Tor Weekly NewsAugust 28th, 2013
Welcome to the ninth issue of Tor Weekly News, the weekly newsletter
that
That's a good idea. My ISP CenturyLink blocks incoming traffic I think...
On Aug 27, 2013 8:22 PM, Griffin Boyce griffinbo...@gmail.com wrote:
On 08/27/2013 07:29 PM, Percy Alpha wrote:
There're few problems with ISP when running non-exit relay. Users in
moderately censored areas can act as
On 28.08.2013 04:30, Percy Alpha wrote:
Theoretically, the directory
authority could serve up a set of a thousand random nodes, and then the
client software could select a random set to use initially.
This will make blocking tor nearly impossible and eliminate the need for
Bridge node since
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/27/2013 09:20 PM, Griffin Boyce wrote:
specific individual is doing whatever. Secret police don't have
to prove that a single person wrote something against regime --
they'll just narrow it down to a handful of possibilities and start
There is an indication that computers are connecting to the Tor
anonymizing proxy network from Antarctica. This information is anonymously
self-reported by the connecting client computers and it's entirely possible
that the locations are inaccurate. However, there is also a possibility
that
On 28 August 2013 12:29, lee colleton l...@colleton.net wrote:
There is an indication that computers are connecting to the Tor
anonymizing proxy network from Antarctica. This information is anonymously
self-reported by the connecting client computers and it's entirely possible
that the
bm-2d8jtri23dyth7whmaldhsvhdfwp91z...@bitmessage.ch writes:
Hi,
I'm wondering how safe is it to use custom hidden service names (.onion).
I'm not asking this for public hidden services but for private ones (only
for myself or for friends). Using an easy to remember address just for
using
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/28/2013 12:29 PM, lee colleton wrote:
that the locations are inaccurate. However, there is also a
possibility that malicious software has been installed on computers
in one of your research stations which is using the Tor network for
I noticed that the Tor Project's 2012 Financial Report from
https://www.torproject.org/about/findoc/2012-TorProject-FinancialStatements.pdf
notes that what appears to be Tor's largest single source of funding is a
$876K U.S. Department of Defense grant obtained via the Stanford Research
Institute
On Wed, 28 Aug 2013 10:18:31 -0700
bm-2d9whbg2vekslcsgbtplgwdlqypizsq...@bitmessage.ch wrote:
Despite this transparency on Tor's own website, Tor's Sponsors page
at https://www.torproject.org/about/sponsors.html.en currently lists
its largest donor as an anonymous NGO.
Isn't SRI an
Thanks; please see https://trac.torproject.org/projects/tor/ticket/9614.
Can anyone working for the Tor Project comment on its U.S. Department of
Defense funded activities beyond what appears when searching for
N66001-11-C-4022 (the number of the award from the Tor Project's 2012
Financial
Every client has to download the full list of relays (consensus)
periodically. In areas with little connectivity, this already puts a
high burden on clients.
Griffin pointed out Tor could download only a portion of relays.
It is very hard for Tor clients to determine which relays to use.
On Wed, Aug 28, 2013 at 12:41:58PM -0700, Percy Alpha wrote:
Every client has to download the full list of relays (consensus)
periodically. In areas with little connectivity, this already puts a
high burden on clients.
Griffin pointed out Tor could download only a portion of relays.
Done
13 matches
Mail list logo