Hi,
I am not sure if this was on this list, but it is an interesting
information:
http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
it seems cookies could be respawned...
And there is a plugin to remove this LSO's:
https://addons.mozilla.org/en-US/firefox/addon/6623
Hello,
my fist steps with running tor on Sparc are successful. I did it with
Solaris10, Sun-CC on a E450 with 4 CPU. When doing configure I found a message:
configure:2435: You are running Solaris; Sometimes threading makes
cpu workers lock up here, so I will disable threads.
This is a pity
I've run into a problem. My model is that a user torify has all
traffic forwarded to localhost. From there, it should all be dropped
except connections to privoxy (port 8118). It all works up until the
last iptables command. I assume this is blocking all incoming traffic,
including traffic I've
On Thu, Aug 20, 2009 at 4:55 AM, Ringo2600den...@gmail.com wrote:
...
I can't connect to any websites, but I can send requests out. Is there
anything obvious I'm missing or a something I should add?
...
try adding:
iptables -A INPUT -p tcp -m state --state ESTABLISHED -j ACCEPT
before:
I'm still getting the same problem : ( Here's what wget gives me:
wget google.com
resolving google.com (works)
connecting to google.com...
and then it just never finished.
Ringo
coderman wrote:
On Thu, Aug 20, 2009 at 4:55 AM, Ringo2600den...@gmail.com wrote:
...
I can't connect to any
Maybe this will work for you. FYI, I changed your iptables rules some and
recalled the rest from memory, so it's iffy.
#allow connections to privoxy
iptables -A OUTPUT -o lo -p
Ok so I added this one (which seemed like the only one that would open
things up) and still no luck:
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
Here's a export of my current rules:
# Generated by iptables-save v1.4.1.1 on Thu Aug 20 09:28:22 2009
*filter
:INPUT ACCEPT
On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote:
Hi,
I am not sure if this was on this list, but it is an interesting
information:
http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
it seems cookies could be respawned...
And there is a plugin to remove
On Thu, Aug 20, 2009 at 09:54:59AM -0400, Praedor Atrebates wrote:
No need to go extreme and lose most functionality by going 1% free/open
software.
The issue is security only. Some features are intrinsically exploitable, and
it matters little how it's implemented.
You simply lose a
On Thu, 2009-08-20 at 09:54 -0400, Praedor Atrebates wrote:
On Thursday 20 August 2009 09:36:40 am Ted Smith wrote:
On Thu, 2009-08-20 at 08:55 +0200, Matej Kovacic wrote:
Hi,
I am not sure if this was on this list, but it is an interesting
information:
On 08/20/2009 10:09 AM, Ted Smith wrote:
You don't lose most functionality by using free software.
Not picking on Ted, but this whole thread is off-topic.
--
Andrew Lewman
The Tor Project
pgp 0x31B0974B
Website: https://torproject.org/
Blog: https://blog.torproject.org/
Identi.ca: torproject
On 08/20/2009 12:59 AM, Scott Bennett wrote:
Hmmm...I'm not too sure that I should be blamed for this, but
nevertheless...
Not blaming you, just honoring you as the instigator. ;)
To get back to your question of why we need a proxy between a browser
and tor, though, I would like to
On Thu, 2009-08-20 at 10:28 -0400, Andrew Lewman wrote:
On 08/20/2009 10:09 AM, Ted Smith wrote:
You don't lose most functionality by using free software.
Not picking on Ted, but this whole thread is off-topic.
Wait, what? The discussion of persistent, hidden, plugin-based storage
is
On 8/20/09, Scott Bennett benn...@cs.niu.edu wrote:
On Wed, 19 Aug 2009 23:54:01 +0100 KT listcli...@gmail.com wrote:
Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites
The above is not a valid identifier. It appears to be missing one
character.
Sorry for
On 08/20/2009 10:58 AM, Ted Smith wrote:
Wait, what? The discussion of persistent, hidden, plugin-based storage
is off-topic for the Tor list? I would think that constitutes a security
threat from the perspective of someone using Tor to safeguard their
anonymity. Additionally, the question
On Thu, Aug 20, 2009 at 12:52:38PM +0200, thomas.hluch...@netcologne.de wrote:
my fist steps with running tor on Sparc are successful. I did it with
Solaris10, Sun-CC on a E450 with 4 CPU.
Great.
When doing configure I found
a message:
configure:2435: You are running Solaris; Sometimes
On Thu, Aug 20, 2009 at 9:05 AM, Curious Kid letsshareinformat...@yahoo.com
wrote:
Please excuse my extreme ignorance.
Even if an attacker were to be able to gain
command-line access through a vulnerability in a program such as
Firefox, they still wouldn't be able to obtain the user's IP
Please excuse my extreme ignorance.
Even if an attacker were to be able to gain
command-line access through a vulnerability in a program such as
Firefox, they still wouldn't be able to obtain the user's IP address,
look at their file system, or gain access to any other
Exit node freeMe69 [1] is injecting the following snippet to response body:
script type=text/javascript
src=http://s.tobban.com/solver/cpt.php;/script
[1] http://tinyurl.com/mz9d7e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Aug 20, 2009, at 23:02 PM, KT wrote:
Exit node freeMe69 [1] is injecting the following snippet to
response body:
script type=text/javascript
src=http://s.tobban.com/solver/cpt.php;/script
[1] http://tinyurl.com/mz9d7e
It's actually
On Thu, Aug 20, 2009 at 17:29, Tom Hek t...@tomhek.nl wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Aug 20, 2009, at 23:02 PM, KT wrote:
Exit node freeMe69 [1] is injecting the following snippet to response
body:
script type=text/javascript
On 8/20/09, Tom Hek t...@tomhek.nl wrote:
On Aug 20, 2009, at 23:02 PM, KT wrote:
Exit node freeMe69 [1] is injecting the following snippet to
response body:
script type=text/javascript
src=http://s.tobban.com/solver/cpt.php;/script
[1] http://tinyurl.com/mz9d7e
It's actually injected
On 08/20/2009 08:28 PM, downie - wrote:
iCharles Proxy, a
href=http://www.xk72.com/charles/;http://www.xk72.com/charles//a/i
The real charles proxy is at http://www.charlesproxy.com/ and is
generally used for debugging apps, but is also used to spy on people.
The innocent explanation is that
On Thu, Aug 20, 2009 at 9:05 AM, Curious
Kidletsshareinformat...@yahoo.com wrote:
..
How is entropy gathered in virtual machines? Will it tell you if there is not
enough entropy to support unpredictable routing and encryption? (Or is that
even an issue at all with Tor?)
hi Curious,
entropy
24 matches
Mail list logo