snip
I'm more
worried about the risks to user anonymity. It sucks to be
the user reading
about some sensitive subject when your apt cron job
decides to poke every
package source you install from. “Oh, that guy
who keeps reading about Foozer's
Disease must be in the
Antarctica/McMurdo
--- Ursprüngliche Nachricht ---
Von: grarpamp grarp...@gmail.com
Datum: 02.03.2012 07:45:20
An: tor-talk@lists.torproject.org
Betreff: Re: [tor-talk] Operating system updates / software installation
behind Tor Transparent Proxy
On Thu, Mar 1, 2012 at 11:31 PM, Andrew Lewman
It's lame so or so. The exit node admins will have to deal with
copyright infringement complaints.
'All bulk data' was the intended meaning. Assuming copyright is not
going away, certainly operators would want to see the complaint
generating portion of bulk move solely and natively to the
Robert Ransom rransom.8...@gmail.com wrote:
On 2012-03-02, Andrew Lewman and...@torproject.is wrote:
The trick is, I like to think I know what I'm doing and that I'll
notice if apt-get or my VM image fails to transfer untouched. Whether
I'll actually notice a sophisticated exploit in deb
On Sat, Mar 3, 2012 at 10:33, pro...@secure-mail.biz wrote:
The transparently proxied operating system does not know it's real external
IP, only it's Tor exit IP. And can therefore never leak it's real external IP.
I see this claim made all the time — is it actually true? Is Tor
designed to
On Sat, 03 Mar 2012 15:00:51 +, Maxim Kammerer wrote:
On Sat, Mar 3, 2012 at 10:33, pro...@secure-mail.biz wrote:
The transparently proxied operating system does not know it's real external
IP, only it's Tor exit IP. And can therefore never leak it's real external
IP.
I see this
On Sat, 03 Mar 2012 15:00:51 +, Maxim Kammerer wrote:
On Sat, Mar
3, 2012 at 10:33, pro...@secure-mail.biz wrote:
The transparently
proxied operating system does not know it's real external IP, only it's Tor
exit IP. And can therefore never leak it's real external IP.
I
see this
It's my impression that signed packages aren't a priority
for the BSDs in general.
It will happen when one of their mirrors gets rooted, or one of
their devs gets their machine, and thus their dev account, rooted.
The kernel.org, gnu/fsf and debian[?] incidents all come to mind.
Too bad it
On Sat, Mar 3, 2012 at 8:10 AM, Fabian Keil
freebsd-lis...@fabiankeil.de wrote:
Robert Ransom rransom.8...@gmail.com wrote:
On 2012-03-02, Andrew Lewman and...@torproject.is wrote:
The trick is, I like to think I know what I'm doing and that I'll
notice if apt-get or my VM image fails to
Hi,
Moritz Bartl wrote (02 Mar 2012 00:27:58 GMT) :
The second reason to avoid Bittorrent over Tor is that there is no
audited torrent client. There is none because of the first reason.
In case someone wants to do this audit, they should get in touch with
Jacob Appelbaum who offered Tails
On 02.03.2012 02:39, proper proper wrote:
I don't see a difference between regular downloads
and operating system
updates. (I am speaking of Debian here, I don't know
how other
operating system or distributions handle package installation and
updates.) Are regular downloads of 'several
rransom said:
I'm more worried about the risks to user anonymity. It sucks to be
the user reading about some sensitive subject when your apt cron job
decides to poke every package source you install from. “Oh, that guy
who keeps reading about Foozer's Disease must be in the
Antarctica/McMurdo
snip
But apt uses GPG
(run with (necessarily) root privileges) to verify
the files it downloads.
Sucks to be a Debian user when someone finds
another code-exec bug in GPG's
parsing code.
Indeed. Encrypted updates would be handy. I support
http://brainstorm.ubuntu.com/idea/26541/.
Or
I was told, to ask this question here. [3]
Tor's transparent proxy feature is at the moment a bit complicated to take
advantage off and therefore unpopular. That might change in the future, because
a) documentation improves [1]; b) in the future (depending on the outcome of
this bug) there
On 02.03.2012 00:12, proper proper wrote:
You ask the user not to use Bittorrent over Tor, as the network can not
handle the load.
The problem is that Bittorrent opens a lot of concurrent connections to
download many pieces at once. And all those Tweak your Torrent client
and get mighty mighty
proper proper pro...@secure-mail.biz writes:
I was told, to ask this question here. [3]
Tor's transparent proxy feature is at the moment a bit complicated to take
advantage off and therefore unpopular. That might change in the future,
because
a) documentation improves [1]; b) in the future
proper proper pro...@secure-mail.biz writes:
I
was told, to ask this question here. [3]
Tor's transparent proxy
feature is at the moment a bit complicated to take
advantage off and
therefore unpopular. That might change in the future, because
a) documentation
improves [1]; b) in
proper proper pro...@secure-mail.biz writes:
[...]
You can easily do so by separating traffic at user level (root vs. regular
users). Why do we need a special package for such a simple task?
That's not possible. Everything behind the transparent proxy, root or regular
user, has only two
--- Ursprüngliche Nachricht ---
Von: Moritz Bartl mor...@torservers.net
Datum: 02.03.2012 01:27:58
An: tor-talk@lists.torproject.org
Betreff: Re: [tor-talk] Operating system updates / software installation
behind Tor Transparent Proxy
On 02.03.2012 00:12, proper proper wrote:
You ask
proper proper pro...@secure-mail.biz writes:
[...]
You can easily do so by separating traffic at user level (root vs. regular
users). Why do we need a special package for such a simple task?
That's not possible. Everything behind the transparent proxy, root or regular
user, has only
On Fri, 02 Mar 2012 00:12:44 +0100
proper proper pro...@secure-mail.biz wrote:
You ask the user not to use Bittorrent over Tor, as the network can
not handle the load.
bittorrent trackers are fine, it's the bulk download of GB of data 7x24
that loads up the network.
What about operating
Ok, thanks for your reply!
__
powered by Secure-Mail.biz - anonymous and secure e-mail accounts.
___
tor-talk mailing list
tor-talk@lists.torproject.org
On 2012-03-01, proper proper pro...@secure-mail.biz wrote:
I was told, to ask this question here. [3]
Tor's transparent proxy feature is at the moment a bit complicated to take
advantage off and therefore unpopular. That might change in the future,
because a) documentation improves [1]; b) in
Robert Ransom wrote:
Use Tor 0.2.3.x-alpha, give the user 10 or more SocksPorts and 10 or
more DNSPorts to point things which really need to be anonymous at,
and no TransPort.
I think both are useful. Using TransPort as a safety packet log
and proxy catchall for whatever apps might defy
On Thu, Mar 1, 2012 at 11:31 PM, Andrew Lewman and...@torproject.is wrote:
bittorrent trackers are fine, it's the bulk download of GB of data 7x24
that loads up the network.
Wanted to add a bit here from another view.
I see no issue with bulk data transfer, so long as you give
back empty
25 matches
Mail list logo