On 2021-12-22 23:42, Gary C. New via tor-relays wrote:
I know it might be a fundamental change to the Tor network, but would it
be possible to obfuscate the Tor bridge/relay addresses with their
respective fingerprints; similar, to the I2P network? I've often thought
that this aspect of the
On 2021-04-23 08:49, Toralf Förster wrote:
On 4/23/21 2:03 PM, Matt Traudt wrote:
Keeping tor up to date, and the OS and all the other things installed on
it up to date, is much more important than maintaining your flags.
You'll get them back.
IMO relays with a way too long uptime should get
One other possibility if you can't work through any issues, Windows 10
has fairly decent Linux support, and/or consider running a lightweight
Linux in a Hyper-V VM (Windows 10 Pro, most flavours of Windows Server).
Neither of these are as clean as running natively in Windows, but when a
On 2019-04-04 10:02, Conrad Rockenhaus wrote:
Hello,
I have a FreeBSD box on a 1 Gbit/s connection. I'm trying to determine
if we need more high speed relays or high speed exit relays. The AS
it's on has no plain relays, just exit relays. That's what has me
wondering what to do.
So, what is
On Thu, Mar 28, 2019, at 06:28, Lars Noodén wrote:
> On 3/28/19 11:14 AM, Georg Koppen wrote:
> > Lars Noodén:
> >
> > [snip]
> >
> >> But about the problematic layout that now exists, in general, the CSS
> >> media rule mixes all types of screens together regardless of
> >> orientation, aspect
On 2019-03-27 16:34, Mirimir wrote:
On 03/27/2019 09:10 AM, Ralph Seichter wrote:
Not sure if this is the right place to vent, but here goes:
Whoever changed the Tor website's design seems to a) have a serious
vision impairment and b) done his utmost to hide access to the Tor
source code.
I
Perhaps it would be better to outright ban these relays with no warning? I'm
sure that annoying those donating multiple relays will absolutely be encouraged
to continue doing so.
(Or to be less sarcastic: I don't operate any tor relays at this time, but I do
run public mirrors and a few other
On 2018-09-22 06:24, Ralph Seichter wrote:
On 22.09.18 05:32, Dave Warren wrote:
Send a message through the list's outbound SMTP server that looks like
a list message [...]
Why this won't work has already been discussed. Please check earlier
messages in this thread.
Can you point it out? I
On 2018-09-21 08:57, Ralph Seichter wrote:
On 21.09.18 16:40, Dave Warren wrote:
It would be fantastic if the list operators were to track this down
and kill it off.
Imagine an address A subscribed to this mailing list in a read-only
fashion (a.k.a. "lurker"). A uses list posts a
It would be fantastic if the list operators were to track this down and kill it
off. My guess is that there is an address subscribed which receives the list
and triggers the spam to be sent (at least based on seeing this type of thing
on a few other lists over the years).
On 2018-08-23 17:56, Conrad Rockenhaus wrote:
This mainly seemed to be an issue of miscommunication - I had one party that I
was in communication with at the beginning who said that this was going to be a
perfectly okay endeavor, equipment gets plugged in, day one passes with a
couple of
On 2018-08-20 15:39, DaKnOb wrote:
HOWEVER, Cloudflare doesn’t need to hide their location. Everyone knows
their servers. So they can use single hop Onion Services, and not the
traditional three hop ones.
That means that in terms of total traffic, they will use 43 + (3*5) = ~
60 Gb/s, out of
On 2018-01-12 18:07, Paul Templeton wrote:
They got into my Facebook page (Haven't used it for years) - Seems that they
got access via really old personal questions that family have provided them via
their online posts - ie happy birthday now that you are this old... and hows
your dog m
On 2018-01-09 13:33, yl wrote:
On 08.01.2018 11:21, Florentin Rochet wrote:
Yes, if the HS operator does not want to mask the HS location, then it
is all good. For that purpose, I agree that the warning message should
be changed.
So assuming I just want to run SSH on some port on an .onion
On 2018-01-08 16:08, Roger Dingledine wrote:
On Mon, Jan 08, 2018 at 03:59:25PM -0700, Dave Warren wrote:
Even if Tor didn't supply any relay
statistics, a curious and enterprising individual could "explore" by seeing
what happens to a particular onion when one launches a DoS atta
On 2018-01-08 19:54, Alain Wolf wrote:
I think the real issue here is once more the wording "hidden service"
for something which is, in your case, not intended to be hidden.
I believe thats why the term "Onion Service" was introduced.
Indeed. I use Onion Service when starting a conversation,
On 2018-01-08 14:09, Tortilla wrote:
On Mon, January 8, 2018 11:25 am, Dave Warren wrote:
On 2018-01-08 03:21, Florentin Rochet wrote:
Perhaps in the case that the HS operator is not trying to mask the HS
location, the act of mixing public relay traffic can be nothing but a
*help* to defeat
On 2018-01-08 03:21, Florentin Rochet wrote:
Perhaps in the case that the HS operator is not trying to mask the HS
location, the act of mixing public relay traffic can be nothing but a
*help* to defeat anyone trying to correlate traffic coming to the HS with
traffic emanating from any one
On Wed, Nov 22, 2017, at 15:59, tor wrote:
> I wouldn't recommend Quad9 (9.9.9.9) for personal use either.
>
> During some very brief testing I ran into performance issues like 1500 ms
> response times and UDP timeouts.
>
> Also, via the Global Cyber Alliance, there is quite a bit of partnership
Also, unsubscription requests require you to confirm the request, so you
can't unsubscribe someone else by entering their address.
On Wed, Mar 29, 2017, at 00:34, Dave Warren wrote:
> Why not unsubscribe yourself? You figured out how to subscribe, you
> can figure out how to unsub
Why not unsubscribe yourself? You figured out how to subscribe, you can
figure out how to unsubscribe.
The first step is to click the link in the footer of every single
message, then look for "To unsubscribe from tor-relays"
On Wed, Mar 29, 2017, at 00:31, Nicholas K S Cullen wrote:
>
On Tue, Mar 28, 2017, at 23:24, John Ricketts wrote:
> All,
>
> Any suggestions short of a restraining order?
>
> That was one of the most bizarre interactions I have ever had with anyone
> on the internet.
"If you would like me to block other Tor users from using my exits to
contact your
On Tue, Jan 10, 2017, at 21:09, Rana wrote:
> Wow. I offer to maintain a FAQ for small relays and in return I get this.
> Unsubscribed.
While the FAQ could have been useful, if being asked to learn how to
post properly on a mailing list causes an instant flameout, I wonder
whether the FAQ would
collecting anything and
everything they can.
If you have a different threat model, that's fine, use Tor and the
internet appropriate to your needs.
On Thu, Dec 8, 2016, at 00:22, Duncan Guthrie wrote:
> Well, apart from using Facebook...
>
> On 8 December 2016 7:51:09 am GMT+00:00, Da
I agree 100%. And yet, it's still useful for those who don't have
anything to fear from using Tor, but still want the privacy and security
from the last mile.
On Wed, Dec 7, 2016, at 23:45, Duncan Guthrie wrote:
> The problem with Facebook is that their policies on real names
> somewhat goes
On 2016-12-07 05:41, Rana wrote:
By the way, I just checked, Gmail works without problems over Tor (both Web and
IMAPS).
Using Gmail over Tor when they already know who you are is self-defeating. Try
to register an anonymous Gmail account using Tor.
Doable. They require a phone number for
On 2016-12-07 07:20, Rana wrote:
We will never know the breakdown of the Facebook users by the reason why they
use Tor. However, surely many of them are under repressive regimes and do not
want their ass kicked for what they write on Facebook. Protecting them is fine
purpose and anyhow, Tor
On Sat, Oct 1, 2016, at 04:54, Sheesh wrote:
> Hello!
> I'm running a non-exit relay on my VPS with small amount of
> traffic/month. That means my advertised bandwidth is ~500 KB/s. I got a
> new VPS where I want to let a relay run with several MB/s - My question
> now is: should I let the slower
Nope. You get root, so with a bit of creativity you could probably do
whatever you want, but I don't think DO officially supports installing
your own OS (and they might make assumptions about your OS version that
cause you issues later)
On Mon, Sep 12, 2016, at 21:20, Petrusko wrote:
> No way to
On Sun, Sep 11, 2016, at 06:53, Ralph Seichter wrote:
> On 11.09.2016 14:30, Markus Koch wrote:
>
> > So around 90 terabyte a month for $5. Seems fair :)
>
> Yeah, it does, doesn't it... ;-) Leaves me with figuring out what Linux
> distro to use, as D.O. does not offer Gentoo. Debian or Ubuntu?
On 2016-09-06 11:29, Green Dream wrote:
The whole idea doesn't sit right with me.
For one, I'm not sure I'd want any more Five Eyes entities running
Exit nodes. Most embassies are already a haven for espionage activity.
You'd pretty much have to assume they'd be sniffing the exit traffic.
All
On Mon, Sep 5, 2016, at 11:24, Kenneth Freeman wrote:
>
>
> On 09/04/2016 07:31 PM, Mirimir wrote:
> > On 09/04/2016 09:11 AM, Kenneth Freeman wrote:
> >> Do embassies and consulates run Tor nodes? AFAIK no studies have been
> >> done on this, but diplomatic immunity and Tor would seem to be a
ementioned gov't agent more
than one or more ISPs setting up their own network of high capacity exit
nodes.
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
___
tor-relays mailing list
tor-relays@lists.torproject.org
https:
,
which will likely not be possible if they did actually violate the
agreement (and it won't be worth their time for a small amount of money
anyway)
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
___
tor-relays mailing list
or high value target)
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
up via Tor, abuse the nick until it's burned and move on.
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
and share some otherwise unused
resources, not to buy new servers to dedicate to Tor. While we're also
debating sponsoring or operating exit nodes, they will be on dedicated
servers in Tor friendly environments.
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
and/or found a business model that doesn't involve selling
their users as product)
--
Dave Warren
http://www.hireahit.com/
http://ca.linkedin.com/in/davejwarren
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin
38 matches
Mail list logo