Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Scott Bennett
On Thu, 20 May 2010 08:23:34 +0200 (CEST) "Sebastian Hahn" wrote: >> All that would do would be to say to all clients, "Don't include >> this node in the same circuit as any of the blutmagie nodes." How would >> that be an attack? > >I can list all the nodes I don't control... > Wh

Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Sebastian Hahn
> All that would do would be to say to all clients, "Don't include > this node in the same circuit as any of the blutmagie nodes." How would > that be an attack? I can list all the nodes I don't control... *** To unsubscrib

Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Scott Bennett
On Thu, 20 May 2010 00:40:42 -0400 =?utf-8?Q?Jerzy_=C5=81ogiewa?= wrote: >I apologize for altering the nature of this thread, but can someone = >please summarize what this discussion is about? Who is = >perfect-privacy.com and why are they of concern to Tor users? I am = >having a difficult t

Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Scott Bennett
On Thu, 20 May 2010 00:25:33 -0400 Roger Dingledine wrote: >On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote: >> Original Message >> Subject: Re: - Medium - Tor servers, Tor community wants to disable your >> nodes - General >> Date: Mon, 17 May 2010 13:46:04 +02

Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Jerzy Łogiewa
I apologize for altering the nature of this thread, but can someone please summarize what this discussion is about? Who is perfect-privacy.com and why are they of concern to Tor users? I am having a difficult time following the threads. -- Jerzy Łogiewa -- jerz...@interia.eu -

Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Roger Dingledine
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote: > Original Message > Subject: Re: - Medium - Tor servers, Tor community wants to disable your > nodes - General > Date: Mon, 17 May 2010 13:46:04 +0200 > From: Perfect Privacy Administration > Organization: PP Internet

Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Roger Dingledine
On Sun, May 16, 2010 at 12:45:22AM -0500, Scott Bennett wrote: > The tor man page gives a not very edifying description of the NodeFamily > statement. The man page says that the NodeFamily statement may be used more > than once in a given torrc file. Does each use define a different Family?

[GSoC] JTor Hidden Services

2010-05-19 Thread Kory Kirk
Hello Everyone, I am doing GSoC this summer with Tor. My name is Kory Kirk, I am a Computer Science masters student at Villanova University (west of Philadelphia); I will be graduating this weekend and then I am moving to Austin, TX a week later. Last year I also participated in GSoC with the T

Re: Tor Exit Node Sponsorship - looking for partners

2010-05-19 Thread Moritz Bartl
On 14.05.2010 06:56, and...@torproject.org wrote: > Can we split entrepreneurial from bad? I don't see the two as one > concept. If someone figures out a way to increase fast exit relays and > preserve user privacy/anonymity and make money, more power to them. We > as the non-profit aren't going

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread grarpamp
> Is there any working implementation of Phantom? I2P is widely in use, > and I must say that I really begin to like it. Code also looks much > cleaner to me (not: mature). Tor could use a complete rewrite. Not as of yet. They have a specification whitepaper and a video with slides to give you a

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Moritz Bartl
On 19.05.2010 23:58, grarpamp wrote: >> Have you looked at I2P? http://www.i2p2.de/techintro.html >> It for example allows both users and services to specify their hop >> length, and uses packet switching instead of circuit switching. > Phantom does this too... user specified hop counts based on th

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread grarpamp
> The author is a security researcher, the tool is ages old and > abandoned, as far as I know it doesn't work right away unless you > change some of the code, and it was written to check what tor exit > nodes where running sslstrip or in other ways were messing with the > traffic. > > I'm not

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Moritz Bartl
> To be more specific about what I mean by "equal > resources": suppose that users of system X have > 5 relays, and tor has 5 relays, and both > sets of users used the same bandwidth. If all > users used one 10 relay system instead, the > total bandwidth should be similar. Tortunnel is not a s

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Anders Andersson
> Just wondering if anybody from the Tor Project has contacted the author to > express the concerns with tortunnel.  Particularly about it being > detrimental to the Tor network. > > Jim The author is a security researcher, the tool is ages old and abandoned, as far as I know it doesn't work right

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Martin Fick
--- On Wed, 5/19/10, Stephen Carpenter wrote: > Certainly there is a certain amount of sense to the idea > that tortunnel traffic may use another system that focuses more > on speed if tortunnel was unavailable. However, an assumption is an > assumption and I am not sure how much I buy the truth

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Jim
Sebastian Hahn wrote: Hi Niklas, On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote: Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number of relays ? Yes, unfortunately quite a few people use it. It hurts the network by endangering exit node operators, and by complete

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Stephen Carpenter
On Wed, May 19, 2010 at 1:48 PM, Sebastian Hahn wrote: >> Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number >> of relays ? > > Yes, unfortunately quite a few people use it. > It hurts the network by endangering exit node operators, and > by completely ignoring any of the lo

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Sebastian Hahn
Hi Niklas, On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote: Hi everybody, I just tried a little tool called "Tortunnel" which allows a user to "tunnel" Tor via Privoxy/Polipo to any selected exitnode. Just one hop instead of three relays. This works by pretending to the exit relay that you

Re: Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Damian Johnson
> > Does anybody use tortunnel ? > Never heard of it before, so doubt it. Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number > of relays ? > We discourage people from reducing the circuit length since it cripples the anonymity tor provides, makes exit nodes more tasty targe

Reducing relays = reducing anonymity ? Tortunnel.

2010-05-19 Thread Attac Heidenheim
Hi everybody, I just tried a little tool called "Tortunnel" which allows a user to "tunnel" Tor via Privoxy/Polipo to any selected exitnode. Just one hop instead of three relays. Of course, if the exitnode ist evil, you're lost, but it really speeds up the whole thing on the other hand. Website: ht

Re: nameserver stats

2010-05-19 Thread Anders Andersson
Qualified guess: These might be so-called BitTorrent trackers. These tracker URLs are embedded in torrent files that you download. You can download these torrent files from various sources, not necessarily (even rarely) from the site itself. When you load these torrents into a BitTorrent client, t

Re: Answer by perfect-privacy.com Re: perfect-privacy.com, Family specifications, etc.

2010-05-19 Thread Robert Marquardt
> In the meantime, perfect-privacy.com should advise this list as soon as > its torrc files are in compliance, while the rest of us should feel free to > use the NodeFamily information I posted earlier with, apparently, the addition > of 17 more node fingerprints that I missed when I grepped th