On Thu, 20 May 2010 08:23:34 +0200 (CEST) "Sebastian Hahn"
wrote:
>> All that would do would be to say to all clients, "Don't include
>> this node in the same circuit as any of the blutmagie nodes." How would
>> that be an attack?
>
>I can list all the nodes I don't control...
>
Wh
> All that would do would be to say to all clients, "Don't include
> this node in the same circuit as any of the blutmagie nodes." How would
> that be an attack?
I can list all the nodes I don't control...
***
To unsubscrib
On Thu, 20 May 2010 00:40:42 -0400 =?utf-8?Q?Jerzy_=C5=81ogiewa?=
wrote:
>I apologize for altering the nature of this thread, but can someone =
>please summarize what this discussion is about? Who is =
>perfect-privacy.com and why are they of concern to Tor users? I am =
>having a difficult t
On Thu, 20 May 2010 00:25:33 -0400 Roger Dingledine
wrote:
>On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
>> Original Message
>> Subject: Re: - Medium - Tor servers, Tor community wants to disable your
>> nodes - General
>> Date: Mon, 17 May 2010 13:46:04 +02
I apologize for altering the nature of this thread, but can someone please
summarize what this discussion is about? Who is perfect-privacy.com and why are
they of concern to Tor users? I am having a difficult time following the
threads.
--
Jerzy Łogiewa -- jerz...@interia.eu
-
On Mon, May 17, 2010 at 09:44:21PM +0200, Moritz Bartl wrote:
> Original Message
> Subject: Re: - Medium - Tor servers, Tor community wants to disable your
> nodes - General
> Date: Mon, 17 May 2010 13:46:04 +0200
> From: Perfect Privacy Administration
> Organization: PP Internet
On Sun, May 16, 2010 at 12:45:22AM -0500, Scott Bennett wrote:
> The tor man page gives a not very edifying description of the NodeFamily
> statement. The man page says that the NodeFamily statement may be used more
> than once in a given torrc file. Does each use define a different Family?
Hello Everyone,
I am doing GSoC this summer with Tor. My name is Kory Kirk, I am a
Computer Science masters student at Villanova University (west of
Philadelphia); I will be graduating this weekend and then I am moving to
Austin, TX a week later. Last year I also participated in GSoC with the T
On 14.05.2010 06:56, and...@torproject.org wrote:
> Can we split entrepreneurial from bad? I don't see the two as one
> concept. If someone figures out a way to increase fast exit relays and
> preserve user privacy/anonymity and make money, more power to them. We
> as the non-profit aren't going
> Is there any working implementation of Phantom? I2P is widely in use,
> and I must say that I really begin to like it. Code also looks much
> cleaner to me (not: mature). Tor could use a complete rewrite.
Not as of yet. They have a specification whitepaper and a video with
slides to give you a
On 19.05.2010 23:58, grarpamp wrote:
>> Have you looked at I2P? http://www.i2p2.de/techintro.html
>> It for example allows both users and services to specify their hop
>> length, and uses packet switching instead of circuit switching.
> Phantom does this too... user specified hop counts based on th
> The author is a security researcher, the tool is ages old and
> abandoned, as far as I know it doesn't work right away unless you
> change some of the code, and it was written to check what tor exit
> nodes where running sslstrip or in other ways were messing with the
> traffic.
>
> I'm not
> To be more specific about what I mean by "equal
> resources": suppose that users of system X have
> 5 relays, and tor has 5 relays, and both
> sets of users used the same bandwidth. If all
> users used one 10 relay system instead, the
> total bandwidth should be similar.
Tortunnel is not a s
> Just wondering if anybody from the Tor Project has contacted the author to
> express the concerns with tortunnel. Particularly about it being
> detrimental to the Tor network.
>
> Jim
The author is a security researcher, the tool is ages old and
abandoned, as far as I know it doesn't work right
--- On Wed, 5/19/10, Stephen Carpenter wrote:
> Certainly there is a certain amount of sense to the idea
> that tortunnel traffic may use another system that focuses more
> on speed if tortunnel was unavailable. However, an assumption is an
> assumption and I am not sure how much I buy the truth
Sebastian Hahn wrote:
Hi Niklas,
On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote:
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the
number
of relays ?
Yes, unfortunately quite a few people use it.
It hurts the network by endangering exit node operators, and
by complete
On Wed, May 19, 2010 at 1:48 PM, Sebastian Hahn wrote:
>> Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number
>> of relays ?
>
> Yes, unfortunately quite a few people use it.
> It hurts the network by endangering exit node operators, and
> by completely ignoring any of the lo
Hi Niklas,
On May 19, 2010, at 6:06 PM, Attac Heidenheim wrote:
Hi everybody,
I just tried a little tool called "Tortunnel" which allows a user to
"tunnel" Tor via Privoxy/Polipo to any selected exitnode. Just one hop
instead of three relays.
This works by pretending to the exit relay that you
>
> Does anybody use tortunnel ?
>
Never heard of it before, so doubt it.
Is tortunnel evil since it maybe hacks Tor-cirucits to reduce the number
> of relays ?
>
We discourage people from reducing the circuit length since it cripples the
anonymity tor provides, makes exit nodes more tasty targe
Hi everybody,
I just tried a little tool called "Tortunnel" which allows a user to
"tunnel" Tor via Privoxy/Polipo to any selected exitnode. Just one hop
instead of three relays.
Of course, if the exitnode ist evil, you're lost, but it really speeds
up the whole thing on the other hand.
Website: ht
Qualified guess: These might be so-called BitTorrent trackers.
These tracker URLs are embedded in torrent files that you download.
You can download these torrent files from various sources, not
necessarily (even rarely) from the site itself. When you load these
torrents into a BitTorrent client, t
> In the meantime, perfect-privacy.com should advise this list as soon as
> its torrc files are in compliance, while the rest of us should feel free to
> use the NodeFamily information I posted earlier with, apparently, the addition
> of 17 more node fingerprints that I missed when I grepped th
22 matches
Mail list logo