Two thoughts:
I did not see mentioned whether your Wi-fi is secured.If your running a guest
machine in a vm you will not know about the host.Have you tried booting into a
rescue DVD?
David C
Sent from my LG G Pad 7.0 LTE, an AT 4G LTE tablet
-- Original message--From:
On 11/10/2013 5:37 AM, Thomas Hand wrote:
This is true. Some websites download lists of all relays and just mass
block the ips. Its usually webmasters who have no idea how tor works
and don't realise that a middle relay poses them no threat whatsoever.
This is why education is best. If
On 11/9/2013 10:15 AM, Jon Gardner wrote:
On Nov 5, 2013, at 1:00 PM, Jan Hendrik den Besten t...@janhendrik.eu wrote:
Boy, now I am in trouble...
I run an exit node from my home address for a few weeks now, but my gf
starts complaining she cannot use Skype anymore to chat with her mum.
I
On 10/23/2013 10:09 AM, Karsten Loesing wrote:
Hello Tor relay operators,
We could use your help in a pilot project to improve Tor security. As
you may be aware, the anonymity of a connection over Tor is vulnerable
to an adversary who can observe it in enough places along its route.
For
On 9/25/2013 11:10 AM, Joe wrote:
Hi,
I'm planning to run a Tor relay on a spare computer at home. Security
is a concern, and not only regarding the machine running the relay but
also my other computers. Are there any (theoretical or otherwise)
known attacks a person can perform on a running
My relay that has been running release 0.2.4.17-rc for several day now
has become saturated with what I would consider 'noise' - namely a huge
amount of handshake activity. It does respond downward to lowereing the
bandwidth setting, but the bandwidth graph is nearly flat. Now I have
just
On 9/20/2013 9:17 AM, That Guy wrote:
You're probably fine, especially if not running an exit. You didn't
list your home country, though; I'm assuming United States.
Best,
-Gordon M.
While I know you have vastly more knowledge and experience than me and
often my observations or worries
On 9/20/2013 10:23 AM, Moritz Bartl wrote:
On 09/20/2013 04:17 PM, That Guy wrote:
While I know you have vastly more knowledge and experience than me and
often my observations or worries are doe to me mis-understanding
something but about the comment above, I have experienced issues
running
I think that it may be somewhat ego-centric to accept the argument that
this apparent flood is actually directed at the Tor network. It may be
that the real goal is to find efficient weapons to attack the Internet as a
whole, or major segments of it. It may be measuring the response time of
the
On 8/29/2013 9:17 PM, Gordon Morehouse wrote:
Bryan Carey:
It's possible. One should always review all configuration files
before making their node operational. You can't assume that it will
be configured in a particular manner.
I mean, who would have thought the TBB would ship with
On 8/30/2013 1:04 PM, Andy Isaacson wrote:
On Fri, Aug 30, 2013 at 11:38:26AM -0400, That Guy wrote:
I run an exit node off of a residential Verizon connection and I
haven't seen a single threat, legal or otherwise so far, I dunno
why you're having so much trouble.
Thank you for the reply
On 8/29/2013 11:09 PM, Andreas Krey wrote:
On Thu, 29 Aug 2013 19:35:37 +, Gordon Morehouse wrote:
...
Aug 29 18:19:14.000 [notice] Your network connection speed appears to
have changed. Resetting timeout to 60s after 18 timeouts and 172
buildtimes.
Random data point: I had these
12 matches
Mail list logo