On Sat, Sep 15, 2007 at 08:49:17AM +0200, Stephen wrote:
In some instances maybe so, in other instances not so hard to know:
http://cryptome.org/nsa-ip-update8.htm
Anyone knows what the false positives rate in the list is?
I've long considered putting the address ranges in the firewall
deny
On Wed, 2007-09-12 at 10:31 +0200, TOR-Admin (gpfTOR1) wrote:
supporting spammers
when setting up my node for 465,993,995?
The SSL-encrypted SMTP-ports are using SMTP-Auth (mostly). The
support of spammer is very low (in my opinion).
By the way, I have the same problems like you since
Just one contra:
Supporting $some_crime always means that you knew about that certain
case they're suing you about. Since you can only know about something
if you start sniffing - which is strictly forbidden - you can't
possibly know about a direct certain crime.
Unless you were it yourself,
coderman wrote on 14.09.2007 06:39:
On 9/13/07, scar [EMAIL PROTECTED] wrote:
...
so, if we are using a website that uses HTTPS, but, in firefox, for
example, in the cookies list under that website it shows Send
for: any type of connection, then the session is vulnerable?
vulnerable
On Sat, Sep 15, 2007 at 08:27:36AM +0800, Li-Hui Zhou wrote:
There's a lot of errors when linking
Thanks! Fixed in r11445.
yrs,
--
Nick Mathewson
pgpNnVearY4dj.pgp
Description: PGP signature
This was in my message log today and I did not specify
a server or an exit node (if that is what using exit
refers to). Hell, I just re-installed this Windows XP
SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
Vidalia v0.0.14). I haven't even opened the torrc or
torrc.orig.1 before I
Fyi, what you are asking for is exactly what we are working towards with
http://pickaproxy.com - allowing you to pick or exclude exit nodes by
Country - where Tor is setup on our server as a client to your workstation.
We are calling this geospoofing.
. . .
Wesley
-Original Message-
On Saturday 15 September 2007 20:20:32 jeffery statin wrote:
This was in my message log today and I did not specify
a server or an exit node (if that is what using exit
refers to). Hell, I just re-installed this Windows XP
SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
Vidalia
On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
Alex, perhaps you or somebody could put up a web page, in German, that
explains in simple terms what Tor is about, aimed at explaining to the
average German police officer
On Sat, 15 Sep 2007 17:47:11 -0400 misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
www.pickaproxy.com
So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In other words users do not
On Sun, 16 Sep 2007 00:32:27 +0200 Alexander W. Janssen
[EMAIL PROTECTED] wrote:
On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
Alex, perhaps you or somebody could put up a web page, in German, that
explains in simple
Now that I can break my silence it's time for some action.
A question to all Tor-operators:
I'd like to do a survey about all incidents which happened to
operators. Stuff like:
* arrested
* confiscated equippment
* nastygram
* surveillance
* ...
What would be possible other questions/point in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Scott Bennett wrote:
On Sun, 16 Sep 2007 00:32:27 +0200 Alexander W. Janssen
[EMAIL PROTECTED] wrote:
On 9/16/07, Juliusz Chroboczek [EMAIL PROTECTED] wrote:
http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
Alex, perhaps you
On 9/16/07, Ryan Wagner [EMAIL PROTECTED] wrote:
There's still the possibility that a server op is using their Tor node
as a scapegoat and really is doing bad things (I don't mean to imply
that's the case here). Even if the police know that their suspect is
running a Tor node, what Tor is, and
Is there any way that people can donate to help cover your legal fees?
I'll commit to one US dollar. If half the people who read this message
did that, it would at least take a small chunk out of that mountain of
legal fees you're facing. Also, have you talked to the CCC (ccc.de)
about this? They
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
Is there any way that people can donate to help cover your legal fees?
I'll commit to one US dollar. If half the people who read this message
did that, it would at least take a small chunk out of that mountain of
legal fees you're facing. Also,
If you set up a paypal account I would be willing to donate on a
case-by-case basis (in this case, it would be to help with your legal
fees). I think even if you don't need help with legal fees by
receiving donations from all across the world it sends the message to
German authorities that
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
Why would they waste their time? They will have already gotten copies
of what they want as it traveled in the clear between its origin and the web
server. Remember the news articles a while back about all those snoop boxes
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
If you set up a paypal account I would be willing to donate on a
case-by-case basis (in this case, it would be to help with your legal
fees). I think even if you don't need help with legal fees by
receiving donations from all across the world
Hi Alex,
I am really sorry about what has happened to you.
I think there is a need to incorporate. If there is for example an
incorporated society which runs some tor-nodes, police is going to
confiscate the servers (which is okay), but not going to search houses
from members of the incorporated
My main criticism of pickaproxy is... why? Why do that when you can
program a tor controller to do exactly the same thing with a offline
database?
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
Why would
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run a squid server on localhost with a block by
country filter. Then, route your tor client through it.
Comrade Ringo Kamens
I researched it more and everybody is saying squid goes between the browser
and tor:
If the most Tor users are really into human rights, free speech,
reporters and the like, then there *are* organizations which vastly more
power than such a 'little' Tor-operator-fund can provide, thought..
But where are they, when it's getting hot on Tor?
Why all the load is up to the operators?
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run a
On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
I know how to filter entry nodes. I can do it with Protowall or another
If Tor is never allowed to connect to certain nodes, and therefore doesn't
know about them, can they still be used as exit nodes?
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in
I would really like to hear some good news from currently investigated
Tor ops, about their success contacting CCC or EFF EU...
Btw: Are there no official CCCers or EFFers reading here and open for a
comment?
Greets
Am Samstag, den 15.09.2007, 21:38 -0400 schrieb Ringo Kamens:
[...]
that's
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in question connected to you 20 seconds before
the alleged connection was
On Sat, 15 Sep 2007 21:39:17 -0400 Ringo Kamens [EMAIL PROTECTED]
wrote:
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
This is getting to be really irritatingly
On Sat, 15 Sep 2007 23:30:58 -0400 misc [EMAIL PROTECTED] wrote
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
www.pickaproxy.com
So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In
other words users do not have any protection from your server.
If you have not been
On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:
Please read the tor documentation. If you think you've already done
that, please go back and read it again.
That brings back the pain of reading it the first time :)
I must admit I gave up after first few pages. I found it
Am Sonntag, 16. September 2007 02:19 schrieb Alexander W. Janssen:
On 9/16/07, Ringo Kamens [EMAIL PROTECTED] wrote:
If you set up a paypal account I would be willing to donate on a
case-by-case basis (in this case, it would be to help with your
legal fees). I think even if you don't need
33 matches
Mail list logo