just wonder if I set up the email to be sent later, say 1 month later, will
the IP shows or still hinden? Thank you!
Best,
ᐧ
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Sorry, I forgot to come back to post this
Dropping Docs On Darknets: How People Got Caught - Adrian Crenshaw
http://www.irongeek.com/i.php?page=videos/showmecon2014/2-03-dropping-docs-on-darknets-how-people-got-caught-adrian-crenshaw
It was also accepted at Defcon, but Defcon is a pretty geeky
In hindsight, most don't have time to watch, so here are the slides if you
want to wade through them:
https://www.dropbox.com/s/dfen626aruv89b3/Dropping%20Docs%20on%20Darknets%20How%20People%20Got%20Caught.pptx
On Tue, Jun 10, 2014 at 7:47 AM, Adrian Crenshaw irong...@irongeek.com
wrote:
Thanks for the video. On your website there is another video Intro to
Darknets: Tor and I2P Workshop. Is one part of the other or do they cover
different material?
On Tue, Jun 10, 2014 at 7:47 AM, Adrian Crenshaw irong...@irongeek.com
wrote:
Sorry, I forgot to come back to post this
Dropping
I have been considering potentially building some type of remote
jumphost for a University research setting that automatically connects
its users to the Tor network and am looking for feedback/implementation
ideas.
A few assumptions:
1) the users of the host trust me as the operator
2) as soon
I did not think that Adblock was trustable considering how an
extension can bypass Tor.
On 6/10/14, Anders Andersson pipat...@gmail.com wrote:
On Mon, Jun 9, 2014 at 9:18 PM, Antonio Z adbeiler4...@gmail.com wrote:
I understand that it is not necessary, but I believe that making your
own ad
On 6/10/2014 2:27 PM, Antonio Z wrote:
I did not think that Adblock was trustable considering how an
extension can bypass Tor.
Good question. I've never sniffed ABP activities to see what it does
when installed in TBB. From memory, it shouldn't be phoning home,
except to get updates. Don't
First off I'm not a computer scientist. Nor am I a Tor expert.
I'm wondering if it is possible to use the middle relay as a buffer to
protect against possible correlation attacks.
From my understanding, if the attacker controls the first relay, and
the last relay, she can transmit packets
I reuse some alot of slides, just a different focus. I did Intro to
Darknets: Tor and I2P Workshop first, and it is a lot longer because I show
how to set things up, but it does not have as much detail about how people
got caught.
Adrian
On Tue, Jun 10, 2014 at 1:45 PM, Soul Plane
On 14-06-10 02:12 PM, Wayland Morgan wrote:
I have been considering potentially building some type of remote
jumphost for a University research setting that automatically connects
its users to the Tor network and am looking for feedback/implementation
ideas.
A few assumptions:
1) the
http://www.norse-corp.com/darklist.html
The world's first comprehensive blacklist of the Internet's highest risk IPs.
Traditional blacklists are often prone to false positives and are
usually an aggregation of other lists, leading to incomplete or poor
coverage. As a result, organizations
On 6/10/2014 6:17 PM, grarpamp wrote:
http://www.norse-corp.com/darklist.html
The world's first comprehensive blacklist of the Internet's highest risk IPs.
Why secure your server when you can pay us for a false sense of
security! Guaranteed to piss off potential customers and lower sales,
Hello,
I am running Tor Browser 3.6, but have neither been prompted to update
to 3.6.1 nor 3.6.2. Usually Tor Browser checks for any new versions and
alerts you if it is out of date. I checked and there were security
updates in 3.6.2. Is everyone else getting these update notifications,
but
On Tue, Jun 10, 2014 at 10:59:45PM +, Delton Barnes wrote:
I am running Tor Browser 3.6, but have neither been prompted to update
to 3.6.1 nor 3.6.2. Usually Tor Browser checks for any new versions and
alerts you if it is out of date. I checked and there were security
updates in 3.6.2.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 6/11/2014 1:46 AM, Michael Wolf wrote:
On 6/10/2014 6:17 PM, grarpamp wrote:
http://www.norse-corp.com/darklist.html
The world's first comprehensive blacklist of the Internet's
highest risk IPs.
Why secure your server when you can pay us
On 06/10/2014 06:17 PM, grarpamp wrote:
http://www.norse-corp.com/darklist.html
The world's first comprehensive blacklist of the Internet's highest risk IPs.
IPs are for routing, not reputation. Ugh.
--
Andrew
pgp 0x6B4D6475
https://www.torproject.org/
+1-781-948-1982
--
tor-talk mailing
On 06/10/2014 04:17 PM, grarpamp wrote:
http://www.norse-corp.com/darklist.html
The world's first comprehensive blacklist of the Internet's highest risk IPs.
Traditional blacklists are often prone to false positives and are
usually an aggregation of other lists, leading to incomplete or
Andrew Lewman wrote:
IPs are for routing, not reputation. Ugh.
It's doubly stupid because the most dangerous address would be one
that *isn't* on a public blacklist. And it's not even remotely
difficult to setup throwaway proxies to spam or send abuse.
I just really don't get the whole
Evil. Darklist provides a Norse IPQ risk score for each IP, the risk category
(such as 'botnet' or 'Tor proxy') to provide context to the score. Sad to
think that some companies will actually pay for this nonsense. If anyone is not
using Tor, they should be.
--
Christopher Booth
On 06/10/2014 08:55 PM, C B wrote:
Evil. Darklist provides a Norse IPQ risk score for each IP, the risk
category (such as 'botnet' or 'Tor proxy') to provide context to the
score. Sad to think that some companies will actually pay for this
nonsense. If anyone is not using Tor, they should be.
On Tue, 10 Jun 2014 10:49:01 +0200
Anders Andersson pipat...@gmail.com wrote:
On Mon, Jun 9, 2014 at 9:18 PM, Antonio Z adbeiler4...@gmail.com wrote:
I understand that it is not necessary, but I believe that making your
own ad blocking software would bring more people to tor. It does not
21 matches
Mail list logo