On 08.09.2011 21:23, Matthew wrote:
http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
It is
On 01.09.2011 13:24, Roger Dingledine wrote:
Several people have asked us on irc about recent news articles like
http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
Apparently the Dutch police exploited vulnerabilities in the webservers
reachable
On 2011-09-09 05:09 , cmeclax-sazri wrote:
On Thursday 08 September 2011 22:02:56 Andre Risling wrote:
- Who stores the MAC address of the computer you're using? The ISP? An
Webmail service?
On IPv4, a MAC address goes only as far as the local network (the MAC address
my router has on
I have install the TB-1.4.2 on my Iceweasel 3.5.16 working under Debian
Squeeze AMD64.
I can see new option New Identity in that version of TB, but it is
disables.
What is that option and why it disabled?
Furtherinmore, there are no option reffer spoof in the TB-1.4.2; why?
On 09/09/11 09:36, t...@lists.grepular.com wrote:
Set up a firewall on the VM to prevent all other network traffic
going in or out of it.
I meant to say set up a firewall on the *host* OS to prevent all other
traffic going in or out of the VM. I'd probably set up a firewall on the
VM it's self
On 09/09/11 06:43, Orionjur Tor-admin wrote:
Very intresting what is the vulnerabilities they used for breaking systems?
In the lite of that facts I don't know what I need to advice my clients
- setting up hidden services on their home computers or on overseas
vdses? (My clients are not
On Fri, Sep 09, 2011 at 07:41:28AM +, Orionjur Tor-admin wrote:
I have install the TB-1.4.2 on my Iceweasel 3.5.16 working under Debian
Squeeze AMD64.
You should realize that using Torbutton on your own browser is a dying
concept:
On 09/09/11 03:02, Andre Risling wrote:
- Why would someone want to change (spoof) their MAC address?
If you're an activist who travels the country and uses free WiFi to
access the internet, you might not want to make it any easier for law
enforcement to track your movements.
Julian
On Fri, Sep 09, 2011 at 12:52:36PM +0200, morphium wrote:
where is the Page, where I can check wether an IP has been an exit
node at a given time?
https://metrics.torproject.org/exonerator.html
or
https://metrics.torproject.org/relay-search.html
Good luck! Let us know if we can be more
* morphium schrieb am 2011-09-09 um 12:52 Uhr:
where is the Page, where I can check wether an IP has been an exit
node at a given time?
URL:https://metrics.torproject.org/exonerator.html
Besten Gruß
--
Jens Kubieziel http://www.kubieziel.de
Enten legen ihre
On 09.09.2011 10:36, Roger Dingledine wrote:
On Fri, Sep 09, 2011 at 07:41:28AM +, Orionjur Tor-admin wrote:
I have install the TB-1.4.2 on my Iceweasel 3.5.16 working under Debian
Squeeze AMD64.
You should realize that using Torbutton on your own browser is a dying
concept:
On 09.09.2011 08:36, t...@lists.grepular.com wrote:
On 09/09/11 06:43, Orionjur Tor-admin wrote:
Very intresting what is the vulnerabilities they used for breaking systems?
In the lite of that facts I don't know what I need to advice my clients
- setting up hidden services on their home
--
andr...@fastmail.fm
On Friday, September 09, 2011 11:08 AM, Julian Yon jul...@yon.org.uk
wrote:
On 09/09/11 03:02, Andre Risling wrote:
- Why would someone want to change (spoof) their MAC address?
If you're an activist who travels the country and uses free WiFi to
access the
Dear All,
Good Day!! I am configuring my own private tor directory server but I have
finalized all the steps but when I run tor with my own configured tor
configuration file, it gives me the following error:
Sep 09 12:44:39.953 [notice] Tor v0.2.1.30. This is experimental software. Do
not
Hi!
2011/9/9 Roger Dingledine a...@mit.edu:
On Fri, Sep 09, 2011 at 12:52:36PM +0200, morphium wrote:
where is the Page, where I can check wether an IP has been an exit
node at a given time?
https://metrics.torproject.org/exonerator.html
or
https://metrics.torproject.org/relay-search.html
On Fri, Sep 09, 2011 at 01:43:13PM +0200, Andre Risling wrote:
I've forgotten already if someone answered thisbut with the
free WiFi connections do they typically get your MAC address?
I've noticed in Ubuntu that when the computer is booted up and before I
connect to the web the
Colin Klett writes:
I'm using the current Browser Bundle and wondering if installing the HTTPS
Everywhere extension would provide any additional security?
If you're using the current Browser Bundle, you're already using the
HTTPS Everywhere extension.
--
Seth Schoen sch...@eff.org
Senior
I'm using the current Browser Bundle and wondering if installing the HTTPS
Everywhere extension would provide any additional security?
___
tor-talk mailing list
tor-talk@lists.torproject.org
DARPA has funded a project to develop a stego type communications system as a
next generation TOR. Its called SAFER Warfighter Communications.
http://www.darpa.mil/Our_Work/I2O/Programs/SAFER_Warfighter_Communications_(SAFER).aspx
On Sep 8, 2011, at 7:00 PM, Michael Holstein
On 09/08/2011 08:02 PM, David H. Lipman wrote:
From: Anthony G. Basile bas...@opensource.dyc.edu
On 09/08/2011 05:23 PM, Matthew wrote:
http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
Very disturbing. I wonder if its possible to hide encrypted traffic as
On 9/9/2011 7:20 AM, Greg Kalitnikoff wrote:
Is there a way to not to close Vidalia and Tor itself with browser
exit? Or open TB`s Firefox separately fully functional, with New
identity option? When I need to restart FF or when it crashes, it is
very inconvenient to start all cycle again:
http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
It is very bad news because I am affraid that another tyrannical regimes
such as Russian can make do it too.
But it seems to me that Tor-users can use bridges and etc. for avoiding
repressive measures from law
On Sun, Sep 04, 2011 at 06:03:35PM +0200, k...@uva.nl wrote 7.4K bytes in 147
lines about:
: Requests: Why? [1] from the Tor-talk mailinglist. Some believe (credits
: to @ly_gs for enlightening me) that the August 2011 spike in Tor users
: via bridges may be related to the Dutch police
On Thu, Sep 08, 2011 at 10:23:41PM +0100, pump...@cotse.net wrote 1.4K bytes in
42 lines about:
: http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
I talked to someone from the pakistani government about this encryption
ban early this spring. They were concerned that
On Fri, Sep 09, 2011 at 08:56:07PM +0100, spoo...@gmail.com wrote 3.5K bytes in
93 lines about:
: I know I will need to supply the exitnode fingerprints, I was looking for a
: way to get the list of fingerprints form a tor status server and automate
: the whole process
This app you want to
On Fri, Sep 09, 2011 at 05:43:50AM +, tor-ad...@orionjurinform.com wrote
2.2K bytes in 45 lines about:
: Very intresting what is the vulnerabilities they used for breaking systems?
This question can likely only be answered by the authorities. The
obvious attacks are against the webserver
Hello,
I just made a new trac ticket for this topic. In case this e-mail does not
appear properly formatted on TorTalk list, the trac ticket can be found here:
https://trac.torproject.org/projects/tor/ticket/3978
I have been testing the following about:config settings (specific to
Firefox 6)
Hello,
For some days (weeks?) the Hidden Wiki (http://kpvz7ki2v5agwt35.onion) has been
down. Does anyone know what's going on? Will it come back up soon? Are there
other places that list many Hidden Services, besides the Hidden Wiki?
___
tor-talk
--- On Fri, 9/9/11, John Crimby wrote:
Hello,
For some days (weeks?) the Hidden Wiki (http://kpvz7ki2v5agwt35.onion)
has been down. Does anyone know what's going on? Will it come back up
soon? Are there other places that list many Hidden Services, besides
the Hidden Wiki?
Well, it looks
Thus spake sigi (torn...@cpunk.de):
We hope to better answer these questions in a Tor Browser Bundle
design document. Just one of the many other items that were supposed
to go into a new stable release that got pushed aside due to recent
events:
Arma was kind enough to bonk me on the head to point out the problem is one
of timezone or clock or date. He was correct. My clock was over 180 minutes
off (due to timezone issues). Hidden Services are working just fine.
... back to your regularly scheduled broadcasts ...
Hello,
I recently setup my own Tor relay, and its exciting!
But I've had the following questions about Tor for a while:
(1) I read in a recent list posting that paid private VPN services
provides no anonymity. According to some of those providers, they
don't keep any log of your connections. Is
32 matches
Mail list logo