Hey!
I don't know what's happened, and when it has started...
on my Freedombox on RPi v1, _Tor doesn't start automatically at boot_ :'(
Web GUI Plinth looks like bugged when I try to activate/deactivate
service...
(service stay ticked...)
From ssh, root account, this command is ok, Tor will run
On 03/21/2016 12:17 PM, Ben Cook wrote:
> I recently set up a fresh installation of Freedombox. I've updated
> everything, so it should be running all the latest versions everything.
> The only Plinth module I've tried installing so far is Tor. For some
> reason, it is not configured correctly.
I recently set up a fresh installation of Freedombox. I've updated
everything, so it should be running all the latest versions everything.
The only Plinth module I've tried installing so far is Tor. For some
reason, it is not configured correctly. According to the wiki[0], it
should be set up
Ah, Sunil, thank you very much for the quick response!
And yes, after installing obfs4proxy, everything started working as
expected.
I installed the package using apt, that worked fine too. :)
On 05/01/16 05:03, Sunil Mohan Adapa wrote:
> On 01/05/2016 03:04 AM, Dieter wrote:
>> Hello!
>>
>>
Hello!
Some time ago, when freedombox-setup was updated in the sid-repo from
0.6 to 0.7, i "lost" my Tor-installation.
With that i mean that plinth does not show tor to be installed anymore,
although it is installed and running.
How does Plinth check for installed packages?
Also, i'm not using
On 01/05/2016 03:04 AM, Dieter wrote:
> Hello!
>
> Some time ago, when freedombox-setup was updated in the sid-repo from
> 0.6 to 0.7, i "lost" my Tor-installation.
>
> With that i mean that plinth does not show tor to be installed anymore,
> although it is installed and running.
>
> How does
Hi,
James Valleroy wrote (18 Mar 2014 03:01:05 GMT) :
and are there any changes that you would recommend?
I recommend additionally running obfsproxy (Cc'ing the Debian
maintainer), to help more Tor users in more countries. This requires
opening 1..3 more ports, depending on the exact pluggable
Hi all,
Here is our current Tor configuration through freedombox-setup [1]:
#!/bin/sh
apt-get install -y tor
cat /etc/tor/torrc EOF
ORPort 4431
BridgeRelay 1
Exitpolicy reject *:*
EOF
It is set to run Tor as a bridge relay (non-exit, and not listed in
the main Tor directory). It is based on
On Tue, 2013-10-08 at 11:04 +0200, Petter Reinholdtsen wrote:
So to me, it seem like routing all traffic through Tor bring the
advantage of making it harder to track your location while changing
the set of people that can perform MITM attack on you. It is not like
using Tor for everything is
[Tim Retout]
I still believe it's not a good idea to be routing unencrypted
traffic through Tor, and you need to be checking the certificates
for the encrypted traffic. Browser plugins are risky too.
I guess it depend on what the goal is. As far as I can tell, the man
in the middle attack is
Hi all,
I have been thinking about Tor some more, especially in light of
Friday's story:
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
My impression is that Tor itself comes out reasonably well from what we
know, but governments will try to exploit any
- Forwarded message from Richard Budd rotorb...@gmail.com -
Date: Sat, 1 Jun 2013 15:43:19 -0400
From: Richard Budd rotorb...@gmail.com
To: tor-rel...@lists.torproject.org
Subject: [tor-relays] Running Obfsproxy on a Raspberry Pi
Reply-To: tor-rel...@lists.torproject.org
Don't know how
- Forwarded message from tors...@ftml.net -
Date: Sat, 01 Jun 2013 13:56:02 -0700
From: tors...@ftml.net
To: tor-rel...@lists.torproject.org
Subject: Re: [tor-relays] Running Obfsproxy on a Raspberry Pi
X-Mailer: MessagingEngine.com Webmail Interface - ajax-5ebcfc6a
Reply-To:
6) Tor introduces a *different* set of privacy/security risks from
traditional ISPs. This relates to 1), in that if you use the Tor network
incorrectly (transmit unencrypted data over it) then that data is
completely
vulnerable to snooping by the exit-node operators. This is a serious
issue,
On 11-05-08 at 08:15am, Lee Fisher wrote:
If Tor is used on a FB as an Exit Node, that'll increase legal risk
for that box for confiscation, when a 'terrorist'/criminal uses that
node for clear-text communication.
Isn't one Eben's main FB premises that data on your home-based
FreedomBox
I imagine that some of my friends will not want to do blogging, but
might help chinese people get onto the lovely western Internet eg. by
running a Tor exit node.
For users in countries that need censorship circumvention, I'd hope that
FB's UI would also offer Bridge exits, in addition to
On 18:16 Sun 08 May , Jonas Smedegaard wrote:
...
I imagine a box offering these - as yes/no or as gradual sliders:
* Selfish -- [ ] modest [ ] medium [ ] mostly
[ ] store own secrets
[ ] ask friends to keep backups of my secrets
[ ] fetch torrents
[ ] connect to
Hi,
I was wondering if we shouldn't use the infrastructure of the Tor
onion sites. The Tor network provides a .onion TLD that is managed in
a decentralized way. Anyone can create a .onion domain that is
accessible everywhere.
The only thing is that I think Tor has some master servers for
I certainly think it is important for the freedombox to support TOR. In
particular, a freedombox should be able to act as a TOR relay or
potentially even a TOR exit node.
However, I think even if you talk to the TOR project they'll agree that
you should not use TOR by default, nor enable being a
On Sat, May 7, 2011 at 9:43 PM, Mildred Ki'Lya mildred...@gmail.com wrote:
I was wondering if we shouldn't use the infrastructure of the Tor
onion sites.
I don't think it's feasible to use it for everything, for the reasons
other people have mentioned. But on my FreedomBox I run a Tor node
20 matches
Mail list logo