On 8/11/15, Roman Mamedov r...@romanrm.net wrote: ... *Repeatedly headbangs on the desk* Uhm so what was I talking about. Ah yes, I believe that's not the case. It would add a great deal of benefit actually. it would be useful, particularly on systems with native acceleration of supported crypto primitives. As to why it's not implemented, I think simply because no one has coded it yet. correct. in particular, making the Tor internals efficiently multi-threaded is difficult due to the particulars of crypto and Tor network I/O in the implementation. i thought i had a list of Trac tickets to the gist of this matter, alas i cannot find them. perhaps someone else has a convenient collection? this also came up in context of using CUDA or OpenCL to accelerate network crypto via CPU offload to GPU. the good news is that it is maybe less hard now, than it was some years ago, to make this transition to well threaded internals in Tor. maybe soon, even closer yet. and as you mention, patches welcome since the best fix is code under test :) best regards, -BEGIN PGP SIGNATURE- Version: GnuPG v2 iQIcBAEBAgAGBQJVyqE0AAoJEIC+hZxcLl/keTAP/AnxXMUFNxFMY/sCMjFWrmV+ soKpOuo4Xoz4leJh15JkTtNK0FePODA6zH2Xrf1r7MiPq8EU06SJlOivPgqruV3i iLcCjKCLDGN+21T0M9br/dCxnXdwjT8s0MdnNvIQYQynX2bR7Wv+XMD5JIUWy5io JoNWWCTR3dRIPwqTFYltHDZYJp42qSrgTFicFDyZdPLtdzIz9Rl4C30sNPlA+uoG qQWAA3AsM2LnMvOUc2wjH/hvaG5cHBbATA65N1kfxKneIemEL/FS85YYwM1C/O4t jdUzN1Me9qW2VD9P/KtIVidl3RQcGZKnv6ZoAqGHwKBjEVEUa6oM8TWwyfUNJTHE GKBvCeOkblkOwp5WvzuHMRLdpr61hir+37KeZtJfbShGukEWrx8lxAfIYBui7iPC 0HwISwTxyCMd//OuzE6WFLyokwWUTVb0JPYoQMUxxDiPnnVmNfxq/M5sc1NXGieK KQFkzwaFRdk3aFeu9nuQRrGKk1okFsyPp1PU18ZBa+4TtbZar0OFn3nOQgO599pv NN0zrTuNfjFRaknkWJB3MkqBtLk1Lkg8LP0+fmTd3uHUkh7KMOUKFN4mC3thS3UT UteN58WLkdAxG8VHkR14ZlN30Us1/1bMZtHdMJTZrHIvUkswbkiUV0rATq+Z11hS Fwu52KUTcIKnacgoSe0u =5Wd9 -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Tue, 11 Aug 2015 21:08:45 -0700 Ryan Carboni rya...@gmail.com wrote: Does anyone in Tor want to name a price to get this task done? The price of a public dedicated ip address is at worst, $20 a month. What. More like $3-5, and that's indeed at worst, with the price more commonly being around $1-2. $20 today gets you not just a public IP address, but a whole 100 Mbit unmetered VM or a dedicated server to go with it, and not even just one, but easily two or three. I get it that you want to influence the decision making, but using comically wrong estimates will not get you anywhere. Two tor nodes max per IP address, so roughly $20*6000 relays / 2 = $60,000 per year. That is perhaps the only price of no multicore support. Although, many Tor nodes are hosted using dynamic IPs, so perhaps the cost is closer to $1,000 per year. In any case, I'm not sure how many sequential operations there are. -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
https://www.torproject.org/download/download-easy.html.en -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Sun, Jun 21, 2015 at 10:35:09PM -0700, Andy Iwanski wrote: I'm screwed. But it they ain't getting my money. My files weren't that valuable to me or anyone else. We can never let the terrorists win. See https://blog.torproject.org/category/tags/ransomware and beisdes that, it is considered good practice to do backups. There may be tools available thay may decrypt your data. https://en.wikipedia.org/wiki/Backup -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-Original Message- From: aiwan...@cox.net I'm screwed. But it they ain't getting my money. My files weren't that valuable to me or anyone else. We can never let the terrorists win. The term terrorism is now virtually useless and does not fit your situation. https://firstlook.org/theintercept/2015/06/19/refusal-call-charleston-shootings-terrorism-shows-meaningless-propaganda-term/ Robert -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 06/21/2015 12:29 PM, Andrew F wrote: Would Linux work as a rescue disk for him? If Joe is right about the cause, no. His stuff is encrypted, and he needs the passphrase. SNIP -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I'm screwed. But it they ain't getting my money. My files weren't that valuable to me or anyone else. We can never let the terrorists win. Mirimir miri...@riseup.net wrote: On 06/21/2015 12:29 PM, Andrew F wrote: Would Linux work as a rescue disk for him? If Joe is right about the cause, no. His stuff is encrypted, and he needs the passphrase. SNIP -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Would Linux work as a rescue disk for him? On Friday, June 19, 2015, Joe Btfsplk joebtfs...@gmx.com wrote: On 6/19/2015 4:17 AM, Andy Iwanski wrote: Can someone please help me. I have lost access to all my files. I do not understand any of this and need to access my stuff. I can be reached at XXX-XXX-. I tried following the directions but it didn't work. Also, it's a bad idea to post personal data (phone #, home addresses, etc.) anywhere on the internet that the general public* could access it. * Meaning, spammers, marketers, but possibly also persons w/ some malicious intent. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 6/19/2015 4:17 AM, Andy Iwanski wrote: Can someone please help me. I have lost access to all my files. I do not understand any of this and need to access my stuff. I can be reached at XXX-XXX-. I tried following the directions but it didn't work. Also, it's a bad idea to post personal data (phone #, home addresses, etc.) anywhere on the internet that the general public* could access it. * Meaning, spammers, marketers, but possibly also persons w/ some malicious intent. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
If you are the victim of ransomware, you have my sympathy. Note however that Tor is not connected to the malware that has encrypted your files, nor to the criminals. It's just software for browsing the private web. There is a small chance that this blog post may help you: http://krebsonsecurity.com/2014/08/new-site-recovers-files-locked-by-cryptolocker-ransomware/ If you are intent upon paying the ransom and need to get Tor working, then this list is the right place for help getting Tor working - but only that. Note that you can also access .onion sites via https://tor2web.org/ . Good luck GD On Fri, Jun 19, 2015, at 10:17 AM, Andy Iwanski wrote: Can someone please help me. I have lost access to all my files. I do not understand any of this and need to access my stuff. I can be reached at 480-688-1048. I tried following the directions but it didn't work. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- http://www.fastmail.com - Choose from over 50 domains or use your own -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Can someone please help me. I have lost access to all my files. I do not understand any of this and need to access my stuff. I can be reached at 480-688-1048. I tried following the directions but it didn't work. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Tor community, Martin Peck, Diane Roark.. Whonix Qubes has been called out in a US Gov court document of a NSA related whistleblower case of Diane Roark, inside a recent affidavit of Martin Peck's. http://cryptome.org/2014/12/peck-roark-affidavit.pdf Quote: EGOTISTICALSHALLOT was created in 2014 by Tailored Access Operations as a QUANTUMTHEORY Computer Network Exploitation component effective against hardened Whoonix Qubes users on the Tor Network. Extensive details of this instance have been documented here.. https://www.whonix.org/forum/index.php/topic,805.0.html Would Martin Peck or Diane Roark please promptly inform the community of the known origins of this NSA EGOTISTICALSHALLOT text written in their documents, and any knowledge of its authenticity as being real or fake. And if anyone else has any additional information regarding this EGOTISTICALSHALLOT mention-/-codename-/-program then please contribute. Thx - VFEmail.net - http://www.vfemail.net ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the NSA's hands! $24.95 ONETIME Lifetime accounts with Privacy Features! 15GB disk! No bandwidth quotas! Commercial and Bulk Mail Options! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] no subject
Ah, apologies for the mis-send. - alec -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 GUYS still looking for ed snowden. i am a producer in l.a. and want to do his entire life story, get his exclusive permission, a 1 or 2 yr option. please help connect us gregcurcio at gmail thanks men This is the wrong venue for this request. I am highly doubtful that anyone here knows Edward Snowden. This is comparable to walking into the auto dealership where Snowden bought his car and yelling, Yo does anyone here know this guy. You got a few no's and a couple of suggestions for where to look. Shouting further will not likely net you any further leads. Now if you'd like to buy a car... (discuss Tor and Tor related topics) Thank you, Derric Atzrott -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP X6HKkqQ/S7RfUn5qdIK4Jic= =Wzlm -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
sorry, wont happen again, frustrated about what i read, oliver stone Greg Curcio On Fri, Oct 10, 2014 at 6:17 AM, Derric Atzrott datzr...@alizeepathology.com wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 GUYS still looking for ed snowden. i am a producer in l.a. and want to do his entire life story, get his exclusive permission, a 1 or 2 yr option. please help connect us gregcurcio at gmail thanks men This is the wrong venue for this request. I am highly doubtful that anyone here knows Edward Snowden. This is comparable to walking into the auto dealership where Snowden bought his car and yelling, Yo does anyone here know this guy. You got a few no's and a couple of suggestions for where to look. Shouting further will not likely net you any further leads. Now if you'd like to buy a car... (discuss Tor and Tor related topics) Thank you, Derric Atzrott -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.2 (MingW32) iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP X6HKkqQ/S7RfUn5qdIK4Jic= =Wzlm -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
get bridges -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
get bridges 2014-10-10 1:35 GMT+08:00, ben ho b10pok...@gmail.com: get bridges -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
get bridges 2014-10-10 1:23 GMT+08:00, ben ho b10pok...@gmail.com: get bridges -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
ben ho writes: get bridges Hi, Unfortunately you sent this to a public discussion list for talking about Tor, which isn't the right address for requesting bridges. The right place to send that request is brid...@bridges.torproject.org. If you do that and your bridges don't work, you can also try other resources at https://bridges.torproject.org/ Good luck! -- Seth Schoen sch...@eff.org Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
GUYS still looking for ed snowden. i am a producer in l.a. and want to do his entire life story, get his exclusive permission, a 1 or 2 yr option. please help connect us gregcurcio at gmail thanks men Greg Curcio On Thu, Oct 9, 2014 at 10:37 AM, ben ho b10pok...@gmail.com wrote: get bridges 2014-10-10 1:23 GMT+08:00, ben ho b10pok...@gmail.com: get bridges -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Look at https://firstlook.org/theintercept/staff/ for Glenn Greenwald's address. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
SARRIS good day I need help . running tor onion browser bundle on a Panasonic Toughbook cf-29 running on 32bit 14.04 Ubuntu oS only . Microsoft windows has been removed out of the thoughbook . like you to send to me a how to run tor onion browser via command prompt on a Panasonic thoughbook cf-29 running only on a 32 bit 14.04 Ubuntu operating system . -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Hello is it possible to set a router to relay tor, all the time like portforwarding. Because I will help tor, also ween my pc is shut off -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hy there, maybe you want to take a look at this. https://elrippoisland.net/public/how_to/anonymity.html Kind regards, elrippo On 30. September 2014 12:52:10 MESZ, René Pedersen kpdenm...@hotmail.com wrote: Hello is it possible to set a router to relay tor, all the time like portforwarding. Because I will help tor, also ween my pc is shut off -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk - -- We don't bubble you, we don't spoof you ;) Keep your data encrypted! Log you soon, your Admin elri...@elrippoisland.net Encrypted messages are welcome. 0x84DF1F7E6AE03644 - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.4.11 (GNU/Linux) mQINBFH797MBEAC0Y0NeI7lmDR9szTEcWuHuRe0r/WjSRC0Nr5nXsghuMcxpJ3Dd BOBimi4hdMMK4iqPVMwNw6GpKYR3A9LHHjbYRXHUKrJmB+BaJVyzJXN5H6XvxTTb UfX+DaXAGJW/G+3cBB3qm/QaU8QGkBKfXq0DLTaTGPkGKxEAldj/8onGZhawdJs+ B92JrW+S2HDh15pIuXzSqe7eCcIOdvvwfWe0fJi2AraA7LYGpxP6GcC/b9JJpbq5 Y6DfE2Aun9ZK3iHqURyrms0Whbv1CgmUahL2MVYCsTsXwe0GwlAxxKvjXAiXuo+R 9wO5wsXvVVSVNqsk9Yqi+wYzdPKndTU0GyxSApQHroF+cxaZ8Lk0xloj18+LdCSs e5IiTSXH0MMsDdWWdHlrgk+bgDG+0Gu3ne4vMwGdKO7AhYgQW/ueMy4RnkG/nsV9 jry5BO4gGAI1Ij8KvqUzEnvJFGE3ptJogU+zazWWDUWmL3ecKb3aDRlJFnZ3kJ5h q8GolZVjpk99V+4B5WVRPXdej/p5J19tXycK/jdNmr4oC8NyUhIpe8xHELnfoB4z +rxiTx+KMnW0rY8EQg8O2ixEYt5my90IwQkxcxIxextVrqjJjYn8extc2/v8yGzI KmTEJxdADB5v/Jx4HiLHNDSfBUb8gfONCkNSTYvTcSwTjWzHOkXeE/9ZbQARAQAB tD5lbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0ZWQpIDxlbHJpcHBvQGVs cmlwcG9pc2xhbmQubmV0PokCOAQTAQIAIgUCUfv3swIbLwYLCQgHAwIGFQgCCQoL BBYCAwECHgECF4AACgkQhN8ffmrgNkT8+BAAoAXBqu4/O2Cs5FSWWZpzgScNEgq7 uHhOKeYmRfgKlOUPoYlPB1DBqdOAXSKb9OvsmyOvpoGnqijB7aAJBoyQYW/OCQgd U8L4eTCf4yRZnfFLdgskcPfN1p0Rs/yinGEooBJFtYa7mT6J0UTW2JjCLZK2AFCW oF+KBu5JICXGBXigb2ZbX1jWjxP5H1RidQw6HF5z4z34SjLWAOOeZ8B/Xfz6Fs0s IAuLu2O4HE4DI8Qu196LhSVHHgr3uMTkvN1t5nKwyjrRQztwXXk9qIomII3ydNYb BYAGdWNNMfLb1kmDwC5wQHAFvSP1aiMF3aKAY+gl2wXSGO6JqM0SteJS3dytIljI kzu0atc9HuGs/HDQgdmpAS4WU2YefEr/WieltSiAKlwuC+3wg+CONJ6TE1vgNDU/ axerttb0jq7UQb/nAp05bsrB7XH1Vs+1ON9lUPEfWRmwQcrVK5JUrUWa/4tA/UeM XvFcPFtFluGTlLewgJIqcvjPXFwpbDZprXJsMkwew/A6B6n3+0sbgf7p3QSGkVbi dwQAymTbHdYqLnbcnKZhjto3Wjw1J5QB2wuiRYlpjV3i7AWTGlqoSTOWCCV+HamQ qeFYNYAWNFx3+J/oi7xDi8t9bHVNA205equ+y2sj3G5uGJ6LSHQ8AXp9uOipUUvU 1MJN0yLXr9PIwvi5Ag0EUfv3swEQAL0+MnxHGrTjSYdfdua4SBpmytDONM1EngeY s+WyaC/760MughKbaysI/nK2LB1vnwEY7f3NM4fxBx8u2T7VBm6Ez6Fs23Bb8Rkz f97bPSdxCmg64GPHfLA9uwTIXcYS+MpI86WOf6eWY0rRpf7Y9Nl7YoUNvzOyUPqc ggdcnHce8zYv7A/WS8flZDm8tVFPsHrQDEwNMws7ZhiNnHkeZeRJrvCuB7oEVich O/ROYoA5o6NozWYQbjxe1f6Yur4Q10qgVcxVnyLFJSbg6vZSzL7KYh3Z5iBOzPHt 7cwEDrW8W4Kl2Qj8rhJ4Wxs94CAtua7IXK44sVZWQbyHcOXRikgGMZKkEZzVCQa5 KD1u1ZrcBCyuMAir0hsmS3jhCUwpiE2c3SRk8O8CgixhTcBk0X/k9ZFu3Hbi1JMB FLzs/Nq3tYAYvVivhPloSxmYBPsafYHCZM83yBNNsralXh5zjB+di90G+AMXt2PN LTcdovZuWtC0s8/jrx+zv/AA4FAGYU9OVl+YL9ybFX8gSdMEcixyzQcKfiFBjpWv 5iFrwIuDlaXMcheyrhc9aGOxfx44OXc505+VjO/1Q/8EOWlJ6UwOi6GMkj5T+RFJ MDyP0UixS7dt6wTuD5t6PRuyWWxZswgrbL9hjwGFr154Z19TWeNWc23pWtUvQJos UCxl2nFHABEBAAGJBD4EGAECAAkFAlH797MCGy4CKQkQhN8ffmrgNkTBXSAEGQEC AAYFAlH797MACgkQJEPd69lQ0evA+Q/+M7lSFlrQWiRsFqDjh+kTJc+0OEBCvnfo N2KPyXXbfc//qup55PfEygE6C60zvrlv3WE33GZ5GS5MLuDMP82b+a5Yt16NQU7L WtAg1g0S0BvazW+28TgnfO8bhbGaFeE9ccw3xLmlbwZQ3f3LtMKdwFIROiG6hvAs 9U54QYti3tv9DowRYYWpdr0Ga8RqeGNtCKc0v2opy51MpzKWjwUW0i3XlSlyY8Lj 1KT8PyznNPw32nYpmDizz+0OUJNnn/kT+GnFoR3DJnFosTOrnxFJp+N+nejMp/gW r9NM0/E7H+P53IiytBOt5/0vsOaCFGdYGhKEjmJi3dHS4Xk1ObD1mjdD1YDOlWWU 3Md6BDHd4W7Q8gT7oQfTIMLd3HzV+WNPIdocPLBaeA/tRD8Pg5CCmncAmSub4F5T An7FlnACtSOv3cIWQ0TymS42DihDaJ5d1RvNzKw+zHYdPvf471JFZR3TDhkPbLIr 9czR7kbpnXRwchgwXQn306NVWf37TgA8wpbnFTazZ38iOeqcb9oKprqnbgEdr3PN OhKSlMTkzAqf3MEi2Fyua4BADMhS3oBwCRgDTlt6wquEytpNSlZaHnyiyIgOpekF Uy5K3w8NhHqeifRPrNb/UcCbXtXz+puqIEZHMenpv6FRlTTKpdoHoVXSkp1TPMGN /VaCiLbP4Z3xEw/9EbAJJkhmmx1Qw3ueoqc4h1MmhUtIdxSZ/oA9SjwlnY++zvaZ 6w1wTS4P+OUkETNDtItdpxXMJ9qfSy9voAQc2K43WMZCCmpPJYSdqaZZNPFj+Ne8 6FNtNKuUkXREybpHwlVAXnHzInmFOOM9RAmF70r3zEmKt77W1ztBLo2o9X79gPgL u9ThgrH6Oc2k46n+9nc3joccr7miiX/bp976DNWcWdOYThiSSOCb8Zw9/Zs935i1 wUVkYTj24tmBH4H5ov9ib7RPmU21ru458RbUKG0ONAqBtAHNyXHzUnXsrke+D4VW MI06YcXSk8YeYgQ8GxgHQc+W2bb8LIbKN1hEYJ0wzM62vKR2/Oiwuf8lXutIKTuz +v7Vj1PQd66DGHsxtWRaWnr1c54JTL2wICHJYKFH4grp7864+GL/uQ1O/Z/XxVku E1JQ/AnwBGU1M1S6otwWGWVRjzEzQtxsfcCEPvV/9td3FIFQAbGTPb+48XFU+TY9 8AlcXBlDzXq7c5f8Evn/oSIsZDt63K4HNTmMGqOTl/p1aA0e4eyX76LczY06rDP5 GMSNs+AHmYgZiS4RYhRUIvS9uLXMnnDAMYst0SDl2orDUUeHBTzu0rchyknBZMGP p5wQuWQ9CFlV+dj3UYbrBwC1lTkAMXRG2vlhA0V0TZqos7A5D4VHgSUQQjE= =otlL - -END PGP PUBLIC KEY BLOCK- -BEGIN PGP SIGNATURE- Version: APG v1.1.1 iQJcBAEBCgBGBQJUKpqPPxxlbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0 ZWQpIDxlbHJpcHBvQGVscmlwcG9pc2xhbmQubmV0PgAKCRAkQ93r2VDR68/ID/wM X9uhbgNoZ5Q04l7XDCWR8d6dF9R2deL/azDioMC2ixCJfdY++SRbvFCQ9hqHbyqS /KKz3ojo1K+BthiaGCE24GXgSaDLcv1P9Wie0iGM3rJF1CNzDTim5u7pKhCjSGma
[tor-talk] (no subject)
Hallo everybody. I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 14-07-29 04:44 PM, cav78 wrote: I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. Polipo was removed a long time ago because it is no longer needed. See: https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0 Privoxy performed the same functions so it also isnt needed. The FAQ item explaining this was removed as well, but a dangling reference to it remained behind: https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter Polipo is still mentioned in the new FAQ (even in association with Mozilla) which could lead to confusion. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 07/29/2014 02:44 PM, cav78 wrote: Hallo everybody. I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. No, it's not necessary for using the Tor browser. Firefox no longer requires it. You only need Polipo for other apps that need a web proxy, and won't work with Tor's SOCKS5 proxy. For apps without any native proxy support, you need something like torsocks. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Do you mean TBB over a VPN? On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera k...@cyblings.on.ca wrote: On 14-07-29 04:44 PM, cav78 wrote: I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. Polipo was removed a long time ago because it is no longer needed. See: https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0 Privoxy performed the same functions so it also isnt needed. The FAQ item explaining this was removed as well, but a dangling reference to it remained behind: https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter Polipo is still mentioned in the new FAQ (even in association with Mozilla) which could lead to confusion. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. No, this is not necessary. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. Not sure why they do this, but I assume it's to provide Tor to applications that are unable to use socks5. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Hallo everybody. I would like to know if it's necessary to install or configure a web proxy (privoxy or polipo) with Tor Browser Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks. Orbot (a software for Android) includes Polipo, but I don't see it in Tor Browser. Is it really important or we can do without it? Sorry for my english if it's not so perfect. Bye. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Fri, Jul 4, 2014, at 11:42 PM, ideas buenas wrote: Do a Whois lookup of the addreses I gave u before and check that all of this resolve to markmonitor. s3-us-west-2-w.amazonaws.com amazonaws.com is registered with Markmonitor, yes: The 'registrar' is MarkMonitor, Inc and the 'registrant' is Amazon.com, Inc. Nothing bad about that, Markmonitor are a big Registrar - if you don't understand what 'registrar' and 'registrant' mean, see http://en.wikipedia.org/wiki/Domain_name_system#Domain_name_registration http://edge-star-shv-04-gru1.facebook.com just when I was visiting www.lemonde.fr ? If you mean that address appears in the status bar when page http://www.lemonde.fr/ is loading, look at the bottom of that page. There is a Facebook logo. Le Monde have a Facebook account, and they are letting Facebook put tracking links in their webpages: http://en.wikipedia.org/wiki/Web_analytics So they are trying to track you, but probably only to sell you things. This is something that Torbrowser is designed to stop, as long as you clear cookies between sessions. GD -- http://www.fastmail.fm - Send your email first class -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I don think is chatbeat. How many inindetifed servers do u have? On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote: See https://chartbeat.com/faq/what-is-ping-chartbeat-net for what I think you are seeing - website analytics. On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote: Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check this,please. Nor in Whois On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote: Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote: I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite some http:// links into corresponding https:// links, just like other HTTPS Everywhere rules do.) Having HTTPS Everywhere rules that relate to a site does not necessarily mean that your browser has ever visited that site or will ever visit that site. We've tried to make this clear because many of the rules do relate to controversial or unpopular sites, or sites that somebody could
Re: [tor-talk] (no subject)
I don't have any unidentified servers - I don't know what you mean by that. Which webpage are you visiting? Have you compared what happens when visiting with Torbrowser and visiting with normal Firefox over the normal internet? On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote: I don think is chatbeat. How many inindetifed servers do u have? On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote: See https://chartbeat.com/faq/what-is-ping-chartbeat-net for what I think you are seeing - website analytics. On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote: Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check this,please. Nor in Whois On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote: Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote: I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite
Re: [tor-talk] (no subject)
Visiting the same website with Tor or normal Firefox its gave me the same Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com as an example. While ones repeat themselves in both browsers, others not. One class of unidentifies servers are the ones that not respond to a whois lookup. Other class use an address that not resolve in whois with that address and instead belongs to other On Fri, Jul 4, 2014 at 2:47 PM, Geoff Down geoffd...@fastmail.net wrote: I don't have any unidentified servers - I don't know what you mean by that. Which webpage are you visiting? Have you compared what happens when visiting with Torbrowser and visiting with normal Firefox over the normal internet? On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote: I don think is chatbeat. How many inindetifed servers do u have? On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote: See https://chartbeat.com/faq/what-is-ping-chartbeat-net for what I think you are seeing - website analytics. On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote: Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check this,please. Nor in Whois On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote: Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote: I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com
Re: [tor-talk] (no subject)
On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote: Visiting the same website with Tor or normal Firefox its gave me the same So this is nothing to do with Tor. Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com as an example. While ones repeat themselves in both browsers, others not. That's not particularly unusual - the website you are visiting is seeing accesses from different countries, and so may be serving slightly different content to suit those countries. It may also server slightly different content at different times. One class of unidentifies servers are the ones that not respond to a whois lookup. If you mean that there is no Whois entry for s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only provides data for second-level domains (in this case amazonaws.com), not subdomains of those. Also of course some Top-Level-Domains (.eu,.au for example) provided only limited information - which they are entitled to do. Other class use an address that not resolve in whois with that address and instead belongs to other I don't understand this, sorry. Can you give an example? GD -- http://www.fastmail.fm - Choose from over 50 domains or use your own -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
Do a Whois lookup of the addreses I gave u before and check that all of this resolve to markmonitor. s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com st http://edge-star-shv-04-gru1.facebook.com just when I was visiting www.lemonde.fr ? http://edge-star-shv-04-gru1.facebook.com On Fri, Jul 4, 2014 at 4:51 PM, Geoff Down geoffd...@fastmail.net wrote: On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote: Visiting the same website with Tor or normal Firefox its gave me the same So this is nothing to do with Tor. Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com as an example. While ones repeat themselves in both browsers, others not. That's not particularly unusual - the website you are visiting is seeing accesses from different countries, and so may be serving slightly different content to suit those countries. It may also server slightly different content at different times. One class of unidentifies servers are the ones that not respond to a whois lookup. If you mean that there is no Whois entry for s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only provides data for second-level domains (in this case amazonaws.com), not subdomains of those. Also of course some Top-Level-Domains (.eu,.au for example) provided only limited information - which they are entitled to do. Other class use an address that not resolve in whois with that address and instead belongs to other I don't understand this, sorry. Can you give an example? GD -- http://www.fastmail.fm - Choose from over 50 domains or use your own -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject) HTTPS Everywhere
On 14-07-02 10:59 PM, Seth David Schoen wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. typically does not?! Why is that not never? i am guessing either a) rogue or buggy HTTPS Everywhere rules b) sites that redirect SSL/TLS connections elsewhere -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite some http:// links into corresponding https:// links, just like other HTTPS Everywhere rules do.) Having HTTPS Everywhere rules that relate to a site does not necessarily mean that your browser has ever visited that site or will ever visit that site. We've tried to make this clear because many of the rules do relate to controversial or unpopular sites, or sites that somebody could disagree with or be unhappy about in some way. Each rule just tries to make your connection more secure if and when you as the end user of HTTPS Everywhere decide to visit a site that loads content from the servers in question. You can disable the markmonitor.com HTTPS Everywhere rule from within the Enable/Disable Rules menu -- but that won't stop your web browser from loading things from markmonitor.com's servers if and when you visit pages that refer to content that's hosted on those servers. It will just stop HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs. -- Seth Schoen sch...@eff.org Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to
Re: [tor-talk] (no subject)
Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote: I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite some http:// links into corresponding https:// links, just like other HTTPS Everywhere rules do.) Having HTTPS Everywhere rules that relate to a site does not necessarily mean that your browser has ever visited that site or will ever visit that site. We've tried to make this clear because many of the rules do relate to controversial or unpopular sites, or sites that somebody could disagree with or be unhappy about in some way. Each rule just tries to make your connection more secure if and when you as the end user of HTTPS Everywhere decide to visit a site that loads content from the servers in question. You can disable the markmonitor.com HTTPS Everywhere rule from within the Enable/Disable Rules menu -- but that won't stop your web browser from loading things from markmonitor.com's servers if and when you visit pages that refer to content that's hosted on those servers. It will just stop HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs. -- Seth Schoen sch...@eff.org Senior Staff Technologist https://www.eff.org/ Electronic
Re: [tor-talk] (no subject)
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check this,please. Nor in Whois On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com wrote: Another example is this s3-website-eu-west-1.amazonaws.comOR edge-star-shv-08-gru1.facebook.com OR ec2-54-225-215-244.compute-1.amazonaws.com everyone resolving to markmonitor.com On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com wrote: I'm not referring to this.I'm talking of a lot of URI that appears when I try to link to any site. Every one of those Remote Address start with a couple o letters followed by numbers like this: server-54-230-83-145.mia50.r.cloudfront.net . On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org wrote: ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite some http:// links into corresponding https:// links, just like other HTTPS Everywhere rules do.) Having HTTPS Everywhere rules that relate to a site does not necessarily mean that your browser has ever visited that site or will ever visit that site. We've tried to make this clear because many of the rules do relate to controversial or unpopular sites, or sites that somebody could disagree with or be unhappy about in some way. Each rule just tries to make your connection more secure if and when you as the end user of HTTPS Everywhere decide to visit a site that loads content from the servers in question. You can disable the markmonitor.com HTTPS Everywhere rule from within the Enable/Disable Rules menu -- but that won't stop your web browser from loading things from markmonitor.com's servers if and when you visit pages that refer to content that's hosted on those servers. It will just stop HTTPS
[tor-talk] (no subject)
Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 7/2/2014 6:56 PM, ideas buenas wrote: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? In your computer in what sense? How does it manifest itself? What are its derivatives? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
ideas buenas writes: Why is markmonitor.com and its derivates in my TBB? How can I do to delete this ? Are they watching me? Hi, Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere Enable/Disable Rules menu? https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html If so, this is one of thousands of HTTPS Everywhere rewrite rules that are included with HTTPS Everywhere, which is included with the Tor Browser Bundle. The goal of HTTPS Everywhere and its rewrite rules is to automatically access as many sites as possible with secure HTTPS connections. HTTPS Everywhere typically does not make your browser access sites or services that it would not otherwise have accessed, so it shouldn't help sites monitor your web browsing if they would otherwise not have been able to. There are definitely lots of sites that can monitor some aspects of your web browsing because the site operator has included content loaded from those sites in their web page (so your browser automatically retrieves that content when you visit the page that embedded the content). For example, there are ad networks whose ads are embedded in thousands or millions of different sites, and if you visit any of those sites without blocking those ads, the ad network operator will get some information about your visit when your browser loads the embedded content from those servers. The monitor in the name of markmonitor is not a reference to monitoring users' web browsing. Instead, it's part of the name of the company MarkMonitor, a subsidiary of Thomson Reuters, that provides certain Internet services mostly to very large companies. https://www.markmonitor.com/ Their name is supposed to suggest that they can monitor their clients' trademarks, but not specifically by spying on Internet (or Tor) users' web browsing. It seems that one of their original lines of business was letting companies know about trademark infringement on web sites, so that MarkMonitor's customers could threaten to sue those web sites' operators. They subsequently went into other more infrastructural lines of business. There was an article a few years ago criticizing the large amount of power that MarkMonitor has, but most of that power seems to have arisen mainly because it's an infrastructure provider that some very popular sites decided to sign up with for various purposes (primarily to register Internet domain names, because MarkMonitor's domain name registration services make it extremely difficult for somebody else to take over control of a domain name illicitly). The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS Everywhere rules, and its goal is solely to make sure that if you're visiting a web page hosted at (or loading content from) markmonitor.com itself, that your browser's connection to markmonitor.com's servers will be a secure HTTPS connection instead of an insecure HTTP connection. It is not trying to give any additional information to those servers or to cause your browser to connect to those servers when it would not otherwise have done so. (You can see the rule itself in the atlas link toward the beginning of my message, and see that its effect is to rewrite some http:// links into corresponding https:// links, just like other HTTPS Everywhere rules do.) Having HTTPS Everywhere rules that relate to a site does not necessarily mean that your browser has ever visited that site or will ever visit that site. We've tried to make this clear because many of the rules do relate to controversial or unpopular sites, or sites that somebody could disagree with or be unhappy about in some way. Each rule just tries to make your connection more secure if and when you as the end user of HTTPS Everywhere decide to visit a site that loads content from the servers in question. You can disable the markmonitor.com HTTPS Everywhere rule from within the Enable/Disable Rules menu -- but that won't stop your web browser from loading things from markmonitor.com's servers if and when you visit pages that refer to content that's hosted on those servers. It will just stop HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs. -- Seth Schoen sch...@eff.org Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 3/20/2014 12:47 PM, Patrick Schleizer wrote: Joe Btfsplk: 1) I doubt you'll be able to run 1 instance of TBB - at once - if that's part of what you want. Others can correct me, if wrong. This is possible. Simpler since TBB 3.x. Although undocumented. Bits can be found here: - https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers - https://www.whonix.org/wiki/Advanced_Security_Guide#More_than_one_Tor_Browser_in_Whonix Yes, I discovered 2 (or more?) instances of Fx can be run. Even for the same Fx .exe file / version, I can start one; either clicking a shortcut or thru profile manager. It allows me to start a 2nd instance, where I've mostly used profile manager. The -no-remote command can also be used from Run (Windows) or command line / prompt. This article explains different scenarios pretty well. http://kb.mozillazine.org/Opening_a_new_instance_of_Firefox_with_another_profile NOTE: under all scenarios, a different profile must be used for the 2nd, 3rd Firefox instance. Or, you'll get a Profile is already in use error. In this case, the warning is valid - as the same profile is trying to be used by 2 instances. That wouldn't work, as possible changes from each instance might try to make conflicting changes for the same prefs in same profile. Thus, the warning. That same error message in stand alone Profile Mgr (*when the selected profile is NOT already in use*) is a bug. But if a selected profile WAS already in use, you wouldn't want to use it in another Fx instance. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
If you want to buy a few pc's for me Op 18 mrt. 2014 om 03:56 heeft krishna e bera k...@cyblings.on.ca het volgende geschreven: On 14-03-17 12:27 PM, muhammed gokce wrote: No, I don't want to run 1 instance of TBB. I wan't to run a few instances of TBB, but all with an other IP-adress. Like you can make profiles in firefox. So you can log in with different accounts at a site. But all the accounts must own an own IP. Some options: 1) get more than 1 pc 2) modify the source code to do what you need, or offer money to Tor Project to develop what you need 3) run a TBB in separate virtual machines on a single pc 4) have a single TBB with separate tabs or windows open, and each window connects to a separate 3rd party vpn or proxy (to get a different ip address), and then to the destination. 5) if you dont care about relatively good anonymity, run multiple Tor client instances each listening on a distinct SOCKS port and connect a regular Firefox (with separate profile) to each one. You can also ask on IRC for detailed help with any of the above. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 14-03-17 12:27 PM, muhammed gokce wrote: No, I don't want to run 1 instance of TBB. I wan't to run a few instances of TBB, but all with an other IP-adress. Like you can make profiles in firefox. So you can log in with different accounts at a site. But all the accounts must own an own IP. Some options: 1) get more than 1 pc 2) modify the source code to do what you need, or offer money to Tor Project to develop what you need 3) run a TBB in separate virtual machines on a single pc 4) have a single TBB with separate tabs or windows open, and each window connects to a separate 3rd party vpn or proxy (to get a different ip address), and then to the destination. 5) if you dont care about relatively good anonymity, run multiple Tor client instances each listening on a distinct SOCKS port and connect a regular Firefox (with separate profile) to each one. You can also ask on IRC for detailed help with any of the above. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
I've downloaded the profile manager, selected the TBB firefox.exe, he opened the TBB, but! But, he said The proxy server is refusing connections.. And it's like firefox, without the button to choose new identity. So this is not working, I wan't different profiles, so I can open different TBB's with each a own IP-adress.. Op 14 mrt. 2014 om 23:57 heeft muhammed gokce muhammed_go...@hotmail.com het volgende geschreven: And how do I create in torbrowser different profiles, I still don't understand it.. Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het volgende geschreven: It probably won't allow 2 instances of Firefox (TBB) running at once. You may be able to use the stand alone profile mgr for Firefox https://developer.mozilla.org/en-US/docs/Profile_Manager You'd have to add an entry in the profile mgr, to the location of TBB (firefox.exe). So you can specify which Fx version to use w/ which profile. Also have to create a new profile for TBB (in a location you choose), then launch TBB using that profile do any modifications. To use different TBB profiles, you'd have to launch the profile mgr each time (not a big deal). Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 3rd profile - perhaps? in same general location, but different folder. Then you'd have to use one of the profile mgrs to select the profile to start each time. Unless, most times you only use one - then it can be the default profile only when needing a non-default profile would you need to start profile mgr to select that profile. On any of these, it's a possibility you may have to manually edit profiles.ini (in Windows path: Tor Browser\Data\Browser\profiles.ini.) On 3/14/2014 10:30 AM, muhammed gokce wrote: Thanks, but copy the browser and trying to open it twice doesn't work. I wan't different tor browsers(profiles). Like you kan make it in firefox. Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het volgende geschreven: Unless you hope for a TOR dev to anwser you should just go ahead and try it out as its not documented. It is probably either 16 or 32 bits which would be around either 32.000 and about 2 milion. In any case TOR should warn you if you have an invalid value set in your config. I believe (I dont know for sure) that there is already a specific profile defined for your TOR session hence it wouldnt be wise to create a different one. Why dont you just copy the TOR browser folder and swap out the config values you need in one copy. Am 14.03.14 15:20, schrieb muhammed gokce: Hi, thanks for the help! I've got a few questions more, what is; does the TrackHostExistExpire a limit for the max. seconds, or can I put just 999 behind it ? And how can I make diffirent profiles in tor browser like firefox, in windows 7? Thanking you! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
1) I doubt you'll be able to run 1 instance of TBB - at once - if that's part of what you want. Others can correct me, if wrong. WARNING: Be careful about what you modify in a TBB profile. You could compromise your anonymity. Making changes in about:config, etc., w/o *really knowing* how they might affect TBB's ability to preserve anonymity, could be risky. If you tell us your main objectives are for multiple TBB profiles, maybe someone can make suggestions. Possibly, don't do it. It depends. Same for installing plugins, extensions. They may not observe instructions to use only the Tor network / port. Or may affect anonymity in other ways. Generally, the fewer modifications to TBB preferences / default options the fewer extensions installed, the better. 2) proxy server is refusing connections probably has nothing to do w/ (any) profile manager. It doesn't choose how to connect - it only opens a profile you select (either from existing ones, or new one(s) you create), and uses the file path you specify, to which ever version of Fx you want to use. It's possible that using profile mgr to start TBB, it bypassing the start Tor Browser.exe (or other files) is causing some problem in connecting. That might be fixable, but I don't have time to play w/ it. 3) If you just want multiple TBB profiles, you could install TBB to a few different folders, then customize each one. Start each TBB installation (w/ its own profile) by creating shortcuts for Start Tor Browser.exe, from each installation folder. Again, some TBB modifications (say, to the UI) can make your copy of TBB look different than TBB with default settings, to sites that query, log compare browser characteristics. For purposes of developing a browser fingerprint so you can be identified later on the same site, or at other sites run by the same people, or that are monitored by tracking companies / profile builders. On 3/16/2014 5:35 AM, muhammed gokce wrote: I've downloaded the profile manager, selected the TBB firefox.exe, he opened the TBB, but! But, he said The proxy server is refusing connections.. And it's like firefox, without the button to choose new identity. So this is not working, I wan't different profiles, so I can open different TBB's with each a own IP-adress.. Op 14 mrt. 2014 om 23:57 heeft muhammed gokce muhammed_go...@hotmail.com het volgende geschreven: And how do I create in torbrowser different profiles, I still don't understand it.. Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het volgende geschreven: It probably won't allow 2 instances of Firefox (TBB) running at once. You may be able to use the stand alone profile mgr for Firefox https://developer.mozilla.org/en-US/docs/Profile_Manager You'd have to add an entry in the profile mgr, to the location of TBB (firefox.exe). So you can specify which Fx version to use w/ which profile. Also have to create a new profile for TBB (in a location you choose), then launch TBB using that profile do any modifications. To use different TBB profiles, you'd have to launch the profile mgr each time (not a big deal). Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 3rd profile - perhaps? in same general location, but different folder. Then you'd have to use one of the profile mgrs to select the profile to start each time. Unless, most times you only use one - then it can be the default profile only when needing a non-default profile would you need to start profile mgr to select that profile. On any of these, it's a possibility you may have to manually edit profiles.ini (in Windows path: Tor Browser\Data\Browser\profiles.ini.) On 3/14/2014 10:30 AM, muhammed gokce wrote: Thanks, but copy the browser and trying to open it twice doesn't work. I wan't different tor browsers(profiles). Like you kan make it in firefox. Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het volgende geschreven: Unless you hope for a TOR dev to anwser you should just go ahead and try it out as its not documented. It is probably either 16 or 32 bits which would be around either 32.000 and about 2 milion. In any case TOR should warn you if you have an invalid value set in your config. I believe (I dont know for sure) that there is already a specific profile defined for your TOR session hence it wouldnt be wise to create a different one. Why dont you just copy the TOR browser folder and swap out the config values you need in one copy. Am 14.03.14 15:20, schrieb muhammed gokce: Hi, thanks for the help! I've got a few questions more, what is; does the TrackHostExistExpire a limit for the max. seconds, or can I put just 999 behind it ? And how can I make diffirent profiles in tor browser like firefox, in windows 7? Thanking you! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to
Re: [tor-talk] (no subject)
Unless you hope for a TOR dev to anwser you should just go ahead and try it out as its not documented. It is probably either 16 or 32 bits which would be around either 32.000 and about 2 milion. In any case TOR should warn you if you have an invalid value set in your config. I believe (I dont know for sure) that there is already a specific profile defined for your TOR session hence it wouldnt be wise to create a different one. Why dont you just copy the TOR browser folder and swap out the config values you need in one copy. Am 14.03.14 15:20, schrieb muhammed gokce: Hi, thanks for the help! I've got a few questions more, what is; does the TrackHostExistExpire a limit for the max. seconds, or can I put just 999 behind it ? And how can I make diffirent profiles in tor browser like firefox, in windows 7? Thanking you! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
It probably won't allow 2 instances of Firefox (TBB) running at once. You may be able to use the stand alone profile mgr for Firefox https://developer.mozilla.org/en-US/docs/Profile_Manager You'd have to add an entry in the profile mgr, to the location of TBB (firefox.exe). So you can specify which Fx version to use w/ which profile. Also have to create a new profile for TBB (in a location you choose), then launch TBB using that profile do any modifications. To use different TBB profiles, you'd have to launch the profile mgr each time (not a big deal). Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 3rd profile - perhaps? in same general location, but different folder. Then you'd have to use one of the profile mgrs to select the profile to start each time. Unless, most times you only use one - then it can be the default profile only when needing a non-default profile would you need to start profile mgr to select that profile. On any of these, it's a possibility you may have to manually edit profiles.ini (in Windows path: Tor Browser\Data\Browser\profiles.ini.) On 3/14/2014 10:30 AM, muhammed gokce wrote: Thanks, but copy the browser and trying to open it twice doesn't work. I wan't different tor browsers(profiles). Like you kan make it in firefox. Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het volgende geschreven: Unless you hope for a TOR dev to anwser you should just go ahead and try it out as its not documented. It is probably either 16 or 32 bits which would be around either 32.000 and about 2 milion. In any case TOR should warn you if you have an invalid value set in your config. I believe (I dont know for sure) that there is already a specific profile defined for your TOR session hence it wouldnt be wise to create a different one. Why dont you just copy the TOR browser folder and swap out the config values you need in one copy. Am 14.03.14 15:20, schrieb muhammed gokce: Hi, thanks for the help! I've got a few questions more, what is; does the TrackHostExistExpire a limit for the max. seconds, or can I put just 999 behind it ? And how can I make diffirent profiles in tor browser like firefox, in windows 7? Thanking you! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
And how do I create in torbrowser different profiles, I still don't understand it.. Op 14 mrt. 2014 om 18:11 heeft Joe Btfsplk joebtfs...@gmx.com het volgende geschreven: It probably won't allow 2 instances of Firefox (TBB) running at once. You may be able to use the stand alone profile mgr for Firefox https://developer.mozilla.org/en-US/docs/Profile_Manager You'd have to add an entry in the profile mgr, to the location of TBB (firefox.exe). So you can specify which Fx version to use w/ which profile. Also have to create a new profile for TBB (in a location you choose), then launch TBB using that profile do any modifications. To use different TBB profiles, you'd have to launch the profile mgr each time (not a big deal). Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 3rd profile - perhaps? in same general location, but different folder. Then you'd have to use one of the profile mgrs to select the profile to start each time. Unless, most times you only use one - then it can be the default profile only when needing a non-default profile would you need to start profile mgr to select that profile. On any of these, it's a possibility you may have to manually edit profiles.ini (in Windows path: Tor Browser\Data\Browser\profiles.ini.) On 3/14/2014 10:30 AM, muhammed gokce wrote: Thanks, but copy the browser and trying to open it twice doesn't work. I wan't different tor browsers(profiles). Like you kan make it in firefox. Op 14 mrt. 2014 om 16:26 heeft Rick Ross rickr...@privatdemail.net het volgende geschreven: Unless you hope for a TOR dev to anwser you should just go ahead and try it out as its not documented. It is probably either 16 or 32 bits which would be around either 32.000 and about 2 milion. In any case TOR should warn you if you have an invalid value set in your config. I believe (I dont know for sure) that there is already a specific profile defined for your TOR session hence it wouldnt be wise to create a different one. Why dont you just copy the TOR browser folder and swap out the config values you need in one copy. Am 14.03.14 15:20, schrieb muhammed gokce: Hi, thanks for the help! I've got a few questions more, what is; does the TrackHostExistExpire a limit for the max. seconds, or can I put just 999 behind it ? And how can I make diffirent profiles in tor browser like firefox, in windows 7? Thanking you! -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 3/14/2014 4:57 PM, muhammed gokce wrote: And how do I create in torbrowser different profiles, I still don't understand it.. Please go to the MDN (mozilla) link I gave. Like anything, there's some reading on how to use the profile manager, but it's child's play compared to using a browser. They have online help section to use the utility (which doesn't need installing.) There's also an article in Mozillazine knowledge base on creating profiles. If one can't read master the steps needed to do this, maybe they might shouldn't be creating multiple profiles, esp. to use in TBB. Just sayin'. You use the menu options in the profile manager to create new profiles. About a 10 sec. operation, once you know basic menu options. In the same way the native Fx profile manager does. The native manager would also work, it's just that the stand alone manager from MDN has more features, flexibility. It's not difficult (unless one refuses to read simple instructions). One thing: The MDN profile manager (or Firefox) has a known bug - which doesn't really bother anything. When the manager is used to open a profile that's previously been *opened* (but is now closed), it will show a message that the profile you selected appears to be in use starting Fx with it could damage stuff. Unless Firefox IS running, with the profile SELECTED, the profiles aren't open starting them doesn't damage anything. The only time that might be the case, is if you actually had a running instance of Fx / TBB; in which case you'd see it running in Task Manager or equivalent running processes monitor in other OSes. As long as [the profile you've selected] isn't started / running, the warnings about it in Profile Manager can be ignored. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Cc Bcc: Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences with pseudonymous project development Reply-To: In-Reply-To: 52da7d13.4010...@riseup.net X-PhaseofMoon: The Moon is Waning Gibbous (95% of Full) On Sat, Jan 18, 2014 at 01:09:39PM +, adrela...@riseup.net wrote 2.0K bytes in 0 lines about: : speak at conferences, to attend key singing parties, to meet up with I know this is a typo, but a key singing party sounds far better than the pgp parties I've attended so far. :) -- Andrew http://tpo.is/contact pgp 0x6B4D6475 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
and...@torproject.is: Cc Bcc: Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences with pseudonymous project development Reply-To: In-Reply-To: 52da7d13.4010...@riseup.net X-PhaseofMoon: The Moon is Waning Gibbous (95% of Full) On Sat, Jan 18, 2014 at 01:09:39PM +, adrela...@riseup.net wrote 2.0K bytes in 0 lines about: : speak at conferences, to attend key singing parties, to meet up with I know this is a typo, but a key singing party sounds far better than the pgp parties I've attended so far. :) Indeed. The task is to sign your public key. Preparation for next superstar. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hy there. Maybe the developers from orbot might find the first android based snoop-proof cellphone [1] interesting. [1] http://news.discovery.com/tech/gear-and-gadgets/the-worlds-first-snoop-proof-phone-140116.htm?utm_source=DNFButm_medium=DNewsutm_campaign=DNewsSocial - -- We don't bubble you, we don't spoof you ;) Keep your data encrypted! Log you soon, your Admin elri...@elrippoisland.net Encrypted messages are welcome. 0x84DF1F7E6AE03644 - -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1.4.11 (GNU/Linux) mQINBFH797MBEAC0Y0NeI7lmDR9szTEcWuHuRe0r/WjSRC0Nr5nXsghuMcxpJ3Dd BOBimi4hdMMK4iqPVMwNw6GpKYR3A9LHHjbYRXHUKrJmB+BaJVyzJXN5H6XvxTTb UfX+DaXAGJW/G+3cBB3qm/QaU8QGkBKfXq0DLTaTGPkGKxEAldj/8onGZhawdJs+ B92JrW+S2HDh15pIuXzSqe7eCcIOdvvwfWe0fJi2AraA7LYGpxP6GcC/b9JJpbq5 Y6DfE2Aun9ZK3iHqURyrms0Whbv1CgmUahL2MVYCsTsXwe0GwlAxxKvjXAiXuo+R 9wO5wsXvVVSVNqsk9Yqi+wYzdPKndTU0GyxSApQHroF+cxaZ8Lk0xloj18+LdCSs e5IiTSXH0MMsDdWWdHlrgk+bgDG+0Gu3ne4vMwGdKO7AhYgQW/ueMy4RnkG/nsV9 jry5BO4gGAI1Ij8KvqUzEnvJFGE3ptJogU+zazWWDUWmL3ecKb3aDRlJFnZ3kJ5h q8GolZVjpk99V+4B5WVRPXdej/p5J19tXycK/jdNmr4oC8NyUhIpe8xHELnfoB4z +rxiTx+KMnW0rY8EQg8O2ixEYt5my90IwQkxcxIxextVrqjJjYn8extc2/v8yGzI KmTEJxdADB5v/Jx4HiLHNDSfBUb8gfONCkNSTYvTcSwTjWzHOkXeE/9ZbQARAQAB tD5lbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0ZWQpIDxlbHJpcHBvQGVs cmlwcG9pc2xhbmQubmV0PokCOAQTAQIAIgUCUfv3swIbLwYLCQgHAwIGFQgCCQoL BBYCAwECHgECF4AACgkQhN8ffmrgNkT8+BAAoAXBqu4/O2Cs5FSWWZpzgScNEgq7 uHhOKeYmRfgKlOUPoYlPB1DBqdOAXSKb9OvsmyOvpoGnqijB7aAJBoyQYW/OCQgd U8L4eTCf4yRZnfFLdgskcPfN1p0Rs/yinGEooBJFtYa7mT6J0UTW2JjCLZK2AFCW oF+KBu5JICXGBXigb2ZbX1jWjxP5H1RidQw6HF5z4z34SjLWAOOeZ8B/Xfz6Fs0s IAuLu2O4HE4DI8Qu196LhSVHHgr3uMTkvN1t5nKwyjrRQztwXXk9qIomII3ydNYb BYAGdWNNMfLb1kmDwC5wQHAFvSP1aiMF3aKAY+gl2wXSGO6JqM0SteJS3dytIljI kzu0atc9HuGs/HDQgdmpAS4WU2YefEr/WieltSiAKlwuC+3wg+CONJ6TE1vgNDU/ axerttb0jq7UQb/nAp05bsrB7XH1Vs+1ON9lUPEfWRmwQcrVK5JUrUWa/4tA/UeM XvFcPFtFluGTlLewgJIqcvjPXFwpbDZprXJsMkwew/A6B6n3+0sbgf7p3QSGkVbi dwQAymTbHdYqLnbcnKZhjto3Wjw1J5QB2wuiRYlpjV3i7AWTGlqoSTOWCCV+HamQ qeFYNYAWNFx3+J/oi7xDi8t9bHVNA205equ+y2sj3G5uGJ6LSHQ8AXp9uOipUUvU 1MJN0yLXr9PIwvi5Ag0EUfv3swEQAL0+MnxHGrTjSYdfdua4SBpmytDONM1EngeY s+WyaC/760MughKbaysI/nK2LB1vnwEY7f3NM4fxBx8u2T7VBm6Ez6Fs23Bb8Rkz f97bPSdxCmg64GPHfLA9uwTIXcYS+MpI86WOf6eWY0rRpf7Y9Nl7YoUNvzOyUPqc ggdcnHce8zYv7A/WS8flZDm8tVFPsHrQDEwNMws7ZhiNnHkeZeRJrvCuB7oEVich O/ROYoA5o6NozWYQbjxe1f6Yur4Q10qgVcxVnyLFJSbg6vZSzL7KYh3Z5iBOzPHt 7cwEDrW8W4Kl2Qj8rhJ4Wxs94CAtua7IXK44sVZWQbyHcOXRikgGMZKkEZzVCQa5 KD1u1ZrcBCyuMAir0hsmS3jhCUwpiE2c3SRk8O8CgixhTcBk0X/k9ZFu3Hbi1JMB FLzs/Nq3tYAYvVivhPloSxmYBPsafYHCZM83yBNNsralXh5zjB+di90G+AMXt2PN LTcdovZuWtC0s8/jrx+zv/AA4FAGYU9OVl+YL9ybFX8gSdMEcixyzQcKfiFBjpWv 5iFrwIuDlaXMcheyrhc9aGOxfx44OXc505+VjO/1Q/8EOWlJ6UwOi6GMkj5T+RFJ MDyP0UixS7dt6wTuD5t6PRuyWWxZswgrbL9hjwGFr154Z19TWeNWc23pWtUvQJos UCxl2nFHABEBAAGJBD4EGAECAAkFAlH797MCGy4CKQkQhN8ffmrgNkTBXSAEGQEC AAYFAlH797MACgkQJEPd69lQ0evA+Q/+M7lSFlrQWiRsFqDjh+kTJc+0OEBCvnfo N2KPyXXbfc//qup55PfEygE6C60zvrlv3WE33GZ5GS5MLuDMP82b+a5Yt16NQU7L WtAg1g0S0BvazW+28TgnfO8bhbGaFeE9ccw3xLmlbwZQ3f3LtMKdwFIROiG6hvAs 9U54QYti3tv9DowRYYWpdr0Ga8RqeGNtCKc0v2opy51MpzKWjwUW0i3XlSlyY8Lj 1KT8PyznNPw32nYpmDizz+0OUJNnn/kT+GnFoR3DJnFosTOrnxFJp+N+nejMp/gW r9NM0/E7H+P53IiytBOt5/0vsOaCFGdYGhKEjmJi3dHS4Xk1ObD1mjdD1YDOlWWU 3Md6BDHd4W7Q8gT7oQfTIMLd3HzV+WNPIdocPLBaeA/tRD8Pg5CCmncAmSub4F5T An7FlnACtSOv3cIWQ0TymS42DihDaJ5d1RvNzKw+zHYdPvf471JFZR3TDhkPbLIr 9czR7kbpnXRwchgwXQn306NVWf37TgA8wpbnFTazZ38iOeqcb9oKprqnbgEdr3PN OhKSlMTkzAqf3MEi2Fyua4BADMhS3oBwCRgDTlt6wquEytpNSlZaHnyiyIgOpekF Uy5K3w8NhHqeifRPrNb/UcCbXtXz+puqIEZHMenpv6FRlTTKpdoHoVXSkp1TPMGN /VaCiLbP4Z3xEw/9EbAJJkhmmx1Qw3ueoqc4h1MmhUtIdxSZ/oA9SjwlnY++zvaZ 6w1wTS4P+OUkETNDtItdpxXMJ9qfSy9voAQc2K43WMZCCmpPJYSdqaZZNPFj+Ne8 6FNtNKuUkXREybpHwlVAXnHzInmFOOM9RAmF70r3zEmKt77W1ztBLo2o9X79gPgL u9ThgrH6Oc2k46n+9nc3joccr7miiX/bp976DNWcWdOYThiSSOCb8Zw9/Zs935i1 wUVkYTj24tmBH4H5ov9ib7RPmU21ru458RbUKG0ONAqBtAHNyXHzUnXsrke+D4VW MI06YcXSk8YeYgQ8GxgHQc+W2bb8LIbKN1hEYJ0wzM62vKR2/Oiwuf8lXutIKTuz +v7Vj1PQd66DGHsxtWRaWnr1c54JTL2wICHJYKFH4grp7864+GL/uQ1O/Z/XxVku E1JQ/AnwBGU1M1S6otwWGWVRjzEzQtxsfcCEPvV/9td3FIFQAbGTPb+48XFU+TY9 8AlcXBlDzXq7c5f8Evn/oSIsZDt63K4HNTmMGqOTl/p1aA0e4eyX76LczY06rDP5 GMSNs+AHmYgZiS4RYhRUIvS9uLXMnnDAMYst0SDl2orDUUeHBTzu0rchyknBZMGP p5wQuWQ9CFlV+dj3UYbrBwC1lTkAMXRG2vlhA0V0TZqos7A5D4VHgSUQQjE= =otlL - -END PGP PUBLIC KEY BLOCK- -BEGIN PGP SIGNATURE- Version: APG v1.0.9 iQJcBAEBCABGBQJS2aVyPxxlbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0 ZWQpIDxlbHJpcHBvQGVscmlwcG9pc2xhbmQubmV0PgAKCRAkQ93r2VDR66yhD/98 kYDIAM4jhNvX+FQxBNusDWwJzDVNqNl+eugwtXTAN1Jirl420Jn19qwOc2DhrCGu /t9u05dIH37w5VzRh39vjcxpZgVq4f/6sXt7VPcYygr5RdG+2CPlYqxwWs/59v2W AlQzOIOOU31OizkYkWHT0oqXOy6+LB33CFT+vgraXuDDw7Iyy/en2QjYg7po9lT8 k9SIvF1glK0jh4I/aGmVe19BaGjhxIgwH+xMIcrJgJhImjgvyOOzvQ+x5gcwRN7n 8OJVzm2sgaxPnmzH6Qff4Xk3jJrelDhNNu7Hp4ryA1s4JBMV+XIUq4Vt0TGCYPtL PTmRE8tfQeXcFkF9Q+zj1i5CwTPD53UmgSOqE6Kv8dh4lCe3hCGlRkyVZ0xNgij9
[tor-talk] (no subject)
HI ; i am a student in networking and security system, i working in a project to make a global private navigation to web by create a distribution based in Ubuntu . the project will include more interesting tools to make a secure connection with servers like a private cloud computing ,also a secure navigator 'TOR' , reprogramming the kernel by adding a backdoor to diminutive the espionage risks PRISM .I have a big idea to make our navigator in a high level of security so i hope to join the team. By the way I receive some propositions to continue my project in university Laval Canada , university tel-aviv in Israel ... but i believe that the tor project have all the potentials to make a secure navigation .So i ll be waiting a favorite answer to join your team , thank you . -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On 12/09/2013 22:22, Nishaanth_Kumar wrote: I am Nishaanth,Undergrad in India. I would love to contribute to Tor. But I am stuck with questions like where to start and what should I know. I can code comfortably with C,C++,HTML and know certain stuff about Python. It would be really helpful if you can me out. A good way to contribute to any open source project is to review the list of open bug reports, find one that you think really matters and you feel comfortable you can correct, and work on it. Yuri -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
Hi, I am Nishaanth,Undergrad in India. I would love to contribute to Tor. But I am stuck with questions like where to start and what should I know. I can code comfortably with C,C++,HTML and know certain stuff about Python. It would be really helpful if you can me out. :) -- *Nishaanth Sekeran.* -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] (no subject)
looking for small amount of good grade snow to buy. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk