On Fri, 19 Mar 2021 19:07:38 +0100
Markus Reichelt wrote:
> * Nick Mathewson wrote:
>
> > There's a new alpha Tor release! Because it's an alpha, you should
> > only run it if you're ready to find more bugs than usual, and
> > report them on gitlab.torproject.org.
>
> it isnt mentioned in
On Fri, 5 Feb 2021 08:51:56 -0500
David Goulet wrote:
> Can you expand here on why you think an operator using a /64 is worst than an
> operator using an IPv4 /24 to run their relays?
In the IPv4 a single person will rarely have an entire /24 to themselves; as
such connections coming from
On Fri, 22 Jan 2021 12:02:50 -0500
Nick Mathewson wrote:
> o Major bugfixes (authority, IPv6):
> - Do not consider multiple relays in the same IPv6 /64 network to be
> sybils. Fixes bug 40243; bugfix on 0.4.5.1-alpha.
Each /64 should be treated as an equivalent to 1 address in the
On Wed, 25 Nov 2020 07:54:39 +0100
Jonathan Marquardt wrote:
> I am using the Debian Tor repo on quite a few Debian machines and since a few
> days now, none of these machines are able to use the repo.
>
> "apt update" gives me:
>
> Err:6 tor+http://sdscoq7snqtznauu.onion/torproject.org
On Tue, 4 Feb 2020 23:17:32 -
mimb...@danwin1210.me wrote:
> Blutmagie seems to be permanently gone, sadly.
>
> It was great because you could see the speeds of the exit nodes plus their
> country.
>
> Is there a commonly accepted best replacement?
Hello,
Check out
On Tue, 04 Jun 2019 19:14:12 +0300
Van Gegel wrote:
> Maybe after publication on popular Russian resource Habr:
> https://habr.com/ru/post/448856/
> This is Android app for talking over Tor:
> http://torfone.org/download/Torfone.apk
> http://torfone.org/download/Torfone_Android_howto.pdf
>
On Sun, 14 Apr 2019 00:54:42 +0400
meejah wrote:
> Mirimir writes:
>
> > Even so, that's a little fragile. Mistakes happen. And there's the issue
> > of web server error messages from the onion site going to clearnet.
> > That's one of the mistakes that got DPR pwned.
>
> The best solution to
Hello,
Does Tor currently use IPv6 connections for relay-to-relay traffic?
I now got some IPv6 relays which access IPv4 via tunneling to a separate
router, so it would *really* benefit my setup if some of the Tor traffic would
move to going over IPv6 directly. However that doesn't seem to be the
On Sun, 10 Feb 2019 17:23:55 +0100 (CET)
Nathaniel Suchy wrote:
> > So the state of available XMPP Clients today kinda sucks. There's Pidgin
> > available for Linux Systems
Any issue with Gajim?
> The alternative is "chat apps" like Signal by OpenWhisper or Wire by Wire
Might as well suggest
On Tue, 08 Jan 2019 03:37:00 +
bo0od wrote:
> Detective Conan (named as case closed in America) which considered to be
> the most famous cartoon in Japan.They produced a Movie in April,2018
> named as "Zero the Enforcer" they mentioned stuff related to Tor Project
> but in different ways,
On Tue, 18 Dec 2018 10:18:55 +0200
Lars Noodén wrote:
> On 12/18/18 10:07 AM, Kevin Burress wrote:
> > How about "A Guard"
> Yes, "A guard" would also reduce the potential for confusion, and it's
> even shorter. The log error should clearly convey the information of
> whose guard is being
On Thu, 18 Oct 2018 10:26:34 +0100
Iain Learmonth wrote:
> On 16/10/18 13:17, George wrote:
> > While metrics. continues to be a next step, I still find myself wishing
> > for the simple birds-eye view that your Tor Status provides.
>
> Can you provide some examples of things you can do with
On Tue, 16 Oct 2018 10:58:15 +0200
Olaf Selke wrote:
Hello,
> I'm planning to shut down my Tor network status site within the next
> weeks. The payed SSL certificate will expire 11/06/18
You don't have a redirect to HTTPS, I never knew you had that in the first
place, always accessing the
On Sat, 22 Sep 2018 15:28:19 +0100
Ben Tasker wrote:
> You need to configure your onion server block to respond on port 443 _and_
> to handle your clearnet host header (and serve a publicly trusted
> certificate matching that name). Alt-Svc tells the browser to use the
> alternate address as a
On Sat, 22 Sep 2018 15:28:19 +0100
Ben Tasker wrote:
> Which part are you struggling with?
>
> The following is assuming you've got a site - www.example.com - that's
> accessible at 1234.onion.
>
> Configure your nginx server block (or apache config) for www.example.com to
> include an Alt-Svc
On Sat, 22 Sep 2018 13:45:33 +0100
Alec Muffett wrote:
> I've spent the morning pulling together a bunch of draft thoughts regards
> the technical pros/cons of differing forms of site onionification;
> thoughts, comments & feedback are warmly welcomed:
>
>
On Tue, 18 Sep 2018 19:59:00 +
TNT BOM BOM wrote:
> whythe hell would anyone use anything from Cloudflare with Tor???
Because people use Tor to browse the Internet, and half of the Internet is
nowadays CloudFlare. If you're looking to advance a point of view such as [1]
-- which may be
On Wed, 25 Jul 2018 01:14:12 -0700
Mirimir wrote:
> True. But I'd rather use the Whonix approach. It's doable using two VPS.
> That is, if the provider will cooperate. One VPS runs the web server,
> and it has no Internet connectivity or public IP, just a private IP on a
> local network. The
On Tue, 24 Jul 2018 10:12:24 +0200
bic wrote:
> > 2) I enjoy the print output when it's configuring the namespaces, but
> > there's no need for so much yelling :) (s/TOR/Tor/) [1]
> >
> > > print G " * Resolving via TOR"
> > > print G " * Traffic via TOR..."
> > > print G " * Creating the TOR
On Thu, 31 May 2018 11:29:00 +
nusenu wrote:
> Due to the upcoming end-of-life date of Debian GNU/Linux 8 ("jessie")
> on the 17th of June 2018
>
> I'll drop support for Debian 8 in
> ansible-relayor with the next release (planned for 2018-06),
> please upgrade to Debian 9 if you want to
On Thu, 10 May 2018 21:53:00 +
nusenu wrote:
> I had a look at the Tor DNS landscape:
>
> An Analysis of the Tor DNS Landscape
> https://medium.com/@nusenu/who-controls-tors-dns-traffic-a74a7632e8ca
"Level 3" on the charts is most likely the notorious
On Tue, 17 Oct 2017 01:37:55 +0500
Roman Mamedov <r...@romanrm.net> wrote:
> On Mon, 16 Oct 2017 16:25:43 -0400
> InterN0T <inter...@protonmail.com> wrote:
>
> > If you can use Tor bridges in China
>
> You can't:
> https://metrics.torproject.org/userstats
On Mon, 16 Oct 2017 16:25:43 -0400
InterN0T wrote:
> If you can use Tor bridges in China
You can't:
https://metrics.torproject.org/userstats-relay-country.html?start=2017-07-18=2017-10-16=cn=off
Only about 1000 users in a 1.4bn country, bridges don't work there, or at
On Wed, 20 Sep 2017 11:24:57 +0200
Fabio Pietrosanti - Lists wrote:
> Hello,
>
> a close friend (faffa) noticed that on 28th August 2017 there was an
> unusual spike of Tor traffic in Egypt and Turkey:
>
>
Hello,
Has anyone considered making a Tor bridge protocol with ICMP as transport?
https://github.com/DhavalKapil/icmptunnel
http://www.mit.edu/afs.new/sipb/user/golem/tmp/ptunnel-0.61.orig/web/
http://thomer.com/icmptx/
http://code.gerade.org/hans/
Or tunneling over DNS?
On Mon, 4 Sep 2017 17:04:10 +0200
Jon Tullett wrote:
> As it happens, I just recently transferred funds internationally. It
> took 36 hours to clear, at a guaranteed rate. My local bank charged
> about $8 in fees
But that's still within Europe or the like? Internationally
Aug 28 06:19:48.000 [warn] Permissions on directory /var/run/tor are too
permissive.
Aug 28 06:19:48.000 [warn] Before Tor can create a control socket in
"/var/run/tor/control2", the directory "/var/run/tor" needs to exist, and to
be accessible only by the user and group account that is running
On Thu, 24 Aug 2017 13:55:11 +0200
Olaf Selke wrote:
> Hello folks,
>
> blutmagie now offers views on Tor router count and traffic for each AS.
> It's just a different php/SQL view on the same db like the main page.
> Maybe you find it somewhat useful.
>
> 1.) List
Hello,
Today I found that it is possible to force OpenSSL enable the use of CPU AES
acceleration even if it doesn't detect the "aes" CPU flag.
Many VPS hosts configure their hypervisors in a way that does not have the
flag passed through into VPSes, even though all their host nodes surely have
On Sun, 6 Aug 2017 02:19:05 +0500
Roman Mamedov <r...@romanrm.net> wrote:
> > There's a new alpha Tor release available! The source is available
> > from the "download" page on the website on the website, and packages
> > should be available before long
On Tue, 1 Aug 2017 16:30:35 -0400
Nick Mathewson wrote:
> Hi, all!
>
> There's a new alpha Tor release available! The source is available
> from the "download" page on the website on the website, and packages
> should be available before long.
So I am using:
> deb
On Wed, 2 Aug 2017 01:57:49 +0900
Tom Tom wrote:
> I recently heard that Raspberry Pi could be used as various server, so I'd
> like to buy and use Raspberry Pi as tor relay.
Make sure you get the Raspberry Pi version 3. It is much more powerful than
previous ones,
On Thu, 13 Jul 2017 07:06:03 +0200
"Tom A." wrote:
> Hi Grump,
> thanks for the classification. who is able to evaluate this? rather than
> posting vagueness?
> at which apps can you add/apply customized e2e encryption?
>
Hello,
Does https://atlas.torproject.org/ work very poorly for anyone else?
Half of the time it fails to find any information about the requested relay (by
fingerprint), after some reloads it works. Searches also often fail with "Atlas
is unable to get a response from its backend server."
Also,
Hello,
https://www.rt.com/business/388502-ukraine-bans-vk-yandex/
Correspondingly we see a hockey stick graph for Tor users in Ukraine:
https://metrics.torproject.org/userstats-relay-country.html?start=2017-02-18=2017-05-19=ua=on
On Thu, 22 Dec 2016 06:25:18 -0700
Mirimir wrote:
> On 12/22/2016 06:00 AM, laurelai bailey wrote:
> > Then i completely misread the previous threads. That happens sometimes o_o
>
> Well, you didn't _completely_ misread the thread.
>
> By default, users will be installing a
On Tue, 20 Dec 2016 23:38:43 -0500
hi...@safe-mail.net wrote:
> I just think that this new single-hop system should have been reserved for a
> different Tor source/installation, dedicated only to non-anonymous hidden
> services, not merge it with the regular Tor software. And this for security.
On Mon, 19 Dec 2016 18:20:41 -
"podmo" wrote:
> I could ...turn AMT off entirely.
Unfortunately that's only what it wants you to believe. With the capabilities
it has, and with its code being entirely closed source and unaudited, for a
truly secure system you can't rely
On Mon, 12 Dec 2016 00:12:54 -0700
Mirimir wrote:
> > Also: "-A OUTPUT -i lo -j ACCEPT" is neither a valid rule, nor is it
> > necessary, since loopback traffic is already allowed at input and stateful
> > inspection is enabled both ways.
>
> Not valid? It works for me.
On Mon, 27 Jun 2016 22:38:21 +0200
Aeris wrote:
> > Except you can only run two per IPv4 address, and more IPv4 addresses bear
> > additional cost (and some management overhead).
>
> Why can you only run 2 instances per IP ?
> AFAIK, you can run any instances you want,
On Mon, 27 Jun 2016 18:42:02 +0200
Aeris wrote:
> > So does this mean it is useless to run an exit on my 8 core system?
>
> Just run enough Tor instances to fill you cores or bandwidth :)
>
Except you can only run two per IPv4 address, and more IPv4 addresses bear
On Mon, 13 Jun 2016 01:17:08 +0500
Roman Mamedov <r...@romanrm.net> wrote:
> > entry node---> exit node ---> website
>
> You don't even need 2 hops in this case. Why not propose 1-hop?
Oh actually, just remembered reading about that somewhere -- and turns out it
w
On Sun, 12 Jun 2016 21:56:34 +0200
gdfg dfgf wrote:
> I have read the proposal for non hidden .onion services for sites that don't
> need anonymity but want to use Tor's end to end encryption and
> authentication, for example Facebook.
>
> Could the same be done for people
On Mon, 9 May 2016 16:28:33 +0200
Andreas Krey wrote:
> To me it looks like the tor exit is using a squid
> proxy - is that an acceptable thing to do as a
> relay operator?
Squid itself is just a tool, sure it can cache, it can log all requests, but is
it configured to do so? Not
On Thu, 25 Feb 2016 12:21:42 -0800
Ryan Carboni wrote:
> http://netfpga.org/site/#/systems/1netfpga-sume/details/
>
> This is apparently available for an academic price of around two
> thousand dollars.
And then you have a programming job on your hands to adapt Tor into the
On Wed, 20 Jan 2016 20:57:57 +0200
Lars Noodén wrote:
> I checked the FAQ and it is unclear about precisely what to do about
> sites that gratuitously block Tor. Just recently I noticed that
> www.justice.gov blocks Tor. For example the URL
>
>
On Sat, 31 Oct 2015 10:10:49 +
demos wrote:
> by the way a current alternative to twitter is twister:
> http://twister.net.co/
Speaking of Twitter alternatives, I find GNU social can be made into a really
nice one. Example: https://quitter.se/
It's not full
On Tue, 6 Oct 2015 20:57:53 +0100
Ben Tasker wrote:
> Google will redirect you to a region specific version of Google based on
> geo-location of your source IP. This the the IP of the Tor exit node you're
> using, which is why it differs to your location.
>
> If you set
On Sun, 4 Oct 2015 15:39:13 -0400
Bryan Gwin wrote:
> My name s Bryan Gwin (I have my masters in computer science) and I have a
> quick question. Is it possible for someone to design some software that can
> utilize the Tor network (i.e. software that will allow users
On Wed, 9 Sep 2015 23:06:28 +1000
Luke Millanta wrote:
> Hello,
>
> Karsten asked me to send a quick introduction about my new web service,
> OnionView.com
Upon clicking any of the circles it takes me to the maximum zoom level at the
corresponding city/location (literally
On Sat, 29 Aug 2015 10:55:02 +0200
blaatenator blaatena...@openmailbox.org wrote:
Are there more recommendations regarding this sort of stuff? Like a
'best buy' guide for secure hardware, or ways to work around insecure
hardware.
Take a look at http://www.fsf.org/resources/hw
--
With
On Sat, 29 Aug 2015 17:11:23 +0200
blaatenator blaatena...@openmailbox.org wrote:
Indeed, some (coincidentally???) big corps do block relays. For a while
I ran a relay from my home connection and for instance Nike was not
reachable without the use of a VPN (I don't mind, and even favor, Nike
On Sun, 23 Aug 2015 16:22:18 +0200
Olaf Selke olaf.se...@blutmagie.de wrote:
not everybody feels comfortable relying on a service from Moscow
On Sun, 23 Aug 2015 16:53:47 +0200
Tom van der Woerdt i...@tvdw.eu wrote:
run it from a more favorable location
Really now, so everyone is silently
On Tue, 11 Aug 2015 15:28:01 -0700
Yuri y...@rawbw.com wrote:
On 08/11/2015 15:13, Ryan Carboni wrote:
Why is there no multicore support for Tor? I haven't been able to find an
answer to this question.
This is maybe because even with the quite high for the Tor network
bitrates of
On Tue, 11 Aug 2015 21:08:45 -0700
Ryan Carboni rya...@gmail.com wrote:
Does anyone in Tor want to name a price to get this task done?
The price of a public dedicated ip address is at worst, $20 a month.
What. More like $3-5, and that's indeed at worst, with the price more
commonly
On Fri, 31 Jul 2015 18:58:40 -0400
grarpamp grarp...@gmail.com wrote:
On Fri, Jul 31, 2015 at 6:36 PM, nusenu nus...@openmailbox.org wrote:
Is anyone aware of software (incl. malware) that ships Tor v0.2.4.23 for
Windows?
On Mon, 27 Jul 2015 18:54:59 + (UTC)
bao song michaelw...@yahoo.com.au wrote:
A few weeks ago, I suddenly could not access comicskingdom.com with Tor.
For several years before that, I had no problem accessing comicskingdom.com
with Tor.
It might be interesting to figure out how they are
On Wed, 22 Jul 2015 08:59:43 -0700
Apple Apple djjdjdjdjdjdj...@gmail.com wrote:
On 22 Jul 2015 13:22, Jacob Appelbaum ja...@appelbaum.net wrote:
DVD drives are programmable computers until we find evidence
suggesting the opposite.
And USB host controllers?
DVD drives really are; see for
On Sat, 27 Jun 2015 17:42:35 +0200
chloe ch...@countermail.com wrote:
Hello,
I have a question regarding some strange behavior on some nodes(11 of
them).
See this access-log:
81.89.0.201 - - [25/Jun/2015 12:25:30] GET /db/backups/965110218-2015
HTTP/1.1 200 5057
37.187.202.46 -
On Fri, 26 Jun 2015 05:25:04 -0400
Griffin Boyce grif...@cryptolab.net wrote:
Most of the configuration (at least in my case) has to do with
deciding on the right speed for the relay and setting a bandwidth cap.
And when using a VPS, I set AccountingMax and AccountingStart to
stay
On Thu, 10 Jul 2014 08:02:32 -0700
C B cb...@yahoo.com wrote:
Any chance of creating a non-javascript version of the Atlas, at
https://atlas.torproject.org/ ? I can access it by allowing temporary all
access, but it seems that it would be easier if a non-javascript version
could be
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets, however we shouldn't do anything that will hurt our users nor
should be
On Sat, 5 Jul 2014 10:05:10 -0700
Bobby Brewster bobbybrewster...@yahoo.com wrote:
if your non-VM host system has been compromised, there is absolutely no
notable advantage to using a vm. your vm will be affected by the
malware that sits on the host system.
I don't understand this. If
On Thu, 3 Jul 2014 04:15:37 -
Paul A. Crable p...@crable.us wrote:
It appears to me that visa.com is blocking access to its site by users
using TOR.
Yes, and they even block IPs of non-exit relays.
But that's somewhat of an old story, in this case it is still Akamai who's to
blame, and
On Tue, 01 Jul 2014 11:49:03 -0700
Garth Patil ga...@tunnel19.com wrote:
Hi,
I'm using Tor Browser 3.6.2-MacOS. I have a site that uses a free class
1 SSL cert from StartCom https://www.startssl.com/. Recent versions of
Chrome and Firefox don't seem to have this problem, but Tor Browser
On Wed, 25 Jun 2014 21:28:42 +0100
Mark McCarron mark.mccar...@live.co.uk wrote:
I have been examining the number of what would normally be deemed as illegal
sites sites on Tor. Eliminating the narcotics trade, as these tend to be
intelligence agency backed enterprises, a serious decline
On Tue, 24 Jun 2014 15:07:16 +0200
Anders Andersson pipat...@gmail.com wrote:
The reason would be to minimize the chances of the exit IP ending up
in some overzealous blacklist.
I think the long-time position of the Tor project was that if someone wants to
block all Tor exit relays, they
On Tue, 10 Jun 2014 10:49:01 +0200
Anders Andersson pipat...@gmail.com wrote:
On Mon, Jun 9, 2014 at 9:18 PM, Antonio Z adbeiler4...@gmail.com wrote:
I understand that it is not necessary, but I believe that making your
own ad blocking software would bring more people to tor. It does not
Hello,
Recently on this mailing list and on tor-relays there have been some cases
when relay nodes using standard ports commonly used for other services as
their ORPort cause issues with ISPs of someone else running a relay.
Notably once a relay on port 53 have triggered high DNS traffic anomaly
Hello,
The [1] page currently does not mention anything about IPv6 at all; after
following the instructions in it, the bridge only listens on IPv4.
If I add an IPv6 ORPort as described in [2], this does make Tor itself listen
on IPv6, but still the obfsproxy only opens an IPv4 port:
May 22
On Thu, 10 Apr 2014 18:24:00 +0100
John Williams j...@pond-weed.com wrote:
3. If I run obfsproxy, should I open the regular tor port 9001 to the
internet also? Or will that get me onto blacklists of known tor
bridges and cause my whole IP address to be blocked?
The regular tor port doesn't
On Sat, 25 Jan 2014 14:33:12 -0700
Mirimir miri...@riseup.net wrote:
Analogous private networks, generally called anonets, are also routed
via VPNs through the Internet.
There is anoNet/anoNet2 [1] which are a very specific particular project; but
that's the first time ever I hear that private
On Thu, 16 Jan 2014 16:25:38 -0800 (PST)
C B cb...@yahoo.com wrote:
A different error code, this time from http://www.funtrivia.com/
Access Denied: code FTTT
F*** This Troublesome Tor? :)
--
With respect,
Roman
signature.asc
Description: PGP signature
--
tor-talk mailing list -
On Wed, 4 Dec 2013 10:57:36 -0800
James Marshall ja...@jmarshall.com wrote:
SOCKS 5 is insecure if the client and server are on different hosts and
What exactly that insecurity consists of?
If your aim is to open an client-less in-proxy to Tor network for anyone to
use, then you might just as
On Wed, 27 Nov 2013 17:59:39 -0600
Ed Fletcher e...@fletcher.ca wrote:
There has been lots of discussion on this list about the Safeplug, which
didn't garner much enthusiasm from the list members. I haven't seen
this project mentioned:
http://www.orp1.com/
An open-source software and
Some more information from [1]
- users can whitelist certain sites so that their use is not run through Tor.
- Users can also set up Safeplug to work on a per-browser basis, so for
example Firefox may always run through Tor while Chrome won’t.
- users can also set themselves up as Tor nodes
On Fri, 22 Nov 2013 06:25:33 -0500
Sean Alexandre s...@alexan.org wrote:
On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
http://www.cnx-software.com/2013/11/22/49-safeplug-tor-router
On Fri, 22 Nov 2013 10:56:55 -0500
and...@torproject.is wrote:
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds more clients to the network without
giving back in the form of relays or bridges.
If these are all real people using and getting
On Fri, 22 Nov 2013 10:45:35 -0800
Yuri y...@rawbw.com wrote:
Also, without the device being open source (and how can it really be?)
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design level, but
they could post source-code for the firmware with the instructions
On Thu, 21 Nov 2013 01:39:47 -0800
Yuri y...@rawbw.com wrote:
I have a tor relay running with default parameters, see torrc below.
Ports 9001 and 9030 are forwarded WAN-tor server on LAN in router, and
LAN-WAN is open.
There are no messages in log, all seems to be ok.
'No messages'? So
On Fri, 25 Oct 2013 12:17:57 +
Mads Tinggaard Pedersen m...@itu.dk wrote:
shape of the network, perhaps based by country?
what nodes in the network graph is connected to one another.
There is no real shape or topology or any fixed node-to-node connections
to speak of, really. Each client
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 23 Oct 2013 22:23:48 -0700
Bry8 Star bry8s...@inventati.org wrote:
As far as i'm aware there are few voice text language
physical-machine based translator, that can convert language, and
then speak it out with another speakers voice in
On Thu, 24 Oct 2013 16:42:02 -0400
krishna e bera k...@cyblings.on.ca wrote:
What if TBB was labelled as Portable Tor Browser Bundle or Portable
TBB? (on each appropriate platform)
...then everyone who doesn't need to use it in an actual portability scenario
(on an USB stick) would look
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 22 Oct 2013 14:40:52 +
Trigger Happy triggerha...@openmail.cc wrote:
Just an idea. In theory : is it possible to implement bitcoin wallet
into tor-relay and TBB 1) ? TBB users could tip tor-relays (f.e. 1
satoshi for guard and middle
On Tue, 22 Oct 2013 19:41:27 +0200
Eugen Leitl eu...@leitl.org wrote:
On Tue, Oct 22, 2013 at 10:09:52PM +0600, Roman Mamedov wrote:
1).I think Cody Wilson is working on a bitcoin wallet in a browser.
Please stop trying to make people build buttcoin wallets into everything
On Sun, 20 Oct 2013 18:58:34 +0200
Antispam 06 antispa...@sent.at wrote:
On 20.10.2013 18:09, Anonymous wrote:
What about users own domains? :)
Checked that list. Mostly vanity domains like $fist_name@$last_name.com.
I think it's the same with car licence plates.
I am not sure what about
On Wed, 16 Oct 2013 02:00:23 -0400
grarpamp grarp...@gmail.com wrote:
Ironic to see them using these to link to recent revelations when...
- it's centralized,
Irony here is that all three of you are still using GMail. :)
--
With respect,
Roman
signature.asc
Description: PGP signature
--
On Sun, 13 Oct 2013 17:25:02 -0400
starli...@binnacle.cx wrote:
Hello,
I've recently established a full-time relay
running on a fast Linux router. Working nice
with version 0.2.4.17-rc.
Have a daily offsite backup that was butting heads
with TOR traffic, so I wrote a 'tor_bwreduce' and
On Sun, 06 Oct 2013 02:41:34 +
mirimir miri...@riseup.net wrote:
There's already a question about this on https://tor.stackexchange.com/.
On Sun, 06 Oct 2013 02:39:01 +
mirimir miri...@riseup.net wrote:
Better would be creating questions on https://tor.stackexchange.com/ :)
So? Have
Hello,
I was surprised to see that Version 2.3.25-12 is still the Recommended at
https://www.torproject.org/download/download-easy.html.en
From the looks of it, that one might not be too useful at the moment:
root@asuka:~# grep stats /var/log/tor/log | tail -n3
Sep 17 08:39:26.000 [notice]
On Tue, 17 Sep 2013 08:12:18 -0345
Nathan Suchy theusernameiwantista...@gmail.com wrote:
Why abuse a Tor for Torrents? Just pay $5 for a VPN...
No one suggests to use Tor for actual torrent download, people just use it to
get to the tracker/catalog websites which are becoming blocked by ISPs.
On Sun, 15 Sep 2013 07:45:57 +0200
Sebastian Pfeifer sebast...@pfeifer.or.at wrote:
It somehow could be true what you say as I run tor on a machine with
really really really small RAM (128MB) as I don't 'shit' money as a
pupil to afford a bigger server.
I wonder how much are you paying for
On Wed, 11 Sep 2013 14:00:56 -0400
Michael Wolf mikewol...@gmail.com wrote:
I've been running a Tor Relay (not an exit node) from my home for quite
a while now, and up to this point have not encountered any issues
accessing any sites. However, today I attempted to access
On Wed, 11 Sep 2013 21:30:35 +0200
Antonio J. Delgado anto...@susurrando.com wrote:
I just receive a letter from my ISP abuse department. Someone tried to
do some SQL injection attack using my tor node
[tor-talk] My reason to stop using Tor
using Tor
using Tor != running a Tor exit node.
On Mon, 9 Sep 2013 00:49:15 -0400
Chris Patti cpa...@gmail.com wrote:
I realize this is release candidate code, and the answer may well be if
you need to ask this question you shouldn't be running it but is there any
way to get the latest RC builds installed via the usual apt-get mechanisms
Hello,
It used to be that one could easily run a Tor relay in 512MB of RAM with lots
of headroom remaining. However, here is what I am now seeing on some nodes:
-
KiB Mem:508936 total, 503728 used, 5208 free, 48 buffers
KiB Swap: 1048572 total, 278072 used, 770500 free,
On Wed, 4 Sep 2013 07:56:00 +0200
Andreas Krey a.k...@gmx.de wrote:
Do you mean can't or don't want to?
The latter;
I mean we may indeed want to discriminate against (i.e. block) some clients,
if the intent of those is to harm the Tor network or any specific hidden
services.
It is of course
Hello,
With the influx of popularity that Tor now sees, we need a way to figure out
who/what are all these new users and what are they actually doing.
Maybe this has been proposed or considered before, but...
Why not make all exit nodes collect e.g. stats about top 10 most actively
requested
Hello,
Came across this project:
http://www.vpngate.net/en/
From the looks of it all the volunteers effectively operate open proxies for
anyone who connects to this service. To me this sounds like a total insanity,
even running a Tor Exit node can be dangerous (even though you have
On Mon, 2 Sep 2013 05:27:45 -0400
grarpamp grarp...@gmail.com wrote:
You chose to provide last hop services (whether exit or vpn), any trouble
you catch does not depend on deniability of the source.
Tor exit nodes can't help in finding the anonymized originator of an illegal
communication, so
1 - 100 of 124 matches
Mail list logo