Tor 0.2.2.28-beta makes great progress towards a new stable release: we
fixed a big bug in whether relays stay in the consensus consistently,
we moved closer to handling bridges and hidden services correctly,
and we started the process of better handling the dreaded "my Vidalia
died, and now my Tor
The goal is to hide my ip (I have dynamic) when sending and receiving
email.
Remailers wouldn't fit since they wouldn't allow to receive messages. In
addition, I'd like to host a local mail server. I think tor could help,
but would correspondents need to be use tor in order to email me? How
would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Well, after all I guess we can acknowledge that there are scenarios
where information disclosures will happen.
To give users the possibility to contribute while preventing leaks for
specific domains they are concerned it would be great if the submi
hello..
i was reading about Creating Custom Circuits..
and i found these orders ..but i didnt know how to use them and where to write
them..???
Using Tor control protocol you can create custom circuits of different sizes.
Regardless of circuit size the last node must be configured as exit-no
On Sat, 4 Jun 2011 12:56:15 -0700
Mike Perry wrote:
> Thus spake Robert Ransom (rransom.8...@gmail.com):
>
> > On Sat, 4 Jun 2011 12:09:52 -0700
> > Mike Perry wrote:
> >
> > > Thus spake Robert Ransom (rransom.8...@gmail.com):
> >
> > > > My understanding was that EFF would query DNS for a h
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/04/2011 12:37 PM, tagnaq wrote:
> IP address and hostname (and cert.) of intranet-server1.example.com
> using a valid certificate *.example.com will be published even if the
> first two options in the "advanced options" are enabled. Is that cor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/04/2011 09:56 PM, Mike Perry wrote:
> Thus spake Robert Ransom (rransom.8...@gmail.com):
>
>> On Sat, 4 Jun 2011 12:09:52 -0700
>> Mike Perry wrote:
>>
>>> Thus spake Robert Ransom (rransom.8...@gmail.com):
>>
My understanding was that E
Thus spake Robert Ransom (rransom.8...@gmail.com):
> On Sat, 4 Jun 2011 12:09:52 -0700
> Mike Perry wrote:
>
> > Thus spake Robert Ransom (rransom.8...@gmail.com):
>
> > > My understanding was that EFF would query DNS for a hostname, and if
> > > the hostname does not exist, assume that it's pr
On Sat, 4 Jun 2011 12:09:52 -0700
Mike Perry wrote:
> Thus spake Robert Ransom (rransom.8...@gmail.com):
> > My understanding was that EFF would query DNS for a hostname, and if
> > the hostname does not exist, assume that it's private. (This should
> > scare you even more.)
>
> EFF only needs
Thus spake Robert Ransom (rransom.8...@gmail.com):
> > >> Someone running this (SSLObservatorySubmission) in a non-public network
> > >> (i.e. an internal corporate network) with Internet access will probably
> > >> disclose internal hostnames including IP addresses, if that is the case
> > >> I w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Sat, 04 Jun 2011 12:37:14 +0200
tagnaq wrote:
> >> Someone running this (SSLObservatorySubmission) in a non-public network
> >> (i.e. an internal corporate network) with Internet access will probably
> >> disclose internal hostnames including IP a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
>> Someone running this (SSLObservatorySubmission) in a non-public network
>> (i.e. an internal corporate network) with Internet access will probably
>> disclose internal hostnames including IP addresses, if that is the case
>> I would identify this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/04/2011 12:52 PM, Robert Ransom wrote:
> My understanding was that EFF would query DNS for a hostname, and if
> the hostname does not exist, assume that it's private. (This should
> scare you even more.)
Well, if the EFF is able to ask the DN
Thus spake tagnaq (tag...@gmail.com):
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 03/21/2011 01:58 AM, Mike Perry wrote:
> > I've spent some time working with the EFF recently to build a
> > distributed version of the SSL Observatory
> > (https://www.eff.org/observatory) to be incl
Thus spake cac...@quantum-sci.com (cac...@quantum-sci.com):
> On Friday 3 June, 2011 07:16:03 Eugen Leitl wrote:
> > I've personally see Linux vserver patch prevent privilege
> > escalation and preventing hosts becoming compromised from
> > within its guests. There's, of course, GRSEC and other
>
15 matches
Mail list logo