On 24.04.2017 12:30, Jonathan Marquardt wrote:
On Mon, Apr 24, 2017 at 12:16:23PM +0200, unpublished wrote:
3. How to change the end node of the country (eg country from which I
am
POLAND)?
Here's a simple guide on how to do that:
Hi folks,
My Tor exit, ecntor, recently changed from being listed in the UK to
being listed in Canada, without any input on our part.
On the IRC channel, I was reassured that this was not a bad thing, that
GeoIP is inaccurate, for example.
However, I am interested in what might have caused
Indeed.
In every Tor user there is a seething anarcho-capitalist.
On 09/12/16 01:58, niftybunny wrote:
Are there any “special” t-shirts for the 1%?
markus
Hi,
Jon is distributing t-shirts and Christmas cheer this year.
Have you been naughty or nice?
And by the way, it's SanTor, not
Hi folks,
I think it would be interesting to run relays in Africa and Asia. Especially
Africa, as this area has growing internet usage, and censorship of the internet
in some countries is not widespread, e.g. Liberia.
Another argument is that even if there is censorship, having more relays in
>
>
>On Wed, Dec 7, 2016, at 23:45, Duncan Guthrie wrote:
>
>> The problem with Facebook is that their policies on real names
>> somewhat goes against hiding from a repressive regime. Their terms
>and
>> conditions mandate that they kick people who use pseudonyms,
The problem with Facebook is that their policies on real names somewhat goes
against hiding from a repressive regime. Their terms and conditions mandate
that they kick people who use pseudonyms, and make fellow Facebook users rat on
each other.
If I was an activist I would be wary of using it
What I was originally getting at was that the parts of the Raspberry Pi
that are completely proprietary - while there is a free software
implementation of the GPU blob, most people don't use that, as they are
on stock Rasbian, which includes all the nasty "other parts" - are a
great
On 07/12/16 05:32, Rana wrote:
I can just imagine someone panting while dragging a sub-$35 old desktop
computer up the stairs after physically searching for it in a nearby junkyard.
A considerable level of destitution and a commendable commitment to the cause
of Tor would be required.
This
On 06/12/16 21:10, SuperSluether wrote:
I don't know the actual numbers for the Raspberry Pi 1, I was just
quoting from Duncan:
https://lists.torproject.org/pipermail/tor-relays/2016-December/011182.html
I was told this figure by a friend who tried networking "stuff" on a Pi.
From personal
On 04.12.2016 22:35, Tristan wrote:
Perhaps this IS in fact normal. I ran a Tor relay on a Raspberry Pi
for a while. My speed was about 1Mbps max, similar to your 1.5Mbps. I
saw minimal traffic, and the consensus weight never went above 20.
I'm not running a relay at home anymore because of the
All the information is on that page.
You will get the quickest and most relevant support from the IRC channel.
On 22 November 2016 00:25:24 GMT+00:00, Kevin Zvilt
wrote:
>I apologize for hijacking the thread. I just need to know how to
>contact
>the support team.
>
>On
Hi Kevin,
If you need some support, there are lots of friendly and intelligent people on
IRC - #tor on OFTC - who might be able to help you. You shouldn't have to wait
too long for a response.
--
Duncan
On 18 November 2016 23:46:41 GMT+00:00, Kevin Zvilt
wrote:
>Oh,
Hi folks,
I am not sure it is more secure. What are we trying to protect here? As long as
the relay is running,it is unencrypted. Disk encryption only prevents physical
access - are you at risk of this? At any rate, the relay shouldn't be storing
personal data.
Having it encrypted also
Um, did you mean to reply to this thread?
On 24 October 2016 15:32:08 BST, tor admin wrote:
>On Mon, Oct 24, 2016 at 02:20:06PM +0200, Volker Mink wrote:
>>Mine is running for close to two years now and i got 2 regular
>complaints
>>with specific accusation
Hi folks,
I think this is a very extreme and unnecessary solution. While it is good to
keep relays up, this may be unreliable. It is good to perform maintenance
regularly, and reboots are often best.
Also, it appears to be proprietary technology. I would not advise proprietary
technology on a
Hi there,
More likely, they just compromise your relay in runtime.
Reflashing the boot firmware is theoretical, but due to the huge variation in
the hardware running Tor, I am not convinced using such an exploit on vast
numbers of computers is entirely practical. Since relays are up for
Couldn't they run a regular relay node instead? This would help them blend in
their traffic so to speak while also not having to put themselves at risk of
being cut off.
On 6 September 2016 04:47:41 BST, Dave Warren wrote:
>On Mon, Sep 5, 2016, at 11:24, Kenneth Freeman
17 matches
Mail list logo