and...@torproject.org wrote:
On Fri, Nov 26, 2010 at 10:11:55AM +, my.green.lant...@googlemail.com wrote
2.3K bytes in 61 lines about:
: So if Tor is using usual development practice then why does the
: stable version manual
: (http://www.torproject.org/docs/tor-manual.html.en) have
: "*Warn
Roger Dingledine wrote:
This is interesting. I tried it.. and both seem to work for me on my
0.2.2.10-alpha on win2k.
But.. when I tried - WarnUnsafeSocks 0
I get..
Nov 25 17:50:03.015 [Warning] Failed to parse/validate config: Unknown
option 'WarnUnsafeSocks'. Failing.
Nov 25 17:50:03
Matthew wrote:
I think I am correct to say that StrictExitNodes has been negated in
favour of StrictNodes.
However, when I use StrictExitNodes 1 I have no problems.
When I use StrictNodes 1 and have viable ExitNodes then Vidalia gives
the error: "Vidalia detected that the Tor software exited
Kyle Williams wrote:
Coderman sent this to me, and I'm a little upset because the extra
$60.00/month for 0 bitcoins is very annoying. I have since stopped
trying to generate bitcoins, because it's just wasting electricity.
More comment inline below debating this point.
For those who are wo
Geoff Down wrote:
On Mon, 15 Nov 2010 12:28 +, "Anon Mus"
wrote:
Using vidalia 0.2.7, Tor 0.2.2.10-alpha (Qt 4.5.3)
I am not seeing any location in the left box (or anywhere else) against
Tor relays, just a ? in a white box.
Is anyone else seeing this?
I asked t
Geoff Down wrote:
On Mon, 15 Nov 2010 12:28 +, "Anon Mus"
wrote:
Using vidalia 0.2.7, Tor 0.2.2.10-alpha (Qt 4.5.3)
I am not seeing any location in the left box (or anywhere else) against
Tor relays, just a ? in a white box.
Is anyone else seeing this?
I asked t
Using vidalia 0.2.7, Tor 0.2.2.10-alpha (Qt 4.5.3)
I am not seeing any location in the left box (or anywhere else) against
Tor relays, just a ? in a white box.
Is anyone else seeing this?
***
To unsubscribe, send an e-mail t
TorOp wrote:
On 10/9/2010 11:14 AM, Anon Mus wrote:
Fabian Keil wrote:
And Tor says:
Oct 09 14:00:19.571 [notice] Have tried resolving or connecting to
address 'www.cobblers.za' at 3 different places. Giving up.
Fabian
Ahh, I have those but they only say,
"Oct 09 15:31:32.10
Fabian Keil wrote:
Anon Mus wrote:
and...@torproject.org wrote:
On Thu, Oct 07, 2010 at 05:20:08PM +0100, my.green.lant...@googlemail.com wrote
2.3K bytes in 55 lines about:
: Well, well, well suddenly the problem fixes "itself"... after
: 20+ disconnects and 10+ &quo
Fabian Keil wrote:
And Tor says:
Oct 09 14:00:19.571 [notice] Have tried resolving or connecting to address
'www.cobblers.za' at 3 different places. Giving up.
Fabian
Ahh, I have those but they only say,
"Oct 09 15:31:32.109 [Notice] Have tried resolving or connecting to
address '[scrubbe
Fabian Keil wrote:
If you are using a Privoxy version more recent than 3.0.9
(released in 2008), you can use SOCKS5 which will allow Tor
to provide Privoxy with a more detailed problem description.
My mistake, I assume that means that v3.0.16 does indeed do this DNS
reporting.
With a m
Fabian Keil wrote:
Your Privoxy version is from 2006, you might want to consider updating it.
With a more recent version I get:
| f...@r500 ~ $lynx --dump http://www.cobblers.za/
|503
|
|This is [1]Privoxy 3.0.17 on Privoxy-Jail.local (10.0.0.1), port 8118,
|enabled
|
|
Geoff Down wrote:
On Sat, 09 Oct 2010 13:37 +0200, "Olaf Selke"
wrote:
On 09.10.2010 11:38, Anon Mus wrote:
Prior to end August 2010, if this kind of message was received I just
used to close the circuit and try again. Usually it would resolve by the
3rd try. I tested thes
Jim wrote:
Anon Mus wrote:
These were added because, as I already said, they were repeatedly (5+
times on 5 different circuits) "unable to resolve DNS and so failed
page access",. this is a standard privoxy message.
FYI, when you get that Privoxy message while using Tor (or
Mike Perry wrote:
Thus spake Anon Mus (my.green.lant...@googlemail.com):
Well, well, well suddenly the problem fixes "itself"... after 20+
disconnects and 10+ "You are using a proxy which is changing your
data... refusing connection.." over the past 3 days.
Mus
and...@torproject.org wrote:
On Thu, Oct 07, 2010 at 05:20:08PM +0100, my.green.lant...@googlemail.com wrote
2.3K bytes in 55 lines about:
: Well, well, well suddenly the problem fixes "itself"... after
: 20+ disconnects and 10+ "You are using a proxy which is changing
: your data... refusin
Nick Mathewson wrote:
On Thu, Oct 7, 2010 at 4:32 AM, Anon Mus
wrote:
On Sun, Oct 3, 2010 at 2:05 PM, wrote:
Hello everyone.
I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it in web,
though it has opened
On Sun, Oct 3, 2010 at 2:05 PM, wrote:
Hello everyone.
I found a fork (?) of tor software with GUI named Advanced Tor. I was
surprised of its features, but found just nothing about it in web,
though it has opened source placed in sf.net.
Have you people discussed it? Please give a link to disc
Jonathan D. Proulx wrote:
While I do think it's good to see the funding there are two points that
are important to remember.
1) this is a freesoftware project the code is there for all to see,
hopefully clueful people other than the US Government are reading it.
Unfortunately, whilst there
jobs?
On 08/14/2010 07:26 AM, Anon Mus wrote:
Jimmy Dioxin wrote:
Hey Folks,
Cryptome has posted the Tor Project 2008 Tax Return available at:
http://cryptome.org/0002/tor-2008.zip
As many know, all US non-profit corporation returns are available upon
request by the public.
Firstly, peop
Andrew Lewman wrote:
On Sat, 14 Aug 2010 12:26:57 +0100
Anon Mus wrote:
It looks like 90% of the funding is from the US, nearly all US
government.
Internews Europe - France $183,180 (35.6%)
(http://www.sourcewatch.org/index.php?title=Internews)
Stichting Nlnet - Netherlands
Roger Dingledine wrote:
On Sat, Aug 14, 2010 at 12:26:57PM +0100, Anon Mus wrote:
It looks like 90% of the funding is from the US, nearly all US government.
If you know any funders outside the US who care about privacy, anonymity,
or circumvention, we're all ears. :)
I am ce
Jimmy Dioxin wrote:
Hey Folks,
Cryptome has posted the Tor Project 2008 Tax Return available at:
http://cryptome.org/0002/tor-2008.zip
As many know, all US non-profit corporation returns are available upon
request by the public.
Firstly, people need to look through these returns in the same wa
Paul Syverson wrote:
On Tue, Jul 13, 2010 at 05:30:27PM +0100, Anon Mus wrote:
Paul Syverson wrote:
Tor doesn't do any batching or delaying. This is just another way you
could be identified by timing attacks. Tor provides no resistance to
timing attacks, and so far there a
Paul Syverson wrote:
Tor doesn't do any batching or delaying. This is just another way you
could be identified by timing attacks. Tor provides no resistance to
timing attacks, and so far there are no countermeasures that have
been identified as working against a passive, much less active, advers
Andrew Lewman wrote:
On Thursday May 13 2010 07:45:03 Anon Mus wrote:
Recently, since the TOR upgrade, have noticed that 80+ of the relay
locations in "View the Network" are missing.
Everyone will be seeing this soon. The SSL cert changed/renewed. The
forthcoming Vid
Platform:
Win2000 Pro SP4
TOR - Upgraded from several dev. versions ago to Tor 0.2.10-alpha
(git-81b84c0b017267b4) package last week. (Vidalia 0.2.7).
Recently, since the TOR upgrade, have noticed that 80+ of the relay
locations in "View the Network" are missing.
Is anyone else seeing this
Eugen Leitl wrote:
On Thu, Sep 17, 2009 at 03:58:50PM -0400, Michael Holstein wrote:
(basically, all the OP on Rededit was saying, was he's the guy that
writes the microengine code) .. the processors themselves aren't
Not quite -- he explicitly claimed they used custom hardware. Per
Zinco wrote:
Matej Kovacic wrote:
Hi,
this seems an interesting issue:
http://www.making-the-web.com/misc/sites-you-visit/nojs/
bye, Matej
Anon Mus Wrote:
Been to this site and it dont work on my firefox.3.0.8 browser... (with
NoScript, QuickJava, Better Privacy
Alexander Cherepanov wrote:
Hello, Anon!
You wrote to or-talk@freehaven.net on Sun, 14 Jun 2009 16:44:12 +0100:
Of course, websites & organizations have the right to choose which ports
they use for which services and open/close. Anyone trying to inflict
that kind of system on any "internet"
Zinco wrote:
-Original Message-
From: owner-or-t...@freehaven.net [mailto:owner-or-t...@freehaven.net] On
Behalf Of Anon Mus
Sent: Sunday, June 14, 2009 8:09 AM
To: or-talk@freehaven.net
Subject: Re: Stealing browser history without JavaScript
Matej Kovacic wrote:
Hi,
this seems an
Alexander Cherepanov wrote:
Hello, Scott!
You wrote to or-t...@seul.org, scr...@nonvocalscream.com on Sun, 14 Jun 2009
01:15:43 -0500 (CDT):
Now, another person on this list has argued that the RFC's should be
ignored and that IANA should be ignored. I remain unconvinced that doing
ei
Matej Kovacic wrote:
Hi,
this seems an interesting issue:
http://www.making-the-web.com/misc/sites-you-visit/nojs/
bye, Matej
Been to this site and it dont work on my firefox.3.0.8 browser... (with
NoScript, QuickJava, Better Privacy, JavaScript Deobfuscator, Quick
Preference Button & Us
Roger Dingledine wrote:
On Fri, Jun 12, 2009 at 03:51:25PM -0700, Kyle Williams wrote:
I think "snooping" and "statistical information" should be treated
differently. Take Scott's case here. He is making a claim that by using
the exit policy outlined above, it would reduce the amount of tra
- Original Message -
From: "Roger Dingledine" mailto:a...@mit.edu>>
To: mailto:or-talk@freehaven.net>>
Sent: Tuesday, February 17, 2009 8:04 PM
Subject: Re: another reason to keep ExcludeNodes
On Tue, Feb 17, 2009 at 08:08:19PM +0100, Lexi Pimenidis wrote:
> > > little bit of investiga
Scott Bennett wrote:
Well, technically speaking, I guess that's true. However, unless I'm
greatly mistaken, the exit end of a circuit will compress any data coming into
it to be relayed back to the client and will uncompress anything arriving from
the client to be sent out from the exit.
Anon Mus wrote:
Scott Bennett wrote:
On Sat, 27 Sep 2008 17:13:02 -0600 "John Brooks"
<[EMAIL PROTECTED]>
wrote:
4 and 5 hop circuits can be created when contacting or publishing
hidden services and, I believe, sometimes when retrieving directory
A cir
Scott Bennett wrote:
On Sat, 27 Sep 2008 17:13:02 -0600 "John Brooks" <[EMAIL PROTECTED]>
wrote:
4 and 5 hop circuits can be created when contacting or publishing
hidden services and, I believe, sometimes when retrieving directory
A circuit to a hidden service may indeed have
Li-Hui Zhou wrote:
On Fri, 26 Sep 2008 11:12:09 +0200
Martin Balvers <[EMAIL PROTECTED]> wrote:
Li-Hui Zhou wrote:
On Thu, 25 Sep 2008 18:19:24 -0700
"F. Fox" <[EMAIL PROTECTED]> wrote:
When choosing nodes to *use* exclusively, this line has to be added, in
addition to the
sean darcy wrote:
I have firefox 3.0.1, tor button 1.2, tor-0.1.2.19-1.fc9.i386 ,
privoxy-3.0.8-2.fc9.i386
flash won't play with tor enabled. tor disabled it works fine.
For instance, http://www.adobe.com/shockwave/welcome/
Do I need some new setting?
Thanks for any help.
sean
Hello Sea
Roger Dingledine wrote:
On Mon, Aug 25, 2008 at 10:12:01PM +0100, Anon Mus wrote:
I might set up another account, of my own, to check receipts. Seems to
be the only solution.
You can also watch http://archives.seul.org/or/talk/
It gets updated in almost-real-time.
--Roger
coderman wrote:
On Mon, Aug 25, 2008 at 7:26 AM, Anon Mus
<[EMAIL PROTECTED]> wrote:
...
I've now 3 posts to or-talk which all appear to have got through but I don't
get copied the post as a list member.
I'm pretty sure I used to get them with my old addy
[EMAIL PROT
Using the latest Tor stable install (v0.2.0.30 (r15956)) & Vidalia 0.1.8
no win2k
My ExcludeNodes is,
ExcludeNodes
$113D95C227174A319369AAD344343917E15B95F5,$218A0C3EDFF6C22DE3F10C4B1651AD610C5816C1,NetworkPimp,FoeBuD3,Beaumarchais
but the exluded node FoeBuD3 continues to be on my exit nod
Can someone in this list admin reply to this email below please.
-K-
Original Message
Subject:[Fwd: Not getting copied my posts to or-talk]
Date: Mon, 18 Aug 2008 12:56:37 +0100
From: Anon Mus <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Hi, I'd a
Scott Bennett wrote:
On Thu, 7 Aug 2008 15:26:37 +0200 Steffen Schoenwiese
<[EMAIL PROTECTED]> wrote:
On Thursday 07 August 2008 12:19:22 Scott Bennett wrote:
[...]
The point is, this is written in way that hardly anyone, even native
germans, would bother to read it, so I'm
Nick Mathewson wrote:
On Fri, Aug 01, 2008 at 01:01:08PM +0100, Anon Mus wrote:
[...]
But this latest version (at least) of tor deletes all the user comments
and also deletes all but the last line of any ExcludeNodes lines, all
other ExcludeNodes line details are lost.
Hi, Anon Mus
Hans Schnehl wrote:
[snip]
Not sure whats going on.. could it be a port 25 build circuit problem??
[snip]
Don't know about the rest, but it certainly is not a good idea to choose smtp
port 25.
Even in Tor's default configutration reject *:25 is standard, and I doubt
someone would de
Hi,
I have recently upgraded to v0.1.2.19 (after a long time being unable to
upgrade due to vidalia control of tor problems - no appears to be fixed)
and after I noticed the location of torrc had been changed to the
vidalia dir I updated the torrc to include my ExcludeNodes lists.
I used to
slush wrote:
At first sight this appears to be an exit node problem but then, as I
read it, you say it occurs with more than one exit node and only
at this
"higher" level of throughput.
I can repeat this problem (I could do it yesterday) by opening large
amount of circuits bet
slush wrote:
Hi to all again,
because it looks like conference did not receive emails with
attachments, Im resending my initial email about problem I found.
Attachments from original email are here:
http://www.slush.cz/centrumyahoo.png
http://www.slush.cz/centrum.png
http://www.slush.cz/centr
Roger Dingledine wrote:
> SUMMARY:
> This is a critical security announcement.
>
> A bug in the Debian GNU/Linux distribution's OpenSSL package was
> announced today. This bug would allow an attacker to figure out
private
> keys generated by these buggy versions of the OpenSSL library.
Thus
Ben Wilhelm wrote:
> Anon Mus wrote:
>> Ben,
>>
>> I think you are using the purely theoretical numbers and applying
them
>>
>> to the problem as if they were reality.
>>
>> As I remember the problem with the selection of primes for PKE is,
>
Ben Wilhelm wrote:
> Anon Mus wrote:
>> Ben,
>>
>> Yes you are right factorising this is hard, but thats not what I've
>> been suggesting. What if every time you generated a pair of keys you
>> stored the result somewhere!
>>
>> Say you o
Ben Wilhelm wrote:
>
> Anon Mus wrote:
>> A fully global networked array of prime number testers, prime
numbers
>> being the underlying basis for your public key encryption
technology.
>>
>> 1 million decimal digit long primes achieved, the search for 10
milli
Roger Dingledine wrote:
> (I changed the thread's Subject, since "Anon Mus"'s attack is not the
> same as the attack described on it.wikipedia.)
>
>
Here's the original quote text translation of the article in
it.wikipedia from the starting thread to w
Scott Bennett wrote:
> Looks like OR-TALK has moved up in the world enough that it has
at
> last acquired a troll.
> On Fri, 15 Feb 2008 12:42:59 -0800 (PST) Anon Mus
> <[EMAIL PROTECTED]> wrote
>
>> F. Fox wrote:
>>
>>> -BEGI
F. Fox wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Anon Mus wrote:
> (snip)
>
>> Not quite true.
>>
> (snip)
>
>> 3. Attacker has a list of known public/private key pairs. These are
>> generated over the years by governm
Andrew wrote:
> Jan Reister schrieb:
>> Il 14/02/2008 13:36, Anon Mus ha scritto:
>>> A. Attacker obtains genuine private keys by,
>>> 1. Attacker sets up a number of genuine tor servers
>>> 2. Attacker infects genuine tor nodes with spyware
>>
>&g
Jan Reister wrote:
> Il 14/02/2008 13:36, Anon Mus ha scritto:
>> A. Attacker obtains genuine private keys by,
>> 1. Attacker sets up a number of genuine tor servers
>> 2. Attacker infects genuine tor nodes with spyware
>
> Setting up rogue (or compromised) nodes
Jan Reister wrote:
> Il 13/02/2008 20:55, Marco Bonetti ha scritto:
>> that's the whole point of encrypting the communications and sharing
the
>> public keys fingerprints inside tor sources.
>> a man in the middle can reroute traffic through his nodes but it
will be
>> useless (except for sending y
Watson Ladd wrote:
> Anon Mus wrote:
>> This question is for those with the knowhow.
>>
>> A while back I got a number of emails from the same source where the
>> emails were sent in "pairs" a minute or less apart.
>>
>> The first of each of th
Thanks, I have some comments that may help...
Max Berger wrote:
Am Freitag, den 11.01.2008, 09:44 -0800 schrieb Anon Mus:
This question is for those with the knowhow.A while back I got a number of
emails from the same source where the emails were sent in "pairs" a minut
This question is for those with the knowhow.
A while back I got a number of emails from the same source where the
emails were sent in "pairs" a minute or less apart.
The first of each of the "email pair" were large (over 700characters),
the second were small (under 50 characters). On the face o
Felix Eckhofer wrote:
Hi Robert,On Sat, 17.11.2007, you wrote:
Can someone point me to the EU directive on this? I thought this was just a
German initiative.
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:01:EN:HTMLfelix
So a law which was said
Michael Schmidt wrote:
> Hello Roger, hello List
>
> I read on another forum, that you are visiting us for the Congress in
Berlin
> http://events.ccc.de/congress/2007/Welcome%21
> and will talk later with the people from the
> http://www.privacyfoundation.de/
> about a new extension to Tor
> http:
Whoops - off topic - but helps Tor servers in UK.
FYI.. if you are in the UK then sign up for this if you feel able.
http://petitions.pm.gov.uk/Unlimited-ADSL/
Then email it to all your friends.
Bored stif
Nick Mathewson <[EMAIL PROTECTED]> wrote:On Sun, Mar 04, 2007 at 07:24:10AM
-0800, Anon Mus wrote:
[Reformatted: lines wrapped. You might want to see if you can get
your mailer to wrap lines to 72 characters.]
***Yes, it was set to 99.
> (v0.1.1.26 client on Win2Ksp4
(v0.1.1.26 client on Win2Ksp4+)
I have a few nodes I exclude in my torrc with ExcludeNodesconfiguration.
When I start tor (using vidalia) I get a series of error messages in mylog. eg
[Warning] router_get_by_nickname(): You specified a server "xxx" byname, but
the directory authorities do
68 matches
Mail list logo