:
If you limit the the `circ_max_megabytes` option in the Bandguards module,
will that work as some kind of DoS protection?
Question 3:
When, approximately, will we see the Vanguards add-on in the Tor source?
Thanks in advance,
Hikki
Greetings from Finland!
--
tor-talk mailing list - tor-talk
I’ve got a technical question: How dangerous are malicious entry guards?
I’ve seen very little info on this subject. Some state that there’s no
immediate danger, while others state that you’ll “die on arrival”, especially
if you’re operating a high risk onion service that falls into the
They're basically talking about eliminating criminal activities facilitated
online by the darknet, by making Tor and the dark web illegal and inaccessible
in Europe. It was also stated that most of those who access the dark web are
actual or potential criminals who need to be stopped before
not working for a
longer period of time, but v2 services come right back up with no problems.
--Hikki, Finland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
/lib/tor/ folder, tried on
a different computer running a different Linux version. Also tried a
different ISP. Think I've tried about everything, I like to believe I have
some competence.
-Hikki-
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
Will the next gen hidden services be more at risk of deanonymization during
this transition period?
Original Message
From: David Goulet
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Questions
How long does Tor keep entry nodes before switching to another set?
And are there any safety precautions you can make in regards to entry nodes?
Thanks!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://duckduckgo.com has become increasingly better lately. Only during
the past 6 months or so, their search results have become almost on par
with the big ones, like Google, Bing, etc.
In regards to Google, it all comes down to censorship and anti-privacy.
Just like Microsoft and Windows
There's a program out there that utilizes the GPU in your system to create a
custom, kind of, onion address. At least the few first characters at the
beginning of the address. So you can create an onion address like
googleja6vbnyma6.onion. I've seen people being able to create a 7 character
know that my hidden service is really running anonymously, and not
with just 1-hop, besides just trusting the config defaults?
Please prove me wrong. I'm just concerned here, and just want some feedback.
Thanks for understanding!
-Hikki
--
tor-talk mailing list - tor-talk@lists.torproject.org
I was just wondering if you compile Tor on a 64 bit Linux distro, will it
make a 64 bit executable? Or is it 32 bit only? Would be nice if it had
supported 64 bit processing.
-Hikki
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https
strong encryption, by today's standard on regular computers,
will be effortlessly broken within reasonable time.
So, where does this put Tor, encryption and general privacy? Shouldn't we
start preparing ourselves for the inevitable privacy apocalypse?
- Hikki
--
tor-talk mailing list - tor-talk
atches. But they have become much better, thankfully!
- Hikki
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
A new Tor source package is released, but does it fix the Black Hat Bug?
Any news on this issue BTW?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
For those of us who compile Tor from source, does Tor need to be recompiled
*after* the openssl update from our OS vendors?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Original Message
From: Nicolas Vigier bo...@mars-attacks.org
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Does Tor need to be recompiled *after* the
opensslupdate?
Date: Sat, 12 Apr 2014 17:51:46 +0200
On Sat,
It says in the blog:
Hidden services: Tor hidden services might leak their long-term hidden service
identity keys to their guard relays.
Like the last big OpenSSL bug, this shouldn't allow an attacker to identify the
location of the hidden service,
but an attacker who knows the hidden service
Today I discovered that wiki.debian.org blocks Tor exit nodes. There are
many other sites doing the same thing, and this is an increasing trend
among website admins.
If this trend continues, Tor will sooner or later become close to useless
for regular clearnet surfing. And we'll be left with
It's not like I blew off my chair in surprise:
U.S. and British intelligence agencies have cracked the encryption designed to
provide online privacy and security, documents leaked by former intelligence
analyst Edward Snowden show.
The US feds did actually take down FH, which was a HIDDEN SERVICE! They
found it and arrested the admin! Period!
Hidden services vaporize like water in death valley these days. And don't
you guys want answers?? It's time to take off the blinders and take a look
around!!
If they can find hidden
Google is notorious at banning Tor exit nodes from using its search
services. Either you're prompted with a phrase of words to enter into a
form, requiring you to have cookies enabled, or you can't search at all.
Yahoo is partially blocking Tor exits, and is becoming more like Google by
each
When someone wants to DDoS attack a hidden service, he needs to do this trough
his entry nodes.
Would it be possible to add prevention of such attacks on all entry nodes in
the code? If a guy sends an unormal amount of requests to his entry nodes, the
entry nodes halt his connection for like
I've heard from several places that Tor's encryption is pretty weak for the
recent standard.
I don't know much about the encryption Tor uses, hence why I ask: Is Tor's
encryption weak?
___
tor-talk mailing list
tor-talk@lists.torproject.org
Privoxy and Polipo has caused more problems than good, so I tried to connect
Firefox trough socks v5 with success. All problems gone and increased speed
on all Tor usage. But is this safe? My Tor client is firewalled, so it
cannot leak DNS or Java traffic.
TorStatus gives us an estimate of how many nodes there are.
How about how many clients there are?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
According to their latest blog, they've found the Freedom Hosting admin. And
even Mike Perry seems to be involved in their claims.
http://pastebin.com/qWHDWCre
This is starting to get utterly interesting. Is the whole Tor network being
owned and cracked by the Anonymous hackers?
Original Message
From: Moritz Bartl mor...@torservers.net
So far, there is no sign of them using a weakness in Tor. If people
run unsecure software behind Tor hidden services, there is NOTHING Tor
can do about it. Judging from your quotes, they opened the boxes and
found
Original Message
From: Sebastian Hahn m...@sebastianhahn.net
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Suggestion: make _hidden services_ choose randomentry
nodes often!
Date: Fri, 21 Oct 2011 14:54:29 +0200
What are those nodes listed as guards at the tor status pages?
What does it take to get that status?
I have heard that it has something to do with entry nodes, but a thoroughly
explanation would be nice thanks.
___
tor-talk mailing list
I don't like these log messages:
[Warn] possible replay detected...
I get about 5-10 a day. Usually several in a row. Got 9 yesterday and have 6
today so far.
Have tried about 100 different and random entry guards, Running latest stable
on Linux.
Some help from the experts would be nice,
I've read a lot about it, but I'm hoping for a simplified explanation for a
simplified guy. ;)
If my hidden service server has a clock that is 5 minutes wrong, how can
anyone use that to locate me?
___
tor-talk mailing list
Original Message
From: Jack Waugh zqrfvbh...@snkmail.com
I want to run Polipo on a server machine and Firefox with Torbutton
on distinct client machines not having Polipo or Tor loaded on them.
How do I set it up?
I tried it with Polipo listening on its default port of
Original Message
From: Justin Aplin jap...@gmail.com
I honestly don't know, but if you're *that* paranoid about your downloads
being tampered with, navigating to https://addons.mozilla.org and looking
up the add-ons manually is only a few extra clicks.
I think it only
Original Message
From: Lalle Bralle noizi...@gmail.com
I'm trying to get countermail working with my TOR bundle I use on a USB
stick for added security and anomity when I feel I need it. However, I
believe Java has some security holes that's why it's not accepted. While
Original Message
From: William Wrightman williamwright...@yahoo.com
[...]
If anyone has had positive experiences with any web-based chat /
messengering services combined with Tor then please let me know.
I think you can use tor for anything, unless you're using a tor exit
I'm having a laptop that is Tor only, so it never connects to the internet
without going trough Tor.
Someone wrote that malicious Tor exit nodes may modify your downloads. So when
I need to install the recommended plug-ins for Firefox, like TorButton and
NoScript, and I do that trough the Tor
Original Message
From: Justin Aplin jap...@gmail.com
HTTPS transport should prevent the type of modification you're talking
about, so just double-check your URIs before downloading anything.
For example,
I was thinking more about using Firefox's built-in add-on installer and
I decided to check if the StrictEntryNodes and EntryNodes functions worked,
so I started to log my TOR connections.
They did work, and TOR connects to the entry nodes specified, but TOR also
connects to other nodes now and then while running. If you specify your own
entry nodes, shouldn't TOR
38 matches
Mail list logo