On Monday 14 February 2011 18:11:42 Dave U. Random wrote:
SHUT UP EELBASH!
I'm not eelbash, nor do I know who eelbash is (I've heard rumors that eelbash
is wormcast, but I don't remember what that was about, it was years ago).
On Monday 14 February 2011 14:17:45 Aplin, Justin M wrote:
However, I see no reason why providing an anonymous contact email would
be so hard. Certainly if you're going out of your way to avoid [insert
conspiracy of choice] in order to run a node, you have the skills to use
one of the hundreds
On Thursday 10 February 2011 21:02:15 Aplin, Justin M wrote:
I've been meaning to ask about this for awhile. Is it more helpful to
the network to have (using this example) a node running at 100KB/s for
12 h/d, or limit it to 50KB/s and have it run 24/7? At what point does
speed outweigh uptime
On Monday 07 February 2011 04:41:06 t...@lists.grepular.com wrote:
The major part of my full time job is as an email administrator.
Scrubbing headers will affect deliverability to some systems. Probably
not as much as having a Tor exit node IP in your Received headers
though. Smarthosting
On Thursday 03 February 2011 23:43:33 Robert Ransom wrote:
Add:
SafeLogging 0
to your torrc.
Thanks!
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body.
On Friday 04 February 2011 13:38:14 Joe Btfsplk wrote:
No ideas yet on what automated software that doesn't follow /robots.txt
is forbidden, means?
robots.txt is a file put on some websites as a directive to robots. If you run
a wiki, and you want only current versions, not the hundreds of
On Friday 04 February 2011 16:10:13 Joe Btfsplk wrote:
So how does that relate to Tor? Do sites using this see Tor as a
robot? I didn't even get on the site. Plus, there're no files to d/l
from it - at least not from an avg users capability.
Probably the web server saw so many accesses from
I have a friend here and we're trying to debug a TorChat connection. We had it
working once, then I'm trying to talk him through editing his config. He
doesn't show up on my TorChat, and I show up as a blue ball on his. So I
looked at the log file to see what's happening. It says Tried for 120
Currently Tor traffic is sent in packets of 512 bytes (which setevents bw
shows as 586), which makes it easy to recognize even though it's all TLS
encrypted. I propose implementing the following on each connection from one
Tor node to another:
1. Allocate a 2048-byte buffer.
2. When the relay
On Tuesday 01 February 2011 13:18:28 Andrew Lewman wrote:
There is a fine thread on or-dev about this, starting here,
http://archives.seul.org/or/dev/Jan-2011/msg00029.html
All that is about making the handshake not stand out, by using TLS
certificates and cryptographic primes more typical of
I have Konqueror 3.5.8 set up to use Privoxy and Tor. Sometimes I try to bring
up a site that's down, and I get a page generated by Privoxy. But I also get
Privoxy's favicon on some, but not all, pages of a forum I'm on. How come?
11 matches
Mail list logo