Hi everyone,
Is there a limit to how many exit nodes we can run?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 10/9/14, 8:21 AM, Eric Hocking wrote:
Hi everyone,
Is there a limit to how many exit nodes we can run?
___ tor-relays mailing
list tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Let me see
Agreed with the above. If you run more than a single exit I would
further recommend that you try to diversify the exit location, IP ranges
and ISP if you can. That's not a huge issue if it's only a few servers
being run, but if you begin to process over 125MB/s of traffic overall,
it's best to
On 10/09/14, Alexander Dietrich wrote:
On 2014-10-08 23:30, Yawning Angel wrote:
obfs4proxy has both armel and armhf packages in unstable. The armel
packages should work, the armhf packages will not.
Installing the armel package fails because the Pi is armhf (or thinks it
is).
I tried
Hi Folks,
I am trying to figure out how the packet flows over a Tor network.. There is a
mix of information.. Some claim that the ISP is not aware of the payload as the
complete data is encrypted whereas some say that your ISP is not used at all
when using Tor network. AFAIK my packets go to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I am trying to figure out how the packet flows over a Tor network.. There is
a mix of information.. Some claim that the ISP is not aware of the payload as
the complete data is encrypted whereas some say that your ISP is not used at
all when using
Also a quick question jumped in.. Say i have a Raspberry PI which is converted
to a TOR router and i connect my machine to this router. Will this make the
entire traffic go via TOR including something as simple as a ping request. Say
i ping a machine on the web, will it stay anonymous or i will
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Thats a ton of information which is very much simplified..
Specially the graphics ;)
Anytime.
I have a clear understanding now.. So what i figured is as far
as my ISP goes, he only knows that i am using Tor, period.
Anyone who can monitor both
Hi everyone.
I am currently operating 4 bridges on VPSs. They all appear to working
correctly. However, 2 of the 4 bridges have 0kb/s as their advertised
bandwidth while the other two are advertising around 100KB/s.
Is there a reason for the 0kb/s? Does this indicate an error in my bridges
or
I believe that error means obfsproxy was either not installed correctly or
your torrc is not pointing to the correct location. Follow the below link's
instructions.
Also, a quick google search for that error provided resukts from this
mailing list. Follow its instructions as well.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
Am 2014-10-09 um 22:11 schrieb Tor Zilla:
Also a quick question jumped in.. Say i have a Raspberry PI which
is converted to a TOR router and i connect my machine to this
router. Will this make the entire traffic go via TOR including
something
Thanks Chris,
I will check the links.. :)
Looks like TOR is still going through a development phase which is a good thing
Thanks,
Torzilla11
Date: Thu, 9 Oct 2014 22:58:06 +0200
From: christ...@ph3x.at
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Need Routing Info on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I don't know whether introductions are hopelessly old school on this
list, but here's a brief one. Although I've used Tor for many years,
it's been just about a year since I decided to understand it better.
I've also been catching up on the
In planning how to configure Tor relays, I've been considering various
known attacks. Most involve systemic issues about design and
implementation, and so aren't relevant to relay configuration. But there
is one that seems relevant, and addressable.
I've been reading the work of Sambuddho
14 matches
Mail list logo