Let's try some science. We need a control, so lets create a blank
Firefox profile. This requires running firefox with a command of
'firefox -P'. This will bring up the profile window and then you can
create a blank profile and try to set your proxy to use Tor and try it
again, and then try
Thus spake M (moeedsa...@gmail.com):
On Sat, Jan 15, 2011 at 7:02 PM, Mike Perry mikepe...@fscked.org wrote:
You could also install an addon to observe the requests your browser
uses in both non-Tor and Tor accesses of this gadget to see if the
requests appear different for some
On Sun, 16 Jan 2011 06:06:11 +
M moeedsa...@gmail.com wrote:
On Sat, Jan 15, 2011 at 7:02 PM, Mike Perry mikepe...@fscked.org wrote:
You could also install an addon to observe the requests your browser
uses in both non-Tor and Tor accesses of this gadget to see if the
requests appear
This post is similar to the problems people have been having with cookies
and Gmail when using TorButton.
In this case within Gmail I enabled add any gadget by URL and then added
Twitter (https://twittergadget.appspot.com/gadget-gmail.xml).
Without Tor when I click on the Twitter icon the
Thus spake Matthew (pump...@cotse.net):
To cut a long story short after having removed TorButton, NoScript, and
HTTPS-Everywhere and therefore leaving just Tor I still cannot get Twitter
to work from Gmail. I am using Firefox.
The Twitter icon and drop-down box partially loads (but not
On 15/01/11 19:02, Mike Perry wrote:
Thus spake Matthew (pump...@cotse.net):
To cut a long story short after having removed TorButton, NoScript, and
HTTPS-Everywhere and therefore leaving just Tor I still cannot get Twitter
to work from Gmail. I am using Firefox.
The Twitter icon and
can't restart it as long as the firewall blocks all outgoing traffic
except for your entry node's IP addresses.
Is there a way to make this possible, so you can IP filter your Tor
computer and lock its connections only to your entry nodes and directory
servers?
Or is this impossible
One possible solution would be to run Tor on the firewall/router instead of
the PC/server, and configure the HiddenServicePort to point to the PC that
is running the service you want hidden.
You would also want to make sure that the firewall/router is routing all
traffic from the hidden service PC
On Thu, Oct 07, 2010 at 08:31:14PM -0400, Michael Gomboc wrote:
Hi!
If there is no back-door or bug in your VM software, how you wanna break out
of the VM?
Ever seen bugless software?
Even with root privileges you will be a prisoner within the VM.
Robert Ransom:
It depends on the VM software you are using.
I did find an interesting guide to setup a hidden service on this mailing list,
explaining how to setup Qemu on Ubuntu.
I prefer a free open source VM with the ability to run as an unprivileged user.
The title says it all:
Several people recommend running a hidden service from within a VM,
to prevent attackers from doing side channel attacks and reading off your
hardware components and serial numbers.
Then I heard that attackers can actually break out of VM's if they get root
access on it
Hikki,
From a defense in depth point of view it can help to use a VM. It is
not impossible for an adversary to break out of a VM, but if you are
using a good VM it will at least require a pretty sophisticated
attacker. I would say that using a VM would increase the security of
your hidden
Hi!
If there is no back-door or bug in your VM software, how you wanna break out
of the VM?
Even with root privileges you will be a prisoner within the VM.
Proof me wrong.
Michael
2010/10/7 hi...@safe-mail.net
The title says it all:
Several people recommend running a hidden service from
On Thu, 7 Oct 2010 18:12:45 -0400
hi...@safe-mail.net wrote:
Several people recommend running a hidden service from within a VM,
to prevent attackers from doing side channel attacks and reading off your
hardware components and serial numbers.
Using a VM doesn't prevent most side-channel
On Thu, Oct 07, 2010 at 08:31:14PM -0400, michael.gom...@gmail.com wrote 2.8K
bytes in 78 lines about:
: If there is no back-door or bug in your VM software, how you wanna break out
: of the VM?
That's a perfect world that doesn't exist. The VM software will have
bugs, someone will exploit it.
Hi,
With the recently released of Safari 5, its now possible to write
extensions in HTML / CSS. It would be nice to know whether the browser
API exposed by Apple is capable of allowing / exposing the Browser
requests to a Socks Proxy (for Tor). Ie like FoxyProxy, TorButton etc
does for Firefox
Hi James,
Tor are not made for Bitorrent, E2DK etc you will overload the network and
don't will have any speed.
So please look about I2P or Bitblinder project for such things
signature.asc
Description: This is a digitally signed message part.
Actually, you can use a donkey client with tor but it will be useless:
you'll end up as a leech with no one being able to connect to your
real ip address.
On a side note, I'm not too sure about the burden of a torified donkey
client: leeches get really slow download speeds.
--
Sent from my
- Original Message
From: Marco Bonetti si...@slackware.it
To: or-talk@freehaven.net or-talk@freehaven.net
Sent: Sat, March 27, 2010 1:18:07 PM
Subject: Re: Is it possible to use eDonkey clients with the Tor?
Actually, you can use a donkey client with tor but it will be useless
I find in the Tor-wiki only information concirning its using with
BitTorrent clients.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
http://www.nokia.ru/products/phones/nokia-n900/specifications
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
I have the n800 and I did not try tor on it, but I'm sure that it'll
work if you try this package:
http://maemo.org/downloads/product/OS2008/easy-deb-chroot/
I have it installed and I do use almost everything :)
James Brown wrote:
http://www.nokia.ru/products/phones/nokia-n900/specifications
to DOS directory authorities with millions of reject and/or accept lines in
a node config?
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body.
for ports 443, 465, 563, 993, 995
(https, ssmtp, nntps, imaps, pop3s) only, but this is not possible.
What's the reason behind this? Is there any chance to loose this
restriction in one of the next releases?
and allows exits to at
least one /8 address space.
I would like to setup my ExitNode for ports 443, 465, 563, 993, 995
(https, ssmtp, nntps, imaps, pop3s) only, but this is not possible.
What's the reason behind this? Is there any chance to loose this
restriction in one of the next releases
Karsten Loesing wrote:
Feel free to configure your node to exit to those 5 ports only. That
makes your node an exit node for connections to those ports.
Your node won't get the Exit flag, though, but that's not required for
being an exit node. The Exit flag is used by clients for path
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/09/2009 01:38 PM, Gitano wrote:
It's unlikely that the criteria you pasted above will be changed. There
need to be some criteria, and if almost every node matches them, the
flag would be useless.
Ok, but adding one more 'secure' port
to the 1 GB/s campus backbone net,
but it is attached via a 100 Mb/s router, so the reported data rate is four
to five times the rate physically possible due to the router's limitation.
The server, according to its operator, is running on a 2.6 GHz P4, and its
descriptor says the machine is running
Hi,
On Wed, Sep 10, 2008 at 07:16:46AM -0500, Scott Bennett wrote:
It appears that mnl was not actually down. It may be experiencing
some network connection problems. Its operator mentioned that he had
been unable to log into it over the weekend, but when he came in on
Monday, it was
, so the reported data rate is four
to five times the rate physically possible due to the router's limitation.
The server, according to its operator, is running on a 2.6 GHz P4, and its
descriptor says the machine is running LINUX. Based upon postings quite a
while back from blutmagie's operator
is attached to the 1 GB/s campus backbone n=
et,
but it is attached via a 100 Mb/s router, so the reported data rate is fo=
ur
to five times the rate physically possible due to the router's limitation.
The server, according to its operator, is running on a 2.6 GHz P4, and its
descriptor says
On Wed, Sep 10, 2008 at 7:28 AM, Scott Bennett [EMAIL PROTECTED] wrote:
The fact of not being an exit node would make it a better corruped
relay? I mean, if I would like to DOS the Tor network I would be better
No, or at least I don't think so. What I was referring to is that most
of the
On Wed, Sep 10, 2008 at 03:09:35PM +0200, Domenico Andreoli wrote:
Due to other reasons this morning it was offline and I've been unable
to mail too. I am recovering a couple of messages I sent yesterday on
this ml which have been dropped becaouse (I guess) wrote them with the
wrong From email
On Wed, Sep 10, 2008 at 1:53 PM, Olaf Selke [EMAIL PROTECTED] wrote:
... 10% less than the bw data collected by mrtg
i'd be curious to compare number of packets with the observed
bandwidth; how much of that 10% is TCP/IP protocol headers that aren't
visible to Tor's bandwidth accounting (which
On Wed, 10 Sep 2008 07:46:51 -0600 Kasimir Gabert [EMAIL PROTECTED]
wrote:
On Wed, Sep 10, 2008 at 7:28 AM, Scott Bennett [EMAIL PROTECTED] wrote:
The fact of not being an exit node would make it a better corruped
relay? I mean, if I would like to DOS the Tor network I would be better
On Tue, Sep 09, 2008 at 05:15:15AM -0500, Scott Bennett wrote:
bandwidth 5242880 10485760 52239166
--- ~48.8 MB/s (!)
Wow. Nice! :)
And, as you say, unlikely to be true.
All of the above leads me to suspect two things. One is that there may
be some
On Tue, 9 Sep 2008 06:42:02 -0400 Roger Dingledine [EMAIL PROTECTED]
wrote:
On Tue, Sep 09, 2008 at 05:15:15AM -0500, Scott Bennett wrote:
bandwidth 5242880 10485760 52239166
--- ~48.8 MB/s (!)
Wow. Nice! :)
And, as you say, unlikely to be true.
the reported data rate is four
to five times the rate physically possible due to the router's limitation.
The server, according to its operator, is running on a 2.6 GHz P4, and its
descriptor says the machine is running LINUX. Based upon postings quite a
while back from blutmagie's operator and from
Kasimir Gabert wrote:
Would you mind looking over the new
router detail page and seeing if it looks reasonable to you? You can
view it at
http://trunk.torstatus.kgprog.com/router_detail.php?FP=795513a52e5155af5e36937d5a7c76d3bf20d0c4
Sir, Yes Sir!
It appears to be slighly below my mrtg
Hello !
I would like to know if it's possible to establish a keep-alive HTTP
connection-type using Polipo with Tor. I'm currently using Privoxy with Tor,
which can only provide close connection-type according to the HTTP Headers.
Thanks !
David Magnus
On Thu, August 14, 2008 13:39, hgiuh ghj wrote:
I would like to know if it's possible to establish a keep-alive HTTP
connection-type using Polipo with Tor.
according to
http://www.pps.jussieu.fr/~jch/software/polipo/polipo.html#Persistent-connections
, yes.
--
Marco Bonetti
Slackintosh Linux
when I was using vidalia 0.1.5 (compiled from
source] on the previous 0.2.0.26-rc version of Tor.
Is it possible that some error might have occurred when I was
compiling from source or could this possibly be some other kind of
error/bug?
Everything else in tor-0.2.0.28-rc vidalia 0.1.5 seems
In fact, some authorities do view the traffic. For example, China is
viewing the traffic coming in and
out of the border, and blocking the connections when sensitive content
occurs. So far as I know,
as there are so many people viewing the sensitive contents through
kinds of proxies like Tor,
of network
is slim. However my understanding is that it would be possible for an
attacker to view traffic at their ISP in this country, and also the
traffic coming out in the US, and tell who was visiting what because
of the timing.
My question, assuming I am correct that this is possible, is: What
On Tue, 06 May 2008 14:08:48 -0400 [EMAIL PROTECTED] wrote:
@Scott:
Yes. Pick some U.S.-based exit nodes, and use the .exit notation you
referred to above. It means choosing your exits by hand, rather than
letting tor do that, but it will get you to the exit you want, provided
that
#ComparisonProxyAggregators
so ... is what I'm looking for possible?
and assuming it is ... is there any prospect that TOR would be able to
deliver enough throughput for effective streaming?
ANSWER: YES!! (google video works) so did http://www.pandora.com/
(streaming radio - not available non-US
On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote:
Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400 (in
part):
Please forgive me for not doing more thorough research before
emailing. I'm not part of the Tor community and not really
interested in getting too
Subject: Spoofing location - possible?
Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400
(in part):
Please forgive me for not doing more thorough research before
emailing. I'm not part of the Tor community and not really
interested
in getting too into it. I'm just
On Tuesday 06 May 2008 13:40:34 Geoffrey Goodell wrote:
On Tue, May 06, 2008 at 07:04:38AM -0400, [EMAIL PROTECTED] wrote:
Jamie McCarthy [EMAIL PROTECTED] said on May 05, 2008 12:38 -0400 (in
part):
Please forgive me for not doing more thorough research before
emailing. I'm not part
Geoffrey Goodell [EMAIL PROTECTED] said on May 06, 2008 8:40
-0400 (in part):
me: I came to TOR looking not so much for the ability to surf anonymously
but to convince my end target that I'm from a particular country.
Primarily to allow use of streaming media (radio and video) from sites
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Yes, you can spoof geolocation with Tor. You just need to pin your exit
node to one in the area you'd like.
1. Dig through a Tor directory to find a suitable exit node.
2. Put something like this in your torrc:
ExitNodes
Watson Ladd wrote:
Anon Mus wrote:
This question is for those with the knowhow.
A while back I got a number of emails from the same source where the
emails were sent in pairs a minute or less apart.
The first of each of the email pair were large (over
700characters), the second were
). My guess is that my contact was in fact an intelligence
(probably British with the help of the USA) plant out there pretending
to be a (British) activist with a grievance.
My question is, is this email pair (of vastly differing sizes) a
possible attack method on a Tor user, by somehow watching
On Fri, Jan 11, 2008 at 04:02:28PM -0600, Jon McLachlan wrote:
(please correct me if I'm incorrect but...)
if the adversary controls your entry-guard (which is nearly impossible
to detect and considered a 'strong' adversary)
if the adversary controls input to your tunnel (like text in an
Am Freitag, den 11.01.2008, 09:44 -0800 schrieb Anon Mus:
This question is for those with the knowhow.
A while back I got a number of emails from the same source where the
emails were sent in pairs a minute or less apart.
The first of each of the email pair were large (over
thetor network in the
suspected country of connection origin.
e.g.
in the suspected country of origin filter traffic
- by time band
- by tor network node source
- by packet size pattern
and you get a list of possible IP's who could be the suspect.
Do this a couple of times
Anon Mus wrote:
This question is for those with the knowhow.
A while back I got a number of emails from the same source where the
emails were sent in pairs a minute or less apart.
The first of each of the email pair were large (over 700characters),
the second were small (under 50
a second torrc which I can pass to Tor as starting
parameter on command line.
Is this possible ?
Or is there a work around for this ?
Ben
having to manually edit the
one and only torrc
I would appreciate to have a second torrc which I can pass to Tor as starting
parameter on command line.
Is this possible ?
Or is there a work around for this ?
Ben
Hi,
I will try to make a really really small OS. All it should do is running
IceCat(Firefox) and maybe Sylpheed and Gajim. The reason is I wanna test a
little bit with running this OS in a vmware and sending all traffik of this
child-system over Tor. So the OS just needs to run within a
on command line.
Is this possible ?
Or is there a work around for this ?
Ben
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHeTY/p8EswdDmSVgRAisVAJ4te9vUpY5Z6knDxEALxVZ6Gp7PqgCcDdrD
eizVA7xNgIRX0ASLCaBcsTA=
=Bfmn
-END PGP SIGNATURE-
Like JanusVM?
On Dec 31, 2007 9:43 AM, kazaam [EMAIL PROTECTED] wrote:
Hi,
I will try to make a really really small OS. All it should do is running
IceCat(Firefox) and maybe Sylpheed and Gajim. The reason is I wanna test a
little bit with running this OS in a vmware and sending all traffik
On Mon, 31 Dec 2007 15:37:01 -0800
Kyle Williams [EMAIL PROTECTED] wrote:
Like JanusVM?
No JanusVM gives me an VPN to tunnel through. I wanna have an easy parallel
system. Like using my normal linux system as ever and using my secured one just
for surfing but this really secure.
--
kazaam
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ben Stover wrote:
Can I start Tor with a second, individual torrrc configuration file?
In general I want to use the original torrc. But occasionally I want to use
e.g. specific exit nodes.
So I must use a modified torrc. Instead of always
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
kazaam wrote:
On Mon, 31 Dec 2007 15:37:01 -0800
Kyle Williams [EMAIL PROTECTED] wrote:
Like JanusVM?
No JanusVM gives me an VPN to tunnel through. I wanna have an easy parallel
system. Like using my normal linux system as ever and using
When I start Tor, then 3 icons appear in the SysTray of WinXP:
1 for Tor
1 for Pivoxy
1 for Vidalia
If I want to exit all 3 programs I have to exit them all 3 individually, one
after the other:
Is there a way to exit them all 3 at once with only 1 click ?
Ben
On Sat, Dec 29, 2007 at 11:07:39AM +0100, [EMAIL PROTECTED] wrote 0.3K bytes in
15 lines about:
: Is there a way to exit them all 3 at once with only 1 click ?
They are three separate programs. Therefore, three separate clicks are
needed. Someday in the future we may tie them all together.
--
I want to install Tor + Pivoxy on an USB stick and run it on multiple computers
on demand.
Is this possible?
I guess I have to install + start the Tor service on every new computer again.
How do I do that without re-installing whole Tor + Pivoxy again?
Regards
Ben
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ben Stover wrote:
Is this possible?
For win32 enviroments: http://portabletor.sourceforge.net/
You could, however, build static versions of both tor and privoxy and
carry them around.
ciao
- --
Marco Bonetti
Slackintosh Linux Project Developer
In the last couple of days, I've noticed my tor server maxing out the
transmit side (~110-~115 KB/s) of my ADSL while typically using 10 KB/s of
the receive side, usually for long periods of time. Curious about this oddity,
I began looking at netstat output more frequently to see what was
)
It sounds mighty suspicious, in my opinion.
If I recall correctly, directory mirroring is based on HTTP (hence, why
it's encouraged to host it on port 80 for fascist firewalled folks, if
at all possible). Therefore, it would be vulnerable to any fundamental
attack (i.e., based on the nature of TCP
While it feels like it kinda defeats the purpose with tor, is it
possible to have favorites to connect through?
Sometimes I need a US ip, sometimes another country. And it feels
redundant to click the new identity till I get one that is.
I just started using tor, together with foxy proxy
good idea, but why not trusted friends as stable connections for an entry
point of the tor network?
- Tor as a plugin of http://retroshare.sf.net
please evaluate it.
2007/12/9, Christian Westlund [EMAIL PROTECTED]:
While it feels like it kinda defeats the purpose with tor, is it
possible
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michael Schmidt wrote:
good idea, but why not trusted friends as stable connections for an entry
point of the tor network?
For what I know (I'm not a developer) limiting the possibilities of
entry/middleman/exit nodes is always a bad thing(tm) for
not default, but as an option to choose that tunnel to/of a friend,
connect if you like to favourites = or trusted friends
if not, then choose a random peer.
2007/12/9, Marco Bonetti [EMAIL PROTECTED]:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michael Schmidt wrote:
good idea, but why
I have a question regarding attacks on tor. From what I understand, if
somebody were to obtain the private key of a hidden server, they would
be able to serve requests as that server. My question is: If there are
two servers running with the same private key on the Tor network, what
determines
http://tor.eff.org/svn/trunk/doc/design-paper/blocking.pdf
It seems to me that the most difficult things are 1) to ensure that a user
in a blocked country always has access to a bridge, and 2) proving that
bridges are useful.
1) It seems a user needs to know at least two working bridges in
On Sat, 13 Jan 2007 19:41:57 +0800, Kevin Smith [EMAIL PROTECTED] said:
Why hasn't Tor been blocked in China already? Torpark is redirecting
Two explanations:
1 - They need it for own use, field agents inside china to field agents in
foreign countries. An easy way to not have to go by embassy
On 2007-1-15 11:38 CST(UTC+8), Kevin Smith wrote:
When a page is blocked it usually looks like it has timed out. I'm not
clear as to how the blocking works. It seems that sensitive keywords
in a webpage trigger the firewall to send a TCP reset to both the
client and the server(1), but I do not
I have never heard that the Tor website http://tor.eff.org/ has been
blocked in China, nor any URLs under that website. It is currently not
blocked by my ISP in Beijing, nor was it blocked by my ISP in Shandong
province when I lived there.
I was, however, referring to the Tor service itself, not
Kevin Smith wrote:
I have never heard that the Tor website http://tor.eff.org/ has been
blocked in China, nor any URLs under that website. It is currently not
blocked by my ISP in Beijing, nor was it blocked by my ISP in Shandong
province when I lived there.
I was, however, referring to the
I wonder if it's just an oversight that tor.eff.org hasn't been blocked
in your case?
I don't think it is an oversight that tor.eff.org has not been blocked
in my case. I have never heard of the Tor site being blocked anywhere
in China. My friends in Beijing, Shanghai and Shandong province are
On 2007-1-13 4:44 CST(UTC+8), Mike Perry wrote:
I live in China and was/am having difficulties in using Tor, the problem
is: it takes quite a long time to build a circuit for the first time I
start Tor on my Windows machine.
Am I understanding correctly? Are there any actions Tor can take?
Why hasn't Tor been blocked in China already? Torpark is redirecting
to the Google homepage (1). The psiphon homepage has been blocked. The
Freegate homepage is blocked. Why not Tor?
Could it be that Tor is being used to help identify suspected
dissidents? Consider the following:
I'm sitting at
On Sat, Jan 13, 2007 at 07:41:57PM +0800, Kevin Smith wrote:
Why hasn't Tor been blocked in China already? Torpark is redirecting
to the Google homepage (1). The psiphon homepage has been blocked. The
Freegate homepage is blocked. Why not Tor?
My guesses, in order of ease-of-explanation:
A)
Why hasn't Tor been blocked in China already?
My guesses, in order of ease-of-explanation:
A) There are perhaps 3 people in China running Tor clients right now,
according to my rough estimates. That's roughly zero people, in China.
B) The general perception of Tor is that it's a tool
.
[...]
When a client has no live network-status documents, it downloads
network-status documents from a randomly chosen authority.
Well, Tor will finally recover here when the fibers are repaired. But
this reminds me of a possible attack against the Tor network, say
At 04:41 AM 1/12/2007, Pei Hanru wrote:
Well, Tor will finally recover here when the fibers are repaired. But
this reminds me of a possible attack against the Tor network, say, if
the notorious Great Firewall of China blocks *all* the connections to
*all* the directory authorities (currently 5 I
Thus spake Pei Hanru ([EMAIL PROTECTED]):
Hi all,
I live in China and was/am having difficulties in using Tor, the problem
is: it takes quite a long time to build a circuit for the first time I
start Tor on my Windows machine.
Am I understanding correctly? Are there any actions Tor can
Did anyone else get these?
Me too, the funniest thing is: Your registered name is included to show
this message originated from eBay But the name isn't included ;-)
greetings,
Ricky.
signature.asc
Description: Dies ist ein digital signierter Nachrichtenteil
Maybe slightly off topic (btw, is OT = Off Topic or On Topic?)
but because I newer had anything to do with eBay and still get this,
perhaps other on this list also received it as some strange effect
of being into this list, where any member see all others addresses?
The following email
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tuesday, October 31, 2006 at 2:00:44 PM
in Message [EMAIL PROTECTED], Total wrote:
Maybe slightly off topic (btw, is OT = Off Topic or On Topic?)
but because I newer had anything to do with eBay and still get this,
perhaps other on this list
On Tue, 2006-10-31 at 15:00, Total Privacy wrote:
The following email appeared two times (25 and 26 octobre) sent from
[EMAIL PROTECTED] with a subject of Security Service Notification.
Both have exactly the same content,
They are bogus. I got exactly the two same emails and reported the
Just a side-note:
Please take the time to report these at:
http://www.castlecops.com/pirt
Cheers,
- ferg
-- George Shaffer [EMAIL PROTECTED] wrote:
On Tue, 2006-10-31 at 15:00, Total Privacy wrote:
The following email appeared two times (25 and 26 octobre) sent from
[EMAIL PROTECTED]
Hi,
if it possible to add an option which allows to shrink memory buffers
immediatly if they are not full? [1]
I run an Tor server on a virtual server in which the amount of RAM is
the bottleneck of this system.
Since ~ 3 weeks i measure the resident memory allocation and the
corresponding
On Thu, May 11, 2006 at 09:21:05PM +0200, Joerg Maschtaler wrote:
Hi,
if it possible to add an option which allows to shrink memory buffers
immediatly if they are not full? [1]
I don't think you would want that; the CPU usage would be *insanely*
high. Every time you transmitted any
of this memory.
(Although your buffer-shrinking would help reduce that
maximum-allocated-size.)
-Ben
Nick Mathewson wrote:
On Thu, May 11, 2006 at 09:21:05PM +0200, Joerg Maschtaler wrote:
Hi,
if it possible to add an option which allows to shrink memory buffers
immediatly if they are not full
wrote: Hi,
if it possible to add an option which allows to shrink memory buffers immediatly if they are not full? [1] I don't think you would want that; the CPU usage would be *insanely*
high.Every time you transmitted any information at all, you'd need to shrink the buffer, and then immediately
98 matches
Mail list logo