Re: 25 tbreg relays in directory

2009-07-01 Thread Jim McClanahan
Scott Bennett wrote: On Mon, 29 Jun 2009 07:13:42 -0600 Jim McClanahan jimmy...@copper.net Scott Bennett wrote: On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan jimmy...@copper.net wrote: Scott Bennett wrote: Ouch. This provides another example in support of

Re: Firefox video tag

2009-07-01 Thread Marco Bonetti
On Wed, July 1, 2009 00:02, Erilenz wrote: Firefox 3.5 was released today. Has anyone investigated the new video tag that it supports with regards to whether or not it can cause leaks with Tor? I wrote some ideas (in italian) on it some time ago, for e-Privacy 2009:

Re: Firefox video tag

2009-07-01 Thread Erilenz
* on the Tue, Jun 30, 2009 at 09:56:05PM -0400, Gregory Maxwell wrote: Firefox 3.5 was released today. Has anyone investigated the new video tag that it supports with regards to whether or not it can cause leaks with Tor? video and audio should have exactly the same attack surface as img

Re: @Scott Bennett

2009-07-01 Thread Scott Bennett
On Tue, 30 Jun 2009 21:34:38 +0200 Ansgar Wiechers t...@planetcobalt.net wrote: On 2009-06-30 Scott Bennett wrote: On 2009-06-30 Scott Bennett wrote: On Tue, 30 Jun 2009 03:14:29 -0600 Jim McClanahan wrote: Ah, I see. It is the duplicate messages from you that were confusing me. Why

Re: @Scott Bennett

2009-07-01 Thread Ansgar Wiechers
On 2009-07-01 Scott Bennett wrote: On Tue, 30 Jun 2009 21:34:38 +0200 Ansgar Wiechers wrote: On 2009-06-30 Scott Bennett wrote: On 2009-06-30 Scott Bennett wrote: Just standard netiquette for followups to messages posted on mailing ^^^ What about it? Had you taken

Re: @Scott Bennett

2009-07-01 Thread Scott Bennett
On Wed, 1 Jul 2009 16:06:52 +0200 Ansgar Wiechers t...@planetcobalt.net wrote: On 2009-07-01 Scott Bennett wrote: On Tue, 30 Jun 2009 21:34:38 +0200 Ansgar Wiechers wrote: On 2009-06-30 Scott Bennett wrote: On 2009-06-30 Scott Bennett wrote: Just standard netiquette for followups to

Re: 25 tbreg relays in directory

2009-07-01 Thread Edward Langenback
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jim McClanahan wrote: Scott Bennett wrote: On Mon, 29 Jun 2009 07:13:42 -0600 Jim McClanahan jimmy...@copper.net Scott Bennett wrote: On Mon, 29 Jun 2009 05:14:25 -0600 Jim McClanahan jimmy...@copper.net wrote: Scott Bennett wrote:

Re: General question about exit policies...

2009-07-01 Thread Bill McGonigle
On 06/30/2009 10:20 PM, Michael wrote: accept *.google.com:80 thinking aloud... What if: o Google was supportive of good uses of Tor, for its services o Google ran an exit in its IP space(s) matching the exits as masked above o Tor had a method to back-propagate signed kill commands based

Re: @Scott Bennett

2009-07-01 Thread Ansgar Wiechers
On 2009-07-01 Scott Bennett wrote: On Wed, 1 Jul 2009 16:06:52 +0200 Ansgar Wiechers wrote: On 2009-07-01 Scott Bennett wrote: Once again your presumption is mistaken. I had indeed read that gloriously opaque stretch of text, though it has been a while since I last suffered through it.

Re: @Scott Bennett

2009-07-01 Thread Nils Vogels
Ansgar, Scott, On Wed, Jul 1, 2009 at 7:27 PM, Ansgar Wiechers t...@planetcobalt.net wrote: On 2009-07-01 Scott Bennett wrote: On Wed, 1 Jul 2009 16:06:52 +0200 Ansgar Wiechers wrote: On 2009-07-01 Scott Bennett wrote: snip discussion about netiquette Guys, this is or-talk, in your

Re: Obfuscated URLs?

2009-07-01 Thread mogulguy
--- On Tue, 6/30/09, Freemor free...@gmail.com wrote: Martin Fick mogul...@yahoo.com wrote: In my scenario, the point of hard coding the path is to obfuscate the final URL, ... ... But hidden services provide this functionality already. They provide an obfuscation to a service that

Re: Obfuscated URLs?

2009-07-01 Thread Max
use eepsite urls: www.i2p2.de On Wed, Jul 1, 2009 at 10:27 PM, mogul...@yahoo.com wrote: The alternative, remote hosting anonymously is hard,

Re: Obfuscated URLs?

2009-07-01 Thread mogulguy
--- On Wed, 7/1/09, Max petersonm...@googlemail.com wrote: On Wed, Jul 1, 2009 at 10:27 PM, mogul...@yahoo.com wrote: The alternative, remote hosting anonymously is hard, use eepsite urls: www.i2p2.de Could you please explain what you mean?  eepsites seem to be just I2P's equivalent to

Re: Obfuscated URLs?

2009-07-01 Thread mogulguy
--- On Tue, 6/30/09, Martin Fick mogul...@yahoo.com wrote: --- On Tue, 6/30/09, Karsten Loesing karsten.loes...@gmx.net wrote: On 06/30/2009 08:47 PM, Martin Fick wrote: Would it be possible to create a URL or some longer string that describes a hidden path through the tor

Re: 25 tbreg relays in directory

2009-07-01 Thread Jim McClanahan
Edward Langenback wrote: Jim McClanahan wrote: I probably should have canned the sarcasm, but I do think that any disabling of the client from the network should be easily reversible. Part of that is just my philosophy. But it also has a practical element in terms of what is required to

Re: 25 tbreg relays in directory

2009-07-01 Thread Marcus Griep
On Wed, 2009-07-01 at 17:15 -0600, Jim McClanahan wrote: I remain unconvinced that what happened in the case of tbreg should be determining policy for the Tor project, at least as far as client activity is concerned. To the extent the people who installed really didn't know it involved Tor,

Re: 25 tbreg relays in directory

2009-07-01 Thread Scott Bennett
On Wed, 01 Jul 2009 19:46:49 -0400 Marcus Griep tormas...@xpdm.us wrote: On Wed, 2009-07-01 at 17:15 -0600, Jim McClanahan wrote: I remain unconvinced that what happened in the case of tbreg should be determining policy for the Tor project, at least as far as client activity is concerned.