Richard Dennis mad_rap...@hotmail.com writes:
Hi guys,
i have been doing a bit of reading recently about hidden services, and
i am just wondering how exactly a hidden service selects its
introduction points, i understand there are two methods, one where the
H.S picks its own set of I.P's
Hi,
1* I want to know is it possible to send command from Exit node to Client?
if yes then How?
2* I also want to know is it possible to communicate with tor with other
software like snort?
Regards
kawsar
___
tor-dev mailing list
Karsten Loesing:
Dear list,
Dear Karsten!
writing documentation is hard work. I'm sure you already knew that, but
let me re-assure you that I now believe it, too. At least until I
forget it again and carelessly start documenting something else that
looks tiny and friendly and trivial to
Harmony:
I had a look through and I didn't make any drastic changes, just picked
a few small nits. I attach a patch file for your reading pleasure. Let
me know if you disagree with anything or my changes have made things
even less clear.
I attach a better patch file, following advice that I
My bad for not confirming this and not sending out a reminder to Mondays
(today's) meeting.
If you are on IRC and have something to discuss we can do it now, if not
next meeting will be December 1st at 18:00 UTC (19:00 CET).
I will be traveling at that time so I am not yet certain I will be able
Attached is a document written in the specification format for one
aspect of CA-signed .onion addresses - specifically a What is a safe
way to sign (or not sign) a statement using the .onion key It
presents a couple options - I'd love to get feedback from folks on
which they prefer.
I recognize
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I thought I'd share an initial draft of doc/HARDENING. Please share
any opinions or contributions you have. This was written in a little
more than an hour, so it's still a work in progress. However, in the
spirit of prototyping before polishing, I
Nick Mathewson ni...@freehaven.net writes:
On Sat, Nov 8, 2014 at 12:07 PM, George Kadianakis desnac...@riseup.net
wrote:
I don't expect this to be merged in mainline Tor, but if any HS
operators feel like they need it, here it is.
Make a ticket for it please, just in case?
Done. Please
nowadays using tor by botnet developers is bringing risk to tor network.
the use hidden service feature in tor network ,install their IRC server and
by hiding behind relays,packet encryption and layers of tor, control and
command botnets and use them for attacks.
1.i am researching about any