In atlas.torproject.org, I saw Bandwidth rate, burst and observed. Can
anybody please explain these terms with the following example:
Nickname IPredator
*Bandwidth values*
Bandwidth rate: 1073.74 MB/S
Bandwidth burst: 2097.15 MB/S
Observed Bandwidth: 60.15 MB/S
Advertised Bandwidth: 60.15 M
(tl;dr: humor, no content)
On 14-06-30 02:14 PM, Mark McCarron wrote:
> Mick,
>
> I would be very careful what you claim in your emails. I have the capability
> of suing you into oblivion, that email constitutes defamation. Nothing like
> that was ever said, either retract it or I will take y
On Mon, Jun 30, 2014 at 8:40 PM, Rich Jones wrote:
> Has anybody responded to this claim yet?
> http://s7kgnncq3zbe3yza.onion/windex.shtml#mitm
>
> the traffic, unless this is actually a phishing-and-proxy attack and not a
It's entirely a userland link phishing to proxy game. It's been going on
f
Has anybody responded to this claim yet?
http://s7kgnncq3zbe3yza.onion/windex.shtml#mitm
I don't understand how such an attack would be possible without decrypting
the traffic, unless this is actually a phishing-and-proxy attack and not a
"true" MiTM. (How would an MiTM be able to manipulate traff
Christopher,
That's a very selective reading and I don't particularly care what you think.
For the record, this is what was stated:
"Basically, I keep a track of site numbers year-on-year, site availability from
3rd party monitoring and read comments on forums and chat. From what I can
gathe
On Mon, Jun 30, 2014, at 10:15 PM, Bobby Brewster wrote:
>
> But how can the person's computer be identified since all that is seen is
> the connection between the exit node and the destination
> target_website.com
>
> The point, surely, is that real time code injection should not be
> possibl
Geoff Down:
> To be clear, no ppc version of what? There's a source tarball of Tor.
I see. In any case, in the debian repositories i find the the 0.2.4.22
version the same as the stable on the tor download page. Is there any
reason to not have confidence to the debian repositories?
TIA
--
tor-ta
On Mon, Jun 30, 2014 at 2:15 AM, coderman wrote:
> 1) compute the cost of global traffic analysis. we have big data mark
> specifically UPSTREAM model collection at backbone peering points.
> this is just one part of a series of costs; how much raw DPI capacity
> (it is finite)? how much memory
They are identified as a person of interest by visiting
target_website.com (where target_website.com might be an
'extremist'
site or a webmail box that has attracted attention) and
then *in real
time* code injection and redirection can be used to attack
the person's
computer. So 'ident
In a long thread starting here:
https://lists.torproject.org/pipermail/tor-talk/2014-June/033406.html
On Mon, Jun 30, 2014 at 3:22 PM, Morgan Smith wrote:
> On 6/28/2014 10:01 AM, Mark McCarron wrote:
>> Anyway, we have a simple solution to this global view and hidden services.
>> We just imple
On 6/28/2014 10:01 AM, Mark McCarron wrote:
> Anyway, we have a simple solution to this global view and hidden services.
> We just implement a distributed hosting solution within the Tor system and
> end-to-end visibility is gone.
I'm nowhere near done sifting through this thread however Freenet
Mick,
I would be very careful what you claim in your emails. I have the capability
of suing you into oblivion, that email constitutes defamation. Nothing like
that was ever said, either retract it or I will take you for everything that
you've got.
Your choice.
Regards,
Mark McCarron
Date:
On Mon, 30 Jun 2014 10:05:06 -0400
t...@t-3.net allegedly wrote:
>
> I have a hard time believing that you've been effectively tracking so
> much 'child porn, rape, snuff videos' content that you can
> conclusively say that all such content has suddenly disappeared from
> Tor. My knowledge abou
On Sun, 29 Jun 2014 19:30:35 +0100
Mark McCarron allegedly wrote:
>
> Congratulations, so you found someone with a similar name what are
> the odds of that.
So. Can I take that as a "no" then? You are not that same Mark McCarron?
Mick
--
So does it mean that if a node is far from directory authority then the
advertised bw of that node is always low.
In this case that node can't donate the bw it is willing to donate.
On Jun 30, 2014 6:11 PM, "Kristoffer Rath Hansen"
wrote:
> Depends on what ISP you have, but also other factors suc
This is wrong in so many ways.
Edward Snowden's info, hand-in-hand with Prism's details, shows how
NSA/GCHQ hates Tor because they can't break it very well. They have to
exploit browser flaws and/or go around Tor to get what they want. If
they owned Tor from the network perspective there woul
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
The TOR Hidden service uses 1024-bit long-term RSA key.
According to this document it appears possible to break a 1024-bit RSA
key in one year using a device whose cost is about $10M
http://www.tau.ac.il/~tromer/papers/cbtwirl.pdf
According to "
No doubt Snowden's documents are a mixture of real and fake material. It would
be standard practice to leave fud on the network to flush out leakers and those
involved in espionage. What Snowden knows of this is questionable.
The bottom line is that a solution must be implemented for end-to-en
On 6/30/14, Mark McCarron wrote:
...
> Tor appears to be...
Mark, you may be right;
but you have provided NO THING to enable me to
verify ANY THING that you have said in THIS thread!
> no one makes any moves to correct the situation
So Mark, make a move already!!
Your finger pointing IS offe
On Mon, Jun 30, 2014, at 12:55 PM, fari...@arcor.de wrote:
> Spam 06:
> > Are you sure you want that? Unsecured is worse than not at all in this
> > particular case. Unless you care for a poor man's proxy.
>
> Possibly, i don't know (?). But there's no ppc version on the tor server
> ... Do you
On Mon, 30 Jun 2014 13:19:43 +, Mark McCarron wrote:
...
> Then we also have Snowden, who informs of us PRISM.
You mean the Snowden that also delivered an internal slide of NSA,
stating that they are unable to break tor generally, only with some
success for specific targets? Since that is wron
Well, let's put this another way. On a planet, approaching almost 7 billion
people, a network exists (Tor) that once had a substantial illegal content
available (i.e. child porn, rape and snuff videos, etc.). Then governments,
such as the UK government, announce GCHQ was to assist in cleaning
Spam 06:
> Are you sure you want that? Unsecured is worse than not at all in this
> particular case. Unless you care for a poor man's proxy.
Possibly, i don't know (?). But there's no ppc version on the tor server
... Do you have another source?
TIA
--
tor-talk mailing list - tor-talk@lists.tor
Lars Luthman:
> 9050 is the default for the stand-alone 'tor' program. The 'tor' that is
> bundled with the Tor Browser uses 9150 to avoid conflicts with any
> separately installed 'tor'.
Thanks a lot for your patience. I got it now :D :D
>From a pragmatic point of view, may be it's easier to cha
OK, I'll bite :)
On 6/30/14, Juan wrote:
> On Sun, 29 Jun 2014 08:31:20 -0400
> Roger Dingledine wrote:
>
>> On Sun, Jun 29, 2014 at 12:19:56PM +0100, Mark McCarron wrote:
>> > Given the scale of this obviousness, I can only assume that you're a
>> >sock puppet for an intelligence agency who has
fari...@arcor.de:
> Thanks. BUT: shortly said, i'm sitting here on a ppc based machine and
> there is no ppc version in the tor repositories. So, i'm obliged to use
> those of debian ... ;-) (I pinned them to use sid, so that i'll always
> get the newer ones).
Are you sure you want that? Unsecured
Spam 06 schrieb:
> So, you read the documentation and you find out that the repositories
> have outdated software that can make the whole thing useless. The port
> was changed in the mean time. Anyway, that is one more reason to read
> the docs at the torproject.org site. And get the latest package
On Mon, 2014-06-30 at 07:59 +0200, fari...@arcor.de wrote:
> Lunar schrieb:
>
> > The default port of the Tor Browser is 9150. Idea is that you start Tor
> > Browser and then start Thunderbird with Torbirdy. Makes sense?
>
> If so it makes sense. But, for me, an all machines where i installed to
fari...@arcor.de:
> So
So, you read the documentation and you find out that the repositories
have outdated software that can make the whole thing useless. The port
was changed in the mean time. Anyway, that is one more reason to read
the docs at the torproject.org site. And get the latest pack
Depends on what ISP you have, but also other factors such as connectivity
to the bw auths and such
On Jun 30, 2014 10:12 AM, "saurav dahal" wrote:
> Hello,
>
> Does ISP throttles the Bandwidth which is donated to TOR network? For e.g.
> I
> am operating OR as an exit on 10 MegaBytes/s speed netwo
Hello,
Does ISP throttles the Bandwidth which is donated to TOR network? For e.g. I
am operating OR as an exit on 10 MegaBytes/s speed network. But when
checking from atlas.torproject.org, it shows only 1MBps Advertised
Bandwidth. Is it due to throttling of bandwidth by my ISP?
I am running as ex
On 06/30/2014 12:29 AM, grarpamp wrote:
>> McMark wrote:
>> I have been examining the number of what would normally be deemed as illegal
>> sites sites on Tor.
>
> Even though I take certain issues with it, particularly the call to cease
> development of anonymity platforms, a more formal exami
On 29 June 2014 21:45, Michael Wolf wrote:
>
> How do Snowden and the NSA slides titled "Tor Stinks" fit into your
> little conspiracy theory?
Conspiracy theory aside, I'm curious about these. I mean, p12: "How
does TOR handle DNS requests?...still investigating".
That seems remarkably clueless
On 29 June 2014 20:30, Mark McCarron wrote:
> Mick,
>
> Congratulations, so you found someone with a similar name what are the odds
> of that.
Probably fairly good odds, I guess - it can't be that unusual a name.
But just so we're clear: are you definitely not the same Mark McCarron
who designed
> McMark wrote:
> I have been examining the number of what would normally be deemed as illegal
> sites sites on Tor.
Even though I take certain issues with it, particularly the call to cease
development of anonymity platforms, a more formal examination is here:
“A Review of the Available Content
On Sun, Jun 29, 2014 at 5:58 PM, Seth David Schoen wrote:
> ...
> I wonder if there's a way to retrofit high-latency hidden services
> onto Tor -- much as Pond does, but for applications other than Pond's
> messaging application.
i know that one mechanism i have used to some limited success is
fr
On Sun, Jun 29, 2014 at 11:29 PM, grarpamp wrote:
> ...
> Even though I take certain issues with it, particularly the call to cease
> development of anonymity platforms, a more formal examination is here:
>
> “A Review of the Available Content on Tor Hidden Services: The Case
> Against Further Dev
On Sun, Jun 29, 2014 at 4:53 PM, Mark McCarron wrote:
> ...
> We already know from the Snowden releases that the physical infrastructure
> for this is in place. That it spans at least 33 nations covering all major
> fiber links. Within the US, all traffic is copied verbatim at major
> exchang
On Sat, Jun 28, 2014 at 4:09 AM, Mirimir wrote:
> On 06/28/2014 01:31 AM, grarpamp wrote:
>> On Fri, Jun 27, 2014 at 5:32 PM, coderman wrote:
>>> "From a Trickle to a Flood: Active Attacks on Several Mix Types"
>>> http://freehaven.net/doc/batching-taxonomy/taxonomy.pdf
>>
>> Pending a second rea
Lunar schrieb:
> The default port of the Tor Browser is 9150. Idea is that you start Tor
> Browser and then start Thunderbird with Torbirdy. Makes sense?
If so it makes sense. But, for me, an all machines where i installed tor
(debian, ubuntu, arch) the tor config file (/etc/tor/torrc) always cam
40 matches
Mail list logo