On Mon, Jun 22, 2015 at 06:53:23PM -0400, Mansour Moufid wrote:
Sometimes I wonder if it's really Cloudflare, or some bad exit node
running a CAPTCHA solving business.
If one doesn't use TLS that is a valid claim.
Since the captcha image delivery should originate from google with https in most
On Mon, Jun 22, 2015 at 07:15:24PM -0500, Joe Btfsplk wrote:
Is that actually true? (they can track you over various exits)
Is that what the design document says?
Tor can't protect you, if your browser emits cookies or information
about cached content back to an entity that operates global
On Tue, Jun 23, 2015 at 11:04:37AM +0200, kleft wrote:
Boards with illegal content like crimenetwork.biz are using cloudflare too.
Thats, why cloudflare should offer them, to distribute their content via
a HS via their cdn, and that would be fun for all involved parties.
Since a cdn is always
On Tue, Jun 23, 2015 at 06:58:57PM -0500, Joe Btfsplk wrote:
Thanks Çağıl,
You are welcome.
On certain points you made (it seems), it's absolutely trivial for Cloudfare
or any entity operating on a large number of sites, to track Tor / TBB users
- across domains - on every site visited, that
On Tue, Jun 23, 2015 at 01:46:38PM -0600, Mirimir wrote:
Will this work on micro PCs like Raspberry Pi2, Banana Pi, etc?
No, Tor-Ramdisk works only on Intel/AMD 32/64Bit x86 and compatible cpus,
and MIPS Atheros AR7161, PI has an Broadcom ARM cpu, the LeMaker
Banana PI use a Allwinner A20 cpu.
On Tue, Jun 23, 2015 at 12:06:41AM -0400, grarpamp wrote:
Longer reply may come, but I think it is useful to again say
that it may be that you must disassociate the classical tor
centric idea of fill away from the idea of filling the tor circuit.
There is no benefit in padding, it does the
On Sun, Jun 21, 2015 at 10:35:09PM -0700, Andy Iwanski wrote:
I'm screwed. But it they ain't getting my money.
My files weren't that valuable to me or anyone else.
We can never let the terrorists win.
See https://blog.torproject.org/category/tags/ransomware and
beisdes that, it is
On Mon, Jun 22, 2015 at 04:05:57PM -0400, Anthony G. Basile wrote:
Are you referring to cold boot attack?
Not really, depending on memory controller and memorytype most
of the data, especially ram based static stuff is easy to extract.
If you put stuff into ram, I may find it in 6 of 10 cases.
On Sat, Jun 20, 2015 at 09:30:11PM -0500, Joe Btfsplk wrote:
Just to clarify (to all that replied) - I have JS enabled. At least,
when trying to get captchas to work.
Then, I'm using Tor Browser's default settings for NoScript.
My observations and conclusions:
- two captchas, both unreadable
TL;DR: If you can, consider not using that services/sites find
alternatives and promote them.
On Sat, Jun 20, 2015 at 03:43:37PM +0200, Juan Miguel Navarro Martínez wrote:
El 20/06/2015 a las 10:18, Mirimir escribió:
Is Javascript always needed to get the number photo CAPTCHAs?
At least for
Greetings,
if you (still) use privoxy version 3.0.11 or higher, you may notice
that the actions (regexes) like img-reorder are not really white-space
friendly. If you run/use a webservices that sign or checksum entites
or checks signatures on static content, you get a lot of false positives
like
11 matches
Mail list logo