On 12/26/2019 07:08 PM, Anonforpeace wrote:
> Hello:
>
> I had a power outage recently and I've restarted my bridge i.e. restarted the
> daemon and tor, and when I check the Relay Search
> section of Tor Metrics, it's taking a long time for my bridge to show
as online again. Also, not sure
Messing around with my new computer I get this:
[warn] /run/tor is not owned by this user, but by toranon (977).
Perhaps you are running Tor as the wrong user?
Duckduckgo displays hentai results. Go figure.
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
Description:
On 09/08/2019 06:28 PM, teor wrote:
> Here's our advice for exit relays:
> * don't run them at home, if you're at risk from the police assuming the exit
> traffic is your traffic
Excellent & standard advice, but I wonder what legally constitutes a
home or one's property. Can you
On 07/29/2019 10:54 AM, Happy Boy wrote:
> What I forgot to tell you: CyberTipline / USA investigated the IP and
> the bad data traffic with a report to the FBI, which then informed the
> german BKA. The friendly boys got me then 06:20Uhr gently from the sleep ...
Professionals.
On 07/29/2019 06:45 AM, niftybunny wrote:
> I was contacted by the FBI, LKA, BKA and many other LEAs in Germany and never
> had any trouble at all.
For the non-Teutonic amongst you, Landeskriminalamt (State Criminal
Police) & Bundeskriminalamt, or Federal Criminal Police Office (Germany).
B6C4C9A43658F686F8892CA5666717532F72979C
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
On 11/12/2018 10:14 AM, niftybunny wrote:
> Yeah, one of the complete bullshit things. I get around 200 emails per day
> like this one:
This is good to know. My ISP just put my service on hold, whereas
IP-Echelon and its ilk can only sound ominous. Cue the theremin!
Zwiebelfreunde is the
On 11/12/2018 08:23 AM, niftybunny wrote:
> 1. ISPs want to make money, in fact they have to turn in a profit to survive.
> Yeah, I know
>that sounds unbelievable. Tor is legal but someone has to take care of abuse
>mails. These support
>people want money for their work. If you get lots of
On 11/12/2018 05:53 AM, DrNotThatEvil wrote:
> Secondly she also raised the following question:
> 'if you don't do it somebody else will, so why do you put yourself at risk?
If not us, whom? If not now, when? ~Anabasis
>Thirdly she detected from the conversation that a Exit Relay might not
On 06/28/2018 01:19 AM, arisbe wrote:
> Hello George and all,
>
> When I was learning to implement Tor I had difficulty wading through the
> web pages for information. Some pages were obsolete, some poorly
> maintained (think Tor flow or good/bad hosting companies). The Tor
> manual is just a
On 04/18/2018 11:34 AM, Gunnar Wolf wrote:
>> https://libraryfreedomproject.org/
>
> But I didn't know this one. Thanks!
https://en.wikipedia.org/wiki/Library_Freedom_Project
(Full disclosure: I wrote the article.)
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
On 03/02/2018 01:17 PM, Roger Dingledine wrote:
> Turns out the issue was that the default bwauth backend (the server that
> serves the bandwidth files) went offline during our efforts to shuffle
> things around so www.torproject.org could survive this week's 15-20gbps
> ddos attack on our
On 01/14/2018 04:03 PM, Ralph Wetzel wrote:
> Give it a try! I'm looking forward receiving your feedback and answering your
> questions.
I receive "[[Ernno 111]] Connection Refused"; running "$ sudo -u
debian-tor lib/theonionbox" yields "sudo: lib/the onionbox: command not
found" This on my
On 01/02/2018 02:13 PM, Alison Macrina wrote:
> If you run a non-exit relay, would you be so kind as to go to
> wikipedia.org from that IP, click "edit" on any page, and report to me
> off-list if your relay is blocked or not? In your message, please give
> me your relay address and let me know
On 12/20/2017 04:50 PM, teor wrote:
> Dear Relay Operators,
>
> Do you want your relay to be a Tor fallback directory mirror?
> Will it have the same address and port for the next 2 years?
> Just reply to this email with your relay's fingerprint.
CE24412AD69444954B4015E293AE53DDDAFEA3D6
On 12/18/2017 12:15 PM, Vasilis wrote:
> Hello Kenneth,
> Thank you for running an exit relay.
> Anonymity is useful for all creatures. :)
Just a relay, but anonymity is needful.
>> I have been told that Tor is conceptually difficult to wrap your head
>> around, but these are useful mission
I've recently touted establishing a Tor exit node at the inaugural Boise
organizing committee of the Democratic Socialists of America.
The idea was considered esoteric, but such anonymity craft is useful for
activists of all stripes.
Too, performing artists (neo-burlesque, LGBTQ comics, etc.),
On 12/06/2017 07:01 AM, Chuck McAndrew wrote:
> Hi Alison,
> The Lebanon Public Libraries in Lebanon NH are still running our exit.
> Regards
> Chuck
Speaking from local knowledge, one would have thought that libraries
setting up Tor browsers for their patrons would be a no-brainer, but
it's
On 10/03/2017 11:31 PM, Scott Bennett wrote:
> They have refused to let me speak with those making the decisions about
> what is provided on their public computers, much less to make an organized
> presentation to them. I was told that the decisions about software on the
> computers are
I'm running Ubuntu 12.04 LTS (Precise Pangolin) on my 32-bit machine,
but this is useful information for my Ubuntu 16.04 LTS (Xenial Xerus)
64-bit machine, which is a test bed slated to be a Tor exit at a local
hackerspace.
That said, having bought a new keyboard I've rebooted and ARM brought
Tor
This is possibly a naïve question, but I like to compile and run the
alpha/unstable version of Tor, but for the life of me I can't figure out
how to get ARM to run the latest version. I'm currently running
Anosognosia (Fingerprint: 9536B457F01F40696B131A72BC102343759F46AA),
but it's stuck in the
On 02/15/2017 06:00 PM, Kenneth Freeman wrote:
> On February 17, the day before Presidents Day, a general strike shall be
> held against any and all things Trump. If Boise is having an activists
> workshop, then there are plenty of tranches of fertile ground nationwide
> to plant
On February 17, the day before Presidents Day, a general strike shall be
held against any and all things Trump. If Boise is having an activists
workshop, then there are plenty of tranches of fertile ground nationwide
to plant Tor browsers, relays, and exit nodes.
On 02/09/2017 07:25 PM, teor wrote:
>> I haven't been able to upgrade from Tor 0.2.7.5, which ARM tells me in
>> red type is "unrecommended," which seems alarming. I'm running
>> 3.2.0-121-generic-pae GNU/Linux on Ubuntu 12.04 (precise).
>
> If you're on Ubuntu (or Debian) you can get the
On 01/17/2017 12:00 AM, Roger Dingledine wrote:
> On Mon, Jan 16, 2017 at 11:49:46PM -0700, Mirimir wrote:
>> Or you need adequate anonymity, and be willing to lose sunk cost.
>
> I think trying to run exit relays with anonymity, and with plans to
> discard them as needed, is a poor plan
Tor could use an Eternal September.
On 01/16/2017 10:11 PM, grarpamp wrote:
> I would support Rana's volunteer proposal as described,
> and growing integration, as being a beneficial contribution.
> Let us not forget, all begin as noobs to a norm, and full
> normalization may be chilling to
On 01/16/2017 11:49 AM, Olaf Grimm wrote:
> An exit node at home is funny. Last year I've got visitors from law
> enforcement early in the morning. Now I have some new "friends" from the
> police department.
>
> Be warned! They take a look on bad movies and assume you are the one...
>
> Now I
On 01/16/2017 11:07 AM, Petrusko wrote:
> To resume,
> So it's working by cloning the git repository as you wrote.
> chown -R debian-tor:debian-tor *
> inside folders /stem and /nyx
>
> Then (relay with default control socket)
> cd nyx
> sudo -u debian-tor ./run_nyx
This (or just "nyx")
On 10/27/2016 05:17 PM, Kenneth Freeman wrote:
>
>
> On 10/26/2016 06:58 PM, Nicholas Merrill wrote:
>
>> Hi Kenneth
>>
>> I am with a New York state non-profit organization that runs a number of
>> exits. I am not a lawyer, but I have surely spent years d
On 11/21/2016 08:33 AM, Alison wrote:
> Hi Petrusko,
>
> I got the same to this riseup account, which is not connected to a
> relay. So it may be targeting riseup users.
This riseup account is connected to my relays, and I haven't received
this "Spam mailout" message.
0xDD79757F.asc
On 10/26/2016 06:58 PM, Nicholas Merrill wrote:
> Hi Kenneth
>
> I am with a New York state non-profit organization that runs a number of
> exits. I am not a lawyer, but I have surely spent years discussing
> these and other related issues with many lawyers.
Good to know. Keeps me and my
An Idaho nonprofit has expressed guarded interest in Tor. Ideally I'd
like them to run an exit node without fuss or bother, but the Tor
Project's Tips on Running an Exit Node only covers limited liability
corporations (LLCs) regarding the legal/corporate set-up. Is there
anything to add, or is
On 10/10/2016 11:43 AM, Green Dream wrote:
>>> I set up my own ISP (AS28715) so I could run Tor exits etc without any
>>> trouble.
>>
>> Could you share a bit more about what is involved in doing that?
>
>
> I'd also be very interested in learning more about setting up an ISP
> for Tor. Is it
On 09/07/2016 10:34 AM, George wrote:
> On 09/07/16 11:54, Farid Joubbi wrote:
>> I had not thought of the diversity that way.
>
> There's a host of diversity issues with Tor to cover, but I tend to
> think OS diversity is one of the more critical.
With apologies to Akira Kurosawa, I think of
On 09/04/2016 07:31 PM, Mirimir wrote:
> On 09/04/2016 09:11 AM, Kenneth Freeman wrote:
>> Do embassies and consulates run Tor nodes? AFAIK no studies have been
>> done on this, but diplomatic immunity and Tor would seem to be a match
>> made in Heaven.
>
> Well,
On 09/04/2016 07:31 PM, Mirimir wrote:
> On 09/04/2016 09:11 AM, Kenneth Freeman wrote:
>> Do embassies and consulates run Tor nodes? AFAIK no studies have been
>> done on this, but diplomatic immunity and Tor would seem to be a match
>> made in Heaven.
>
> Well,
Do embassies and consulates run Tor nodes? AFAIK no studies have been
done on this, but diplomatic immunity and Tor would seem to be a match
made in Heaven.
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
On 09/03/2016 05:35 PM, jensm1 wrote:
> I agree to everything Matt said.
>
> A good rule of thumb for tor configuration is "leave everything at
> default, unless you've got a reason to change it".
I concur. Generally speaking you really don't have to get under the hood
much. Tor's ready to
On 09/01/2016 01:47 AM, grarpamp wrote:
> On 8/31/16, Kenneth Freeman <kencf0...@riseup.net> wrote:
>> To me it seems to be a bit late in the day for a Cambrian
>> Explosion -let a thousand anonymity networks bloom and see where it gets
>> you.
>
> I
On 08/31/2016 04:39 PM, grarpamp wrote:
> On 8/31/16, Green Dream wrote:
>> Well said grarpamp.
>>
>>> there are plenty of other already existing, interesting, and
>>> upcoming anonymous overlay networks for transporting IP, messaging,
>>> storage and so on.
>>
>> Mind
On 08/04/2016 05:04 PM, isis agora lovecruft wrote:
> Thanks for running an obfs4 bridge!
Which reminds me... I run an obfs6 bridge, the current status of which
is "Heartbeat: Tor's uptime is 2 days 0:00 hours, with 0 circuits open.
I've sent 1.19 MB and received 23.27 MB," so presumably it's
On 07/06/2016 01:01 PM, grarpamp wrote:
> https://boingboing.net/2016/07/01/researchers-find-over-100-spyi.html
> "Many people fear that running an exit node will put them in police
> crosshairs if it gets used in the commission of a crime. For the
> record, Boing Boing runs a very high-capacity
On 07/06/2016 01:09 PM, Green Dream wrote:
> Except the operators at BoingBoing have the privilege of corporate
> liability (instead of personal liability), and very likely corporate
> counsel (i.e., a nice legal team) as well.
>
> It seems easier to say "don't worry about it, it's not really a
On 04/01/2016 04:54 PM, Sam Lanning wrote:
> Hi Juha,
>
> I'd just like to say great work! I'm sure I speak for everyone when I say I
> really appreciate the local advocacy and positive vibes you're spreading!
> Exciting stuff and a good situation to be in!
>
> I'm sure Alison and Nima in
On 03/09/2016 07:09 AM, Cristian Consonni wrote:
> We have a saying in Italian that says "Chiedere è lecito, rispondere è
> cortesia".
> Roughly translated "Asking is allowed, answering is courtesy", that is
> you can ask for whatever you want, maybe somebody will respond, or
> don't, whatever.
On 01/10/2016 08:35 PM, krishna e bera wrote:
> Is atlas.torproject.org broken or changed?
> It seems to show only 1 month and longer graphs now.
I've wondered about this myself. I'm currently running two relays,
Anosognosia and AnosognosiaToo, and the latter has never shown up on
Atlas
On 12/03/2015 10:09 PM, Michael McConville wrote:
> Kurt Besig wrote:
>> Well. even a doctor would make a few suggestions based on some sort of
>> experience based reasoning. Perhaps some connection problems
>> associated with running tor-arm on a VPS vs. a home server...things of
>> that
On 11/10/2015 04:57 AM, mick wrote:
> Any idea where that concentration of 16 relays South of Ghana in the
> Gulf of Guinea is? The traffic there seems disproportionate to the size
> of the location.
What jumped out for me were the 109 relays (!) northeast of Wichita,
Kansas. At first I
On 11/10/2015 04:19 PM, Tim Wilson-Brown - teor wrote:
>
>> On 11 Nov 2015, at 09:44, Kenneth Freeman <kencf0...@riseup.net> wrote:
>> What jumped out for me were the 109 relays (!) northeast of Wichita,
>> Kansas. At first I assumed Lawrence, it being a colleg
A gorgeous visualization of the Tor's data traffic. Feast your eyes!
https://torflow.uncharted.software/
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
It's our version of 4'33".
On 10/07/2015 09:00 AM, Dominik Ungar wrote:
> Was this thread created by accident?
> Am 07.10.2015 13:56 schrieb "Bandie Yip Kojote" :
>
> I guess you are right.
>
> On 10/07/2015 01:48 PM, ??? wrote:
This institutional support for the Tor Project is extremely important.
https://en.wikipedia.org/wiki/Library_Freedom_Project
The Tor Browser and Intellectual Freedom in the Digital Age
https://journals.ala.org/rusq/article/view/5704/7092
0xDD79757F.asc
Description: application/pgp-keys
On 09/08/2015 12:14 PM, Patrick O'Doherty wrote:
> I received the following response from them:
>
>> We do not discriminate on the use of any protocol among our customers.
>> Nevertheless, if we get complains or any type of pressure from public or
>> private
>> entities for illegal activity
This may be a naïve question, but I've fired up my 64-bit Debian box now
that the nights are cool, and editing the torrc to establish a bridge
relay borks the browser. I provide anonymity much more than I use it
myself, but is the bridge relay copacetic? Thanks in advance.
0xDD79757F.asc
On 09/07/2015 12:25 AM, Roger Dingledine wrote:
> Well, it depends what you put in the torrc file. I assume you edited
> the torrc file that's inside the tor browser directory tree? Perhaps
> you did something there that it didn't like. Maybe you followed one of
> the instructions that
On 09/07/2015 12:18 AM, Billy Humphreys wrote:
> Well, people suggest that, unless you give <100KB/s, you should run a
> relay, not a bridge, as more relays are used (and we have Tor weather
> and such). You should be using Tor's daemon (apt-get install tor
> tor-arm) for the relay or bridge
On 09/07/2015 11:17 AM, Zack Weinberg wrote:
> On 09/07/2015 01:07 PM, Kenneth Freeman wrote:
>> On 09/07/2015 12:18 AM, Billy Humphreys wrote:
>>> Well, people suggest that, unless you give <100KB/s, you should
>>> run a relay, not a bridge, as more relays are use
(The OSHER presentation is actually tomorrow. Duh!)
0xDD79757F.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-relays@lists.torproject.org
58 matches
Mail list logo