If I understand correctly the question here is not about browsing but
fetching something that you don't need immediately for offline reading
and that you download with high latency using different circuits.
That's easy to do, if you take Peersm again, it's easy to send several
random requests
I don think is chatbeat. How many inindetifed servers do u have?
On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote:
See https://chartbeat.com/faq/what-is-ping-chartbeat-net
for what I think you are seeing - website analytics.
On Thu, Jul 3, 2014, at 11:56 PM, ideas
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote:
Does the NSA barter this database of suspicious extremists with
foreign services?
They do, according to Drake.
Certainly there are some friendly services eager to get their hands
on IP addresses
of NSA selected
On 07/03/2014 07:14 PM, Joe Btfsplk wrote:
Perhaps out of fear of legal liability, Tor Project doesn't seem to have
what would be very helpful for relay operators - guides, documents -
even access to basic legal advice, of how to best avoid legal issues to
begin with.
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about jamming echelon by adding keywords to
email that the echelon system was supposedly looking for. We
I don't have any unidentified servers - I don't know what you mean by
that. Which webpage are you visiting? Have you compared what happens
when visiting with Torbrowser and visiting with normal Firefox over the
normal internet?
On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
I don think is
Visiting the same website with Tor or normal Firefox its gave me the same
Remote Address:
s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com
as an example. While ones repeat themselves in both browsers, others not.
One class of unidentifies
On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
Visiting the same website with Tor or normal Firefox its gave me the same
So this is nothing to do with Tor.
Remote Address:
s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com
Hi!
On 04 Jul 2014, at 15:31, Moritz Bartl mor...@torservers.net wrote:
I have talked to multiple lawyers, and this case would be very easy to
defend against. William was sadly unable or unwilling to communicate
properly, and he's not willing/able to put it to a fight. It is a sad
situation
* elrippo schrieb am 2014-07-04 um 20:30 Uhr:
Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, how
a copy could be downloaded as mp4, divx, ogg or some other format?
You can use URL:http://zdfmediathk.sourceforge.net/.
--
Jens Kubieziel
On Fri, Jul 4, 2014 at 10:56 AM, Eugen Leitl eu...@leitl.org wrote:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Good work, glad someone had time to really dig in, perhaps even
drawing on some comments from others in the early buzz such as
Am Freitag, 4. Juli 2014, 20:48:09 schrieb Jens Kubieziel:
* elrippo schrieb am 2014-07-04 um 20:30 Uhr:
Missed it, but watched it in the ARD Mediathek [1]. Could someone advise,
how a copy could be downloaded as mp4, divx, ogg or some other format?
You can use
On Fri, Jul 4, 2014 at 8:15 AM, Nathan Andrew Fain nat...@squimp.com wrote:
Trawling for Tor Hidden Services: Detection, Measurement,
Deanonymization
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
the two seem very similar. in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Tor!
Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his exit for
illegal stuff, I became interested in his case. But I know it only
from the newspapers.
The raid
On 7/3/2014 2:23 PM, C B wrote:
I agree that collecting stories about why/how I use Tor is useful, but I disagree
that any special education or warning should be needed before setting up an exit node. Setting up
an exit node is simply providing another IP that can be used for traffic and
On 7/4/14, grarpamp grarp...@gmail.com wrote:
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
I2P is a tool that likely presents the nearest analog to Tor's hidden
services (.i2p) to the user. Usable in much the same way.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I fully agree with Joe!
Running an exit can get you in serious legal trouble, because Tor /and
all other anonymity services/ will always be misused for illegal
activities. Every interested operator must make his personal moral
trade-off and come to a
Do a Whois lookup of the addreses I gave u before and check that all of
this resolve to markmonitor. s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com st
http://edge-star-shv-04-gru1.facebook.com
just when I was visiting www.lemonde.fr
On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski pze...@gmail.com wrote:
I2P (aka Invisible Internet Protocol) is designed to be a real undernet
Using I2P to acces a standard Internet but in anonymous way is much less
Right, in the likely context of the subject exploit, I referred only to
the
On 7/5/14, no.thing_to-h...@cryptopathie.eu
no.thing_to-h...@cryptopathie.eu wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Tor!
Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his exit for
illegal
On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Tor!
Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his exit for
illegal stuff, I became interested in
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Eugen Leitl transcribed 5.8K bytes:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
On 07/04/2014 10:56 PM, Joe Btfsplk wrote:
*No*, we aren't aware of anyone being sued or prosecuted in the United
States just for running a Tor relay. Further, we believe that running a
Tor relay --- including an exit relay that allows people to anonymously
send and receive traffic --- is
23 matches
Mail list logo