Hi folks,
I'm preparing our talk for next week at 29c3.
So far I've made a preliminary list of software in the Tor ecosystem:
http://freehaven.net/~arma/tor-components-29c3.txt
Since words are so boring in slides, I've started collecting a set of
screenshots / images to use instead. You can see
Six big things I did in November:
1) Attended the NSF PI meeting for our new grant (joint with Georgia
Tech and Princeton). Met dozens of professors and renewed connections
to dozens more. One standout: I met a nice economist who framed our
exit relay funding debate as an if you vs now that game.
On Thu, Dec 13, 2012 at 08:38:37PM +, adrelanos wrote:
what if everyone, also people in uncensored countries, would use
obfsproxy like traffic obfuscation for all circuits?
Could that make website traffic fingerprinting [1] more difficult?
Obfsproxy transforms each byte, but it doesn't
On Mon, Dec 10, 2012 at 01:02:39AM -0500, Nick Mathewson wrote:
And last question, is there a reason that a line like
ClientTransportPlugin obfs2 exec /usr/bin/obfsproxy --managed
causes Tor to always run an obfsproxy daemon, even if there are no obfs2
bridges defined in torrc?
1) I attended WPES and the first day of CCS:
http://hatswitch.org/wpes2012/
http://www.sigsac.org/ccs/CCS2012/
There are a bunch of new Tor-related research papers:
- Changing of the Guards: A Framework for Understanding and Improving
Entry Guard Selection in Tor
I've let my status reports lapse while focusing on getting real work
done. Here's a start at getting back on track.
- Karen and I attended a conference at the German Foreign Office to help
them decide what role Germany and the EU should have at regulating the
sale of censorship and surveillance
On Tue, Nov 20, 2012 at 10:27:48AM -0600, Landon Campbell wrote:
I'm new to Tor, and I'm working on developing a crawler that uses Tor
via Polipo/C# HttpWebRequest. So far, making an HTTP request via Polipo
through Tor is working like a charm. However, I would like to change
my route/exit node
On Sat, Nov 17, 2012 at 11:34:36AM -1000, Name Withheld wrote:
does anyone know of an appropriate method for estimating a
(rough) number of how many users per day make use of your node?
http://research.torproject.org/techreports.html
See Privacy-preserving ways to estimate the number of Tor
On Wed, Nov 14, 2012 at 02:08:16PM +0600, Roman Mamedov wrote:
From what I can tell the Guard flag affects routed bandwidth very negatively.
After getting the flag the bandwidth drops off sharply and a Guard node will
typically push an order of magnitude (TEN times) less traffic than a
Tor 0.2.4.6-alpha fixes an assert bug that has been plaguing relays,
makes our defense-in-depth memory wiping more reliable, and begins to
count IPv6 addresses in bridge statistics,
https://www.torproject.org/dist/
Changes in version 0.2.4.6-alpha - 2012-11-13
o Major bugfixes:
- Fix an
Hi folks,
George and I have put together some instructions on how to set up
a Tor bridge + obfsproxy on Debian/Ubuntu:
https://www.torproject.org/projects/obfsproxy-debian-instructions
Getting more obfsproxy bridges up and running is useful because right
now they're the best way for users in
On Fri, Nov 09, 2012 at 01:45:22PM +0100, jiang song wrote:
hi, I think sock proxy port should be 9050
but with TBB, I notice that the socket port changes every time I started
TBB, like 49223, 58871
what is the reason for this? and is it possible to make it constant?
On Fri, Nov 09, 2012 at 01:08:15PM -0500, TorOp wrote:
Same here, but it just now responded.
Yes. Apparently it doesn't start on reboot. Also, it's old and buggy.
We're looking into ways to improve it, but all the Tor developers are
distracted by other things, so it keeps falling out of the
On Fri, Nov 09, 2012 at 01:27:03PM -0600, Joe Btfsplk wrote:
https://www.torproject.org/docs/faq#TBBSocksPort
That article mentions OS X / Linux, but I don't know that the issue
of Tor using other random ports (in the FAQ) does NOT apply also to
Windows?
The Windows TBB doesn't set the
On Fri, Nov 09, 2012 at 06:05:58PM -0500, Matthew Fisch wrote:
TorProject should be registered as an Apple software developer, and the
binary should be signed, both to increase credibility of the torproject
and the safety of users.
I agree with you about the 'safety of users' side. But I'm not
On Fri, Nov 09, 2012 at 06:09:36PM -0500, Matthew Fisch wrote:
I used a unique random password for this mailing list, I'm going to
guess however a significant portion of the mailing list either uses this
password in other locations, a significant subset of them probably can't
trust their mailbox
On Wed, Nov 07, 2012 at 03:35:38PM -0500, Chris Smart wrote:
Hi folks.
Disclaimer: The following question refers to website testing,
vulnerability identification etc.
Please bare in mind that I am an end user and not very knowledgeable
about internet security or so-called white hat
Tor 0.2.3.24-rc fixes two important security vulnerabilities that
could lead to remotely triggerable relay crashes, and fixes
a major bug that was preventing clients from choosing suitable exit
nodes.
I hope this will be the final release candidate for the 0.2.3 series.
That is, if we don't find
Tor 0.2.4.5-alpha comes hard at the heels of 0.2.4.4-alpha, to fix
two important security vulnerabilities that could lead to remotely
triggerable relay crashes, fix a major bug that was preventing clients
from choosing suitable exit nodes, and refactor some of our code.
On Tue, Oct 23, 2012 at 10:13:47PM -0400, Simon Brereton wrote:
See
https://metrics.torproject.org/users.html
What is a censorship event?
It's when the number of users in the country is sufficiently below
(or above) the expected number of users in the country, relative to
how usage numbers
On Mon, Oct 22, 2012 at 06:40:02PM +0200, esolve esolve wrote:
the paper
*Tor: The Second*-*Generation Onion
Router*http://www.usenix.org/event/sec04/tech/dingledine.html
talked about flow control and congestion control of Tor, but it may have
been out-dated.
are there any articles or
Tor 0.2.3.23-rc adds a new v3 directory authority, fixes a privacy
vulnerability introduced by a change in OpenSSL, and fixes a variety
of smaller bugs in preparation for the release.
I hope this will be the final release candidate for the 0.2.3 series.
That is, if we don't find any urgent
On Fri, Oct 05, 2012 at 09:31:57PM +0200, antispa...@sent.at wrote:
I have in a folder on a 64bit Linux distro the TBB. I read the Vidalia
bundle has been discontinued. So I jumped at using this configuration.
I have read that the socks 5 proxy is on 127.0.0.1:9050. So I tried
pushing through
On Wed, Oct 03, 2012 at 01:21:19PM -0400, Ted Smith wrote:
# calculates the clockskew and then finds a corrilating
# tor relay with an open http server with the same skew
So it actually assumes that the targeted hidden service is running a Tor
relay _and_ an open HTTP server.
In theory
On Mon, Oct 01, 2012 at 12:08:27PM -0400, David Goulet wrote:
I'm looking to run a Tor exit node but IPv6 only.
Anyone do/did that and got useful information about that?
I don't know the state of the Tor network using IPv6. Is there some
statistics somewhere about the number of nodes (or
On Sun, Sep 30, 2012 at 01:47:07PM +0100, Paul wrote:
When using DNSPort to resolve googlemail.com, I get the 'wrong' address:
$ host googlemail.com
googlemail.com has address 173.194.41.150
Host googlemail.com not found: 4(NOTIMP)
Host googlemail.com not found: 4(NOTIMP)
It should be
On Sat, Sep 29, 2012 at 05:05:02PM +0300, Arsen Zahray wrote:
Is it possible to change the tor's socks5 port?
Yes.
I've looked through options in Vidalia and through the documentation, and I
can't find anything of the kind
I don't think Vidalia can do it. You'll have to edit your torrc
Tor 0.2.4.3-alpha fixes another opportunity for a remotely triggerable
assertion, resumes letting relays test reachability of their DirPort,
and cleans up a bunch of smaller bugs.
https://www.torproject.org/dist/
Changes in version 0.2.4.3-alpha - 2012-09-22
o Security fixes:
- Fix an
On Fri, Sep 21, 2012 at 06:08:01PM +0530, Raviji wrote:
I am running tor, polipo, ttdnsd and pdnsd at system services.
Is there any tor firefox and chrome available without these
components ?
Not currently. Right now the only safe way to use Tor as a client
is with the Tor Browser Bundle.
See
On Sat, Sep 22, 2012 at 07:05:47AM -0500, Anthony Papillion wrote:
I'm not a networking guy. Sure, I can build a small business LAN but I'm a
software engineer and not a network guy. So please excuse me if this question
sounds stupid.
Can a remote website know my mac address?
Try a google
On Wed, Sep 19, 2012 at 10:00:33AM -0700, SiNA Rabbani wrote:
Somehow in August, Italy got a few thousand additional Tor users and
became third as far as usage of Tor:
France and Spain show similar growth.
We've seen some overall growth in total Tor user count too, perhaps due
to the recent
Tor 0.2.3.22-rc fixes another opportunity for a remotely triggerable
assertion.
We'll be putting out 0.2.2.39 packages shortly that fix the issue too.
https://www.torproject.org/download/download
https://www.torproject.org/dist/
(Packages coming eventually.)
Changes in version 0.2.3.22-rc -
Tor 0.2.4.2-alpha enables port forwarding for pluggable transports,
raises the default rate limiting even more, and makes the bootstrapping
log messages less noisy.
https://www.torproject.org/download/download
(Packages coming eventually.)
Changes in version 0.2.4.2-alpha - 2012-09-10
o Major
Here's what I said at the beginning of August that I hoped to do:
- Chair the FOCI workshop at Usenix Security, and also attend the rest
of Usenix Security.
https://www.usenix.org/conference/foci12/tech-schedule/workshop-program
Tor 0.2.3.21-rc is the fourth release candidate for the Tor 0.2.3.x
series. It fixes a trio of potential security bugs, fixes a bug where
we were leaving some of the fast relays out of the microdescriptor
consensus, resumes interpreting ORPort 0 and DirPort 0 correctly,
and cleans up other smaller
Tor 0.2.4.1-alpha lets bridges publish their pluggable transports to
bridgedb; lets relays use IPv6 addresses and directory authorities
advertise them; and switches to a cleaner build interface.
This is the first alpha release in a new series, so expect there to
be bugs. Users who would rather
On Thu, Aug 30, 2012 at 05:46:03PM -0500, SnakTaste wrote:
Hi, I normally use Thunderbird Firefox trough Tor w/instructions
from Toiyfy Tor button,
What is Toiyfy?
Whatever it is, it is unlikely to have good instructions. :)
the last update from Firefox made Tor
button to send several
On Wed, Aug 22, 2012 at 08:37:16PM +0200, Rejo Zenger wrote:
On 22 aug. 2012, at 16:07, Robin Kipp wrote:
I've already been running a Tor relay on that for quite a while,
but sadly had to find out that the server's IP subsequently got added
to several EMail blacklists - despite the server
On Tue, Aug 21, 2012 at 09:09:32PM +0300, juha...@wippies.fi wrote:
I succeeded to build a private tor network including some hidden
services in it and every tor-machine (ubuntu) is behind a different
router (multiple networks) I have tried to build my tor network as real
as possible in our lab
On Mon, Aug 20, 2012 at 10:33:29AM +0300, Maxim Kammerer wrote:
As you can see, sniffing just 25 Class-C networks (or 42 individual
nodes) lets an adversary correlate ~25% of (non-.onion) circuits.
I think your numbers may not be right (there are a lot of other subtleties
to the calculation),
On Thu, Aug 16, 2012 at 09:18:50PM -1000, Name Withheld wrote:
I notice some of the tor directories are showing my old server as
being online and routing traffic. That server:
*Router Name:*00routin0packets
*Fingerprint:*DD03 46F6 56DA 5F0E C9F6 5D7B FE56 38DA F3FB 2F6B
On Tue, Aug 14, 2012 at 11:06:12AM -0700, Damian Johnson wrote:
BandwidthRate is 20 KB
That is the very minimum bandwidth rate. Circuits are picked
heuristically based on the available bandwidth so by setting it to
such a tiny value you'll be largely unused.
Actually, it's lower than the
Here's what I said at the beginning of July that I hoped to do:
- Attend the Dev meeting and hack fest in Florence. Help everybody
understand about our upcoming grants, and the upcoming deliverables that
go with them.
Done. It was a great dev meeting and hack fest -- we had something like
40
On Sat, Jul 21, 2012 at 08:09:42AM +0200, machine wrote:
https://www.mozilla.org/en-US/firefox/organizations/all.html
but there hasn't been any update yet for The Tor Browser Bundle, which
has a Tor Browser version of 10.0.5.
Yep. I believe TBB 2.2.37-2 is still in the QA process on our
On Tue, Jul 17, 2012 at 02:58:13PM +, Aaron wrote:
Seems neat, but took me 8 tries to get it correct to get my bridges.
Linus says he can do it in 2 tries :-)
If English speakers have problems here, I wonder what that means for
non-English speakers. Or said another way, what's the state
(What is this mail? See my explanation from the May mail I sent:
https://lists.torproject.org/pipermail/tor-talk/2012-June/024572.html )
Here's what I said at the beginning of June that I hoped to do:
- Participate in the
Tor 0.2.3.18-rc is the first release candidate for the Tor 0.2.3.x
series. It fixes a few smaller bugs, but generally appears stable.
Please test it and let us know whether it is!
https://www.torproject.org/download/download
(Packages coming eventually.)
Changes in version 0.2.3.18-rc -
Hi folks!
As the Tor Project has grown in scope, we've been struggling to keep up
with simultaneously a) doing all the development that needs to be done
(including meeting deliverables for our funders), and b) keeping the
community up-to-date on our in-progress work.
Lately I've been writing
On Wed, Jun 20, 2012 at 05:13:16PM -0400, Patrick B wrote:
I made a blog post https://guardianproject.info/2012/06/20/orbot-data-tax/
on
the Guardian site about the data cost incurred by Orbot usage. It generally
seems quite manageable for most use cases. Running in the backround 24/7
for 30
Tor 0.2.3.17-beta enables compiler and linker hardening by default,
gets our TLS handshake back on track for being able to blend in with
Firefox, fixes a big bug in 0.2.3.16-alpha that broke Tor's interaction
with Vidalia, and otherwise continues to get us closer to a release
candidate.
On Fri, Jun 08, 2012 at 11:42:51AM +0200, Cristian Rigamonti wrote:
On Thu, Jun 07, 2012 at 06:12:02AM -, m...@tormail.org wrote:
Tor Browser Bundle (2.2.36-1)
...
BTW, https://check.torproject.org/RecommendedTBBVersions is still advertising
2.2.35-12, so the automatic startup
On Thu, Jun 07, 2012 at 06:12:02AM -, m...@tormail.org wrote:
* Why was FF13 not included in this release? *
Well, because it just came out, for one.
Every new Firefox release these days includes a pile of new privacy
disasters that Mike is scrambling to keep up with.
You might like
Tor 0.2.3.16-alpha introduces a workaround for a critical renegotiation
bug in OpenSSL 1.0.1 (where 20% of the Tor network can't talk to itself
currently). It also fixes a variety of smaller bugs and other cleanups
that get us closer to a release candidate.
The workaround for the OpenSSL bug will
On Fri, May 25, 2012 at 06:07:35PM +0200, pro...@secure-mail.biz wrote:
If I understand correctly, a bridge will be used as the first of three hops.
Yes. See also Item #2 on
https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor-bridges
including proposal 188:
On Thu, May 10, 2012 at 10:11:06PM -0400, johnmurphy...@safe-mail.net wrote:
IN= OUT=eth0 SRC=192.168.178.50 DST=some-target LEN=40 TOS=0x00 PREC=0x00
TTL=64 ID=0 DF PROTO=TCP SPT=50447 DPT=443 WINDOW=1002 RES=0x00 ACK URGP=0
This packet is https, most likely generated by my firefox user
On Sun, May 06, 2012 at 05:07:26AM -0400, eliaz wrote:
Of what use is a bridge working off an IP address of a provider located
in, say, the US, to a client in, say, Syria? Sorry for the elementary
question. - eli
The client in Syria can connect through the bridge in the US to reach
the Tor
Tor 0.2.3.15-alpha fixes a variety of smaller bugs, including making
the development branch build on Windows again.
https://www.torproject.org/download/download
(Packages coming eventually.)
Changes in version 0.2.3.15-alpha - 2012-04-30
o Minor bugfixes (on 0.2.2.x and earlier):
- Make
Your job would be to work on all aspects of the main Tor network daemon
and other open-source software. This would be a contractor position for
2012 (starting as soon as you're ready and with plenty of work to keep
you busy), with the possibility of 2013 and beyond.
Being a core Tor developer
On Fri, Apr 06, 2012 at 04:01:59PM -, BigTor wrote:
I have two internet apps that I want to run the same time, both using tor
socks proxy. I do not want the data streams of the apps routing thorugh
the same circuit. Is it safe two run two tor processes, with different
proxy ports?
On Wed, Apr 04, 2012 at 02:13:00PM -0700, J.C. Denton wrote:
Does anyone know where I can download this tool? I can't find it anywhere.
The short answer is that SkypeMorph is not ready for actual usage yet.
It is still at the research project stage.
It's great that researchers are working on
On Wed, Apr 04, 2012 at 02:51:44PM -0700, J.C. Denton wrote:
thank you for your guidance. what exactly should I run with Tor until
SkypeMorph is released? I have 3 portable browsers and all 3 register
different ip's when i go to www.whatismyipaddress.com/ should I only
run TOR and AdvancedTOR
On Wed, Apr 04, 2012 at 06:21:58PM -0400, Joseph Lorenzo Hall wrote:
There's been research by a CU Boulder team and Yoshi Kohno to this effect.
You can google it. best, Joe
There has been some research on what Tor *traffic* is, but the methodology
soundness is always a question. The question
On Thu, Apr 05, 2012 at 03:57:55AM +0300, Maxim Kammerer wrote:
Table 2 (with Germany at the top) in [1] does seem to suggest that
?Privacy enthusiasts? represent a significant proportion of Tor users.
Notice that this paper is quite old. Since then Iran, has hit the #2
country using Tor mark:
Tor 0.2.3.13-alpha fixes a variety of stability and correctness bugs
in managed pluggable transports, as well as providing other cleanups
that get us closer to a release candidate.
https://www.torproject.org/download/download
(Packages coming eventually. Speaking of packages, deb.torproject.org
On Fri, Mar 23, 2012 at 04:54:48AM +, James Brown wrote:
Earlier they often demanded answer to the CAPTCHA when I sent queries to
them throwg the Tor.
Today I find that they block my queries at all:
In the past, Google required that you have a Google cookie or they
wouldn't even give you a
On Sun, Mar 11, 2012 at 12:27:03AM +0100, andr...@fastmail.fm wrote:
In trying to access Tor while using a certain network the following
error/problem message appears in the log;
Mar 1 02:45:41.518 [Notice] Tor v0.2.2.35 (git-f). This is
experimental software. Do not rely on it for
On Sun, Mar 11, 2012 at 03:28:00AM +0100, andr...@fastmail.fm wrote:
Have you tried using bridges?
Yes, I have several bridges set already. Also, the Get Tor Bridges
button doesn't get any bridges- they must be obtained off the web
address in HELP.
Ah. I bet your bridges are all down.
On Sun, Mar 04, 2012 at 02:22:22AM -, m...@tormail.net wrote:
Who is 93.114.40.75?
The Tor check page lists it and says I'm not using Tor. Another user
reported this, too.
That's a false negative. In this case it happens because the Tor relay
exits from a different IP address than it
On Wed, Feb 15, 2012 at 08:07:06PM -0500, Justin Aplin wrote:
The link to the win32 expert bundle on the project website is broken
and should be corrected to
https://www.torproject.org/dist/win32/tor-0.2.3.12-alpha-win32.exe
Fixed.
Thanks,
--Roger
Tor 0.2.3.12-alpha lets fast exit relays scale better, allows clients
to use bridges that run Tor 0.2.2.x, and resolves several big bugs
when Tor is configured to use a pluggable transport like obfsproxy.
https://www.torproject.org/download/download
(Packages coming eventually.)
Changes in
On Sun, Feb 12, 2012 at 03:31:56AM +0100, Ondrej Mikle wrote:
It's also possible to run obfsproxy with stable Tor, one just needs to
execute
it manually, like mentioned here:
https://trac.torproject.org/projects/tor/ticket/5009#comment:17
Please don't run an obfsproxy bridge with Tor 0.2.2
On Fri, Feb 10, 2012 at 12:41:50PM +0100, Jacob Appelbaum wrote:
Watch this graph for an idea of the censorship impact of directly
connecting Tor users:
https://metrics.torproject.org/users.html?graph=direct-usersstart=2011-11-12end=2012-05-10country=irevents=ondpi=72#direct-users
Here's the
On Fri, Feb 10, 2012 at 05:42:01PM +0400, Phillip wrote:
Tried running through the instructions, have everything set up, and then
I reach a stumbling block - when I try to add
ServerTransportPlugin obfs2 exec /usr/local/bin/obfsproxy --managed
to the torrc file (through Vidalia), it gives
On Thu, Jan 26, 2012 at 10:35:20AM +0200, Maxim Kammerer wrote:
I see, so is that an optional feature that can be turned on by a MIX
router operator once served by a surveillance order? It seems to me
that it's an advantage over Tor, where relay operators can be served
with an order and some
Tor 0.2.3.11-alpha marks feature-freeze for the 0.2.3 tree. It deploys
the last step of the plan to limit maximum circuit length, includes
a wide variety of hidden service performance and correctness fixes,
works around an OpenSSL security flaw if your distro is too stubborn
to upgrade, and fixes
On Fri, Jan 20, 2012 at 08:48:38PM +0100, Sebastian G. bastik.tor wrote:
Could BACKLIT be implemented by Tor to protect it's users from traffic
analysis by traffic watermarking?
http://freehaven.net/anonbib/papers/backlit-acsac11.pdf
It could be implemented by Tor. There's a lot of research
On Fri, Jan 20, 2012 at 03:29:13PM -0500, Andrew Lewman wrote:
The network has a high bandwidth usage due to it massive user-base.
This idea should reduce the outgoing traffic of the exit and take
much load from the mid-relay and the entry point.
Lack of bandwidth isn't so much
On Sun, Jan 08, 2012 at 11:20:48AM +, Len Hill wrote:
Since installing Tor, I've been having problems with my browsers
(Safari/Firefox/Chrome) in that I can't log in to any site that requires a
log-in signature/password. Other sites are OK. I don't know if it is Tor
that has caused this
On Sat, Jan 07, 2012 at 01:45:10PM -0800, Kevin H. E. wrote:
I am wondering if it is possible to pass the hostname private key on a
hidden service directly to the control socket, without writing it to the
hard drive (and without passing it to the process as a startup argument).
Not currently.
On Fri, Dec 23, 2011 at 07:18:58PM -0500, Chris wrote:
Tor uses a set of currently 8 directory
authorities (I operate one of them, gabelmoo), and uses them to
bootstrap. Blocking them all is easy, and prevents bootstrapping for Tor
clients that aren't using bridges, but if a bridge is
On Wed, Dec 21, 2011 at 04:43:54AM -0500, h...@safe-mail.net wrote:
http://janusvm.com/ last release from Jan-2010, almost got Jan-2012, new tor
version just been released...
Is janusvm still safe?
No, not safe.
Probably has been unsafe to use for years.
--Roger
On Tue, Dec 20, 2011 at 03:04:10PM +0100, tor wrote:
Q1: Can the relay on the same node as the enclaved server also act as
a normal TOR exit node?
Yes.
Q2: How is it ensured that requests to an enclaved server are always
routed through the TOR relay on the same machine?
The
Tor 0.2.3.10-alpha fixes a critical heap-overflow security issue in
Tor's buffers code. Absolutely everybody should upgrade.
The bug relied on an incorrect calculation when making data continuous
in one of our IO buffers, if the first chunk of the buffer was
misaligned by just the wrong amount.
On Sun, Dec 11, 2011 at 12:15:18PM -0800, Erich Kroener wrote:
Here is my set-up and what I have done: Running v.0.2.2.34, Linux/Ubuntu
environ, Firefox of course with network.proxy.sock 'true' - all traffic
goes through SOCKS5. Connecting to network no problem.
You should be using Torbutton,
Tor 0.2.3.9-alpha introduces initial IPv6 support for bridges, adds
a DisableNetwork security feature that bundles can use to avoid
touching the network until bridges are configured, moves forward on
the pluggable transport design, fixes a flaw in the hidden service
design that unnecessarily
On Sun, Dec 04, 2011 at 09:53:01PM -0600, Pascal wrote:
While looking through http://torstatus.blutmagie.de I noticed a couple
relays that appear to be related but were not listed in each others'
family. Out of curiosity I whipped up a quick Perl script to check all
relays with
On Mon, Dec 05, 2011 at 09:31:27PM +0100, Fabio Pietrosanti (naif) wrote:
sometimes it happen that some Tor HS it's difficult to be reached.
I experienced a situation where from one Tor Client i've been able to
reach a Tor HS, while from another Tor Client i was not able to connect.
To
On Mon, Dec 05, 2011 at 09:07:25PM +0100, Fabio Pietrosanti (naif) wrote:
it would be possible to have a Tor HS running on two or more servers?
I am wondering how does the network will behave in a situation like that
a) Only one server will works
b) It will provide a sort of load balancing
On Thu, Nov 17, 2011 at 02:44:36PM -0500, Andrew Lewman wrote:
On Thursday, November 17, 2011 13:20:43 M wrote:
Can anyone guide me to an eays tutorial for installing vidalia or any other
TOR related application on my iphone 3g?
There's Marco's packages, http://sid77.slackware.it/iphone/
On Tue, Nov 15, 2011 at 07:16:19PM +0100, audd wrote:
if TOr is p2p network, why all connection I see on the network-map comes
from in the middle of U.s.A?
the nodes I see are really geolocalised in that areas?
Vidalia has one location for each country. So that's one dot for every
relay in the
On Tue, Nov 15, 2011 at 05:29:12PM +, Runa A. Sandvik wrote:
A bridge should not specify the ?MyFamily? option. You won't run a
middle relay or an exit relay in the cloud, so this shouldn't be an
issue.
As far as I understand, this is correct if you only run bridges (because
a
On Tue, Nov 15, 2011 at 05:01:48PM -0600, Joe Btfsplk wrote:
On one hand, I don't want to load up Aurora w/ all kinds of addons that
may interfere w/ Aurora's primary function. On the other, unless just
going to one or 2 sites staying there, using stock Aurora is
irritating at best,
On Tue, Nov 15, 2011 at 08:15:25PM +0100, audd wrote:
but if it's so why GFW chinese censorship can track and deny access to
tor bridge?
https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor-bridges
China is known to be doing #1, and recently suspected to be doing
something
On Thu, Nov 03, 2011 at 04:23:48AM -, toru...@tormail.net wrote:
i believe there is a real need for secure communications but as a new user
to tor it seems the common entry points to the network are rife with
criminal activity.
the torproject website lists users as friends and family,
On Thu, Nov 03, 2011 at 03:49:28PM -0400, Nathan Freitas wrote:
While is definitely a feature that has a cool factor to it and will get
some attention, I want to make sure we have thought through the
risks/downsides of utilizing this feature, so that we can communicate
them in any blogs,
On Mon, Oct 31, 2011 at 09:12:09AM +0100, cats wrote:
On Wed, 2011-10-19 at 13:40 +0200, cats wrote:
I have been experimenting with the thought of running two Tor clients at
once on my machine. So I decided to try it and modified the source a bit
to let me run two clients at once (of course
On Mon, Oct 31, 2011 at 11:00:38AM +0100, Sebastian Hahn wrote:
I'd like to set up an exit enclave on a machine I have, but I don't want
it to relay any other traffic. Not even as a middle node. It only seems
to be possible to set up a server as an exit enclave if you also make it
a middle
On Sun, Oct 30, 2011 at 05:31:34PM -0700, Jacob Appelbaum wrote:
otherwise, I sometimes use a
HTTP proxy with proxychains to prevent DNS leaky applications that have
not and will never implement SOCKS.
This is the crux of the question: which ones? And are they applications
that we think are
Tor 0.2.3.7-alpha fixes a crash bug in 0.2.3.6-alpha introduced by
the new v3 handshake. It also resolves yet another bridge address
enumeration issue.
https://www.torproject.org/download/download
Changes in version 0.2.3.7-alpha - 2011-10-30
o Major bugfixes:
- If we mark an OR connection
On Fri, Oct 28, 2011 at 03:09:38PM -0500, Jon wrote:
Oct 28 07:51:21.106 [Notice] Tor v0.2.3.6-alpha
(git-47dff61061f4bfc2). This is experimental software. Do not rely on
it for strong anonymity. (Running on Windows 7 Service Pack 1
[workstation])
Duplicate call to connection_mark_for_close
401 - 500 of 542 matches
Mail list logo