Do you see the implications [cherries-like: Madrid, 7/7, ..., Georgia right
now] of that?
Apropos to see and deja-vus ... Georgia (and George [on 9/11]):
...
The Georgian air force and artillery struck the sleeping town at midnight.
More than 1,500 civilians perished in the very
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
7v5w7go9ub0o wrote:
There is a clear misunderstanding of the issue at hand by many people
here. The exit policy was put in place to prevent connections between
Tor users and the last hop (the end MX server), *not* to prevent
connections between
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 19/08/08 17:46, Dawney Smith wrote:
I have a *lot* of experience with email administration on a very large
scale, I know what I'm talking about.
I'm sure you do. I'd love to have email work flawlessly and securly with
Tor, so opening ports 465
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
anonym wrote:
I have a *lot* of experience with email administration on a very large
scale, I know what I'm talking about.
I'm sure you do. I'd love to have email work flawlessly and securly with
Tor, so opening ports 465 and 587 would be great
On Wed, 20 Aug 2008 11:34:41 +0100 Dawney Smith
[EMAIL PROTECTED] wrote:
7v5w7go9ub0o wrote:
There is a clear misunderstanding of the issue at hand by many people
here. The exit policy was put in place to prevent connections between
Tor users and the last hop (the end MX server), *not* to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20/08/08 14:02, Dawney Smith wrote:
anonym wrote:
I'm sure you do. I'd love to have email work flawlessly and securly with
Tor, so opening ports 465 and 587 would be great (currently I do have
problems since there's few exit nodes which do
anonym wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20/08/08 15:42, 7v5w7go9ub0o wrote:
anonym wrote:
Email clients leak tons of information, the most critical I know of
being your IP address and/or host in the EHLO/HELO in the beginning
of the SMTP(S) transaction.
Nope.
The
anonym wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20/08/08 15:42, 7v5w7go9ub0o wrote:
anonym wrote:
Email clients leak tons of information, the most critical I know of
being your IP address and/or host in the EHLO/HELO in the beginning
of the SMTP(S) transaction.
Nope.
The
Quoting 7v5w7go9ub0o [EMAIL PROTECTED]:
anonym wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20/08/08 15:42, 7v5w7go9ub0o wrote:
anonym wrote:
Email clients leak tons of information, the most critical I know of
being your IP address and/or host in the EHLO/HELO in the beginning
of
Am 20.08.2008 um 19:04 schrieb [EMAIL PROTECTED]:
Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton,
and connect to the smtp server trough tor. Will my real ip adress
occur in the mail headers, or the ip of the exit node?
I'm guessing the ip of the exit node, right?
Hello friends I'm new on the list. I hope you bear with my questions and
problems.
I just installed Camilo's version of Vidalia, and it seems i have a couple
of problems:
1) You can only exclude one country from the invalidnodes settings.
2) You have to exclude it every time you start vidalia
Am 20.08.2008 um 05:49 schrieb Roy Lanek:
9/11 has been planned much earlier than 2001.
Dear Mr Fletcher (sic!),
I don't think that this mailing-list is the appropriate place to
propagate your FUD based conspiracy theories as if they were facts. So
would you mind to stop it?
Beside
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sven Anderson wrote:
Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton,
and connect to the smtp server trough tor. Will my real ip adress
occur in the mail headers, or the ip of the exit node?
I'm guessing the ip of the exit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20/08/08 19:04, [EMAIL PROTECTED] wrote:
Sorry, I didn't get it: in case I'm using Thunderbird and Torbutton, and
connect to the smtp server trough tor. Will my real ip adress occur in
the mail headers, or the ip of the exit node?
I'm
On Wed, 20 Aug 2008 18:19:40 +0200 Sven Anderson [EMAIL PROTECTED]
wrote:
Am 18.08.2008 um 16:43 schrieb macintoshzoom:
Using valid nodes I have noticed too many times mu browsing is =20
going to the same exit nodes yes fast, but always the same tor =20=
exit nodes club.
this is
mplsfox02,
This study was performed by Privacy International,
as far as I am aware. I think it best to forget how
they decided to color code the map, and just look
at the numbers inside the columns.
It would also be of interest in how they went about
acquiring their data, and what the standards
I am writing an anonymous email client. The main
delay has been getting it compatible with the xerobank
installer so that it automatically downloads mail
credentials and creates the secmod/key3/cert8 PKCS11
databases and performs automatic encryption of the
user credentials, locking it with the
On Wed, Aug 20, 2008 at 05:16:39PM -0400, Erilenz wrote:
Hi,
When using DNSPort or tor-resolve, you can look up A records and PTR
records, but not NS or MX records. Can this functionality be added?
It can be. Somebody would need to write a proposal (see the process in
I dont know if anyone is getting this but I tried to install and use Tor but
AVG would not permit it. Any suggestions?
(I don't think it's necessary to repeat that thread.)
Then I'm unsure why you thought it appropriate to repeat it now.
If FOSS is your jesus, that's fine. If you don't mind spyware
makers and for-profit codejackers being the only ones getting
a boot in the face, that's fine too. The point
Arrakis wrote:
(I don't think it's necessary to repeat that thread.)
Then I'm unsure why you thought it appropriate to repeat it now.
It's appropriate to repeat it because you're spamming this list again
with your ideas about licensing. You continue your attempts to ride on
the coat tales
Hey guys, a few more questions for the experts:
1) I noticed that the Tor-IM-Browser package uses GAIM, routed through SOCKS
5:9050. If I am using GAIM with TOR/Privoxy, should i set Gaim to use SOCKS
5:9050 or, or HTTP 127.0.0.1:8118 and routing it through privoxy?
2) I am using Firefox routed
22 matches
Mail list logo