On Wed, Nov 25, 2009 at 04:33, Flamsmark flamsm...@gmail.com wrote:
A number of Danish ISPs have blocked thepiratebay.org, by redirecting the
DNS entry for that domain to a page stating that the site is blocked. This
sometimes results in Danish exits giving this inappropriate result for that
On 11/25/2009 02:20 AM, James Brown wrote:
It's like a bridge, but for exits. They would probably have to be a lot
less friend-to-friend than bridges, but it might still be doable. I
think this is what the original poster meant, anyways.
Yes, I meant exactly that.
If I understand this
On Tue, Nov 24, 2009 at 8:05 PM, Ted Smith ted...@gmail.com wrote:
On Tue, 2009-11-24 at 19:49 -0500, Roger Dingledine wrote:
See especially point #1: even if we didn't tell clients about the
list of
relays directly, somebody could still make a lot of connections
through
Tor to a test site
Flamsmark wrote, On 2009-11-25 04:33:
A number of Danish ISPs have blocked thepiratebay.org, by redirecting the
DNS entry for that domain to a page stating that the site is blocked. This
sometimes results in Danish exits giving this inappropriate result for that
domain. Should the IP addresses
Georg Sluyterman wrote, On 2009-11-25 18:29:
---cut
I have changed it to OpenDNS now.
---cut---
Or maybe not.. It seems that i can not get an IP via DHCP and manually
change the DNS-resolver address, because (as far as i can see) shell
support is removed in recent Tor-ramdisk releases. What
On Wed, Nov 25, 2009 at 12:21:39PM -0500, Gregory Maxwell wrote:
On Tue, Nov 24, 2009 at 8:05 PM, Ted Smith ted...@gmail.com wrote:
On Tue, 2009-11-24 at 19:49 -0500, Roger Dingledine wrote:
See especially point #1: even if we didn't tell clients about the
list of
relays directly,
On Wed, Nov 25, 2009 at 1:08 PM, Paul Syverson
syver...@itd.nrl.navy.mil wrote:
Two words: Hidden service
Okay. I'm now running a HTTP forwarder to LJ as a hidden service.
Email me for the hidden service address and port number.
...
I'll be posting the mapping of the LJ accounts and passwords
Perhaps you'll just have to wait for the developer to fix the problem?
2009/11/25 Georg Sluyterman ge...@thecrew.dk
Georg Sluyterman wrote, On 2009-11-25 18:29:
---cut
I have changed it to OpenDNS now.
---cut---
Or maybe not.. It seems that i can not get an IP via DHCP and manually
Flamsmark wrote, On 2009-11-25 20:52:
Perhaps you'll just have to wait for the developer to fix the problem?
I will send a feature request :-)
--
Venlig hilsen
Georg Sluyterman
***
To unsubscribe, send an e-mail to
Hello,
As the recent (and not so recent) research shows [1, 2], it is quite
possible for a low-bandwidth adversary controlling the exit node or
destination server to identify all the nodes in a circuit. If the victim
is unlucky, the further deanonymization may use a malicious entry node.
I guess the approach will not be quite useful.
1. Delay is a big enemy of Tor. Read
http://www.cs.uml.edu/%7Exinwenfu/paper/IPDPS08_Fu.pdf. How much delay is a
problem too.
2. An attack can be dynamic against your mechanism by varying the parameters
of the attack. We already tested the impact of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Jacob Appelbaum wrote:
Marcus Griep wrote:
On Wed, Nov 25, 2009 at 2:18 AM, James Brown jbrownfi...@gmail.com wrote:
I spoke again to Livejournal today. They've mostly lifted the block.
They're working on future ways to block abusers of LJ
12 matches
Mail list logo