One could argue that recording traffic goes against the spirit of the tor
project and anonymity in general. But even if people do monitor the traffic as
long as they don't control both nodes there is little chance that the end user
can really be tracked. There is also an onus on the end user to
That is not really how Tor works as far as I know. A more dedicated proxy like
squid is what you should look for. Similar to what was done for the Iran
protests.
But adding new nodes helps the entire network, and increases general capacity.
If know someone that needs something more specific
That is not really how Tor works as far as I know. A more dedicated proxy like
squid is what you should look for. Similar to what was done for the Iran
protests.
But adding new nodes helps the entire network, and increases general capacity.
If know someone that needs something more specific
I doubt that I will be able to get to dresden, but is there a chance of some
sort of video conference? I like the idea of putting together so sort
of official group behind the tor exit node operators. There are a ton of
things that this could encompass, and we could roll up a
few different efforts
Recent cases of people being stopped by DHS as they enter/exit the country
due to political causes they are affiliated with. Not really anything to do
with Tor yet, but wikileaks or hacking in general.
On Tue, Jan 11, 2011 at 5:15 AM, Matthew pump...@cotse.net wrote:
On 10/01/11 21:00, Olaf
What do they typically ask for, and is it from any place in particular? Also
what sort of things typically generate these notices?
On Mon, Jan 10, 2011 at 4:00 PM, Olaf Selke olaf.se...@blutmagie.de wrote:
Am 10.01.2011 20:42, schrieb Roc Admin:
This is interesting. Could you detail time
6 matches
Mail list logo