Spammers use other peoples hacked PCs to send messages and the 'reply to'
addresses are faked. So all in all, rather pointless...
Regards,
Tony.
From: [EMAIL PROTECTED] on behalf of Kyle Williams
Sent: Wed 30/05/2007 04:54
To: or-talk@freehaven.net
Subject
Windows has offered over 10 Gigabit throughput on a workstation (running
Windows Server 2003) since 2005...
http://www.amd.com/us-en/assets/content_type/DownloadableAssets/AMD_10_GbE_Performance_Paper_August05.pdf
Regards,
Tony.
From: [EMAIL PROTECTED
No, its just SORBS, thay havnt got a clue. Avoid with long bargepole
Tony.
From: [EMAIL PROTECTED] on behalf of Karsten N.
Sent: Fri 27/04/2007 09:03
To: or-talk@freehaven.net
Subject: Re: Tor nodes blocked by e-gold
Hi,
I have checked a few long
SORBS marks TOR servers as zombie spammers I believe.
Regards,
Tony.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Mike Cardwell
Sent: 27 April 2007 16:23
To: or-talk@freehaven.net
Subject: Re: Tor nodes blocked by e-gold
Really? In which one
It has changed since SORBS blacklisted my TOR node then. It said it was
Trojan infected or a zombie host at the time. I was told that this was
triggered by just connecting to certain IRC networks.
Maybe they have finally fixed their system.
Regards,
Tony.
-Original Message-
From
Or http://83.245.15.87/
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Brian C
Sent: 02 March 2007 16:11
To: or-talk@freehaven.net
Subject: Re: Tor server web page?
Another example of what you're looking for:
http://74.0.33.114/
Sam Creasey wrote:
I
Erm - isn't that censorship? Surely that defeats one of the main
objectives of TOR.
Once you add the capability to do that the Chinese will be blocking
BBC.COM via TOR
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Mr. Blue
Sent: 27 February 2007 20:05
To:
http://www.brainfuel.tv/wp-content/uploads/2006/06/argue.jpg
winmail.dat
For basic anonymity for bit torrent leeching try this https://www.relakks.com/
TOR doesn't have the bandwidth to spare.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of a a
Sent: 19 February 2007 19:49
To: [EMAIL PROTECTED]
Subject: Security concerning
Actually Windows does exactly the same thing. e.g. the 'Network Service' and
'Local Service' accounts. See
http://www.microsoft.com/technet/security/midsizebusiness/topics/networksecurity/securingaccounts.mspx
People seem to forget that the original and worst worm outbreak ever - that
@freehaven.net
Subject: Re: Re: PHP coder needs Tor details
On Tue, Feb 13, 2007 at 10:25:54AM -, Tony wrote:
This is offtopic, but...
Actually Windows does exactly the same thing. e.g. the 'Network
Service' and 'Local Service' accounts. See
http://www.microsoft.com/technet/security
1. a) Approx 50 metres. Depends on the environment, the cards, the
transmission power and the wireless band / standard being used.
b) No it wont extend it. You need a customised router or software that
behaves as a wireless extender to do that.
2. See www.sveasoft.com for firmware for routers
.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of coderman
Sent: 30 November 2006 18:29
To: or-talk@freehaven.net
Subject: Re: Relakks
On 11/30/06, Tony [EMAIL PROTECTED] wrote:
If they use Relakks they they can make it much harder for the US
governement to watch
Hi,
Paypal evaluate the fraud risks of user transactions for obvious
reasons. Using anonymous proxies will be more likely to flag you as a
potential fraudulent transaction or stolen account. I had the same issue
as the below - once cleared they don't seem to flag it again for the
same reason.
: [EMAIL PROTECTED] on behalf of Anothony Georgeo
Sent: Thu 08/06/2006 12:02
To: or-talk@freehaven.net
Subject: RE: SHTTPD: Windows web-server, light-weight, stand-alone and
multi-platform (Unix, etc)
Hi,
--- Tony [EMAIL PROTECTED] wrote:
Windows Server 2003 already comes with IIS6
The Tor
-platform (Unix, etc)
The other freedom that they don't mention is freedom from backdoors.
Since no one can see the MS code and verify that it is free from
government intrusion, there is good reason not to use it in an
environment where such government intrusion could be detrimental.
...Ken
Tony wrote
June 2006 00:08
To: or-talk@freehaven.net
Subject: Re: SHTTPD: Windows web-server, light-weight, stand-alone and
multi-platform (Unix, etc)
And so Code Red never existed?
On Jun 8, 2006, at 10:23 AM, Tony wrote:
That is simply not true - many people can check and review the
source code
Hi.
As the RIPA 3 is currently written there seem to be two big holes.
1. Destroy the key and retain proof that you destroyed it - eg microwave the
USB key.
It seems that the law is only really designed to cope with keys (passphrases)
that you can remember. Therefore if you have a physical
2006 17:28
To: or-talk@freehaven.net
Subject: Re: Did you see this?
On Fri, May 19, 2006 at 03:11:20PM +0100, Tony wrote:
:2. Keep multiple keys (e.g. a dummy volume).
:
:The act specifies that if there is more than one key, you can choose
which key to give up!
That just means you can revoke
They send you to prison if you don't give up the information.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Matej Kovacic
Sent: 15 May 2006 07:57
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Hi,
Under the British
Yes apparently it's not in force yet. I'm sure its coming though.
Although as currently written there seem to be a few loop holes - e.g.
you can give up 'any' key and you can choose which key just so long it
meets stated the requirements of the request. There isn't a requirement
to give up 'all
Please define 'evil activities'
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Nick Mathewson
Sent: 15 May 2006 23:59
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France +
On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm
Not to mention that under Bush, meeting the requirements of US law is
not required either. And they have certainly never worried about other
countries laws.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Eric H. Jung
Sent: 14 May 2006 03:33
To:
Talking of Microsoft; it is a claimed advantage of the new OS versions
coming out such as Longhorn server - they include 'Bitlocker' encryption
that is apparently highly secure and integrates with motherboard
chipsets (TPM modules) to provide end to end code authentication and
hardware security.
]
On Behalf Of Lionel Elie Mamane
Sent: 14 May 2006 14:58
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
So if for instance they take your disks away
Not if you didn't have them prior to receiving the notice and can prove
it.
e.g. after taking away your PC and realising it is encrypted they return
with a notice. You then hand over token and say by the way I previously
destroyed the data on it so I don't have the keys. You have met your
legal
Nb - an interesting question arises with the use of TrueCrypt, etc. that
have passkeys that can unlock different levels of data. If you have
dummy volumes and provide the passkeys to just those have you met your
legal requirements?
The implication under the RIP act is that you have.
(2) A
The whole point is that you ensure any keys are destroyed before you
receive a formal request. It not 'evidence' until its requested by the
authorities.
It is believed there is code in all major manufacturer colour copiers
and high end printers that can identify the printer serial number. It is
. In terms of using checksums to ensure your system hasn't been
tampered with, the computer hardware could have a defense system against that
such as trusted computing.
Ringo Kamens
On 5/14/06, Mike
Zanker [EMAIL PROTECTED]
wrote:
On 14/5/06 15:10, Tony wrote:
Nb-
failure
implemented a back-door for
governments. They could store the private keys and passwords in videocard
memory or in the boot sector or something like that.
On 5/14/06, Tony
[EMAIL PROTECTED] wrote:
2. The restrictions on encryption were removed some years
ago. The best encryption software comes
30 matches
Mail list logo