On Wed, 15 Feb 2012 18:17:34 +, Matej Kovacic wrote:
Hi,
what are the solutions if someone is downloading list of IP addresses of
Tor exit points and block access to his website from this IP addreses?
That is even officially offered for people who don't want to deal
with the potential
On Wed, 22 Feb 2012 12:53:24 +, Christian Kujau wrote:
Hi,
I'm running a Tor bridge for some days now (after shutting down an exit
node, due to too many DMCA complaints) but it's hardly getting any
traffic:
Heartbeat: Tor's uptime is 1 day 11:59 hours, with 2 circuits open.
On Thu, 23 Feb 2012 03:43:40 +, Christian Kujau wrote:
...
But, isn't this a problem? Porxying through tor is slow enough and when I
was running an exit node, there was lots of traffic there.
Of course. Exit nodes are scarce, and 'normal' relays (at least mine)
did pick up quite some
On Fri, 24 Feb 2012 05:36:14 +, Ahmed Hassan wrote:
...
cat-rat-hat.onion.
More like granoblastic-Congoese-counterirritate-solifluctional-Adeona or
shameproof-paralogize-concutient-hypersophisticated-Actinomyxidiida. :-)
...
Users will not have an option to explicitly choose onion domain
On Fri, 24 Feb 2012 13:36:45 +, Robert Ransom wrote:
...
Which languages do you want us to ship a dictionary for in every Tor
client? (Please specify the exact dictionaries you want us to use as
well.)
Left as an exercise for later.
How large are these dictionaries (in bytes)?
The last
On Fri, 24 Feb 2012 17:47:30 +, Eugen Leitl wrote:
...
What's wrong with a P2P name resolution? E.g. namecoin?
Everything. :-) Primarily the fact that namecoin provides
name-ipaddr mapping, and the whole point of *.onion is
that the service addressed ist *not* identified by an
IP address.
On Sat, 03 Mar 2012 15:00:51 +, Maxim Kammerer wrote:
On Sat, Mar 3, 2012 at 10:33, pro...@secure-mail.biz wrote:
The transparently proxied operating system does not know it's real external
IP, only it's Tor exit IP. And can therefore never leak it's real external
IP.
I see this
On Tue, 20 Mar 2012 06:54:34 +, Joe Btfsplk wrote:
...
clarissab, I can't tell what you meant by Drama.
Could you expand some on the HUGE conspiracy? How would it be
possible for Tor, Firefox Vidalia NOT to talk over localhost? Why is
this a conspiracy?
He thinks doing communication
On Wed, 04 Apr 2012 14:45:48 +, Maxim Kammerer wrote:
...
* Circumventing a state-wide firewall
* Paranoid people in developed countries
* Small-scale trading of illegal drugs
* Viewing images and videos of pedophilia
Normal people in developed countries who use tor to
a)
On Mon, 09 Apr 2012 12:02:33 +, Simon Brereton wrote:
...
As I understand it, 3G devices were assigned a unique public IP. 4G
devices on the same tower, however, share a public IP and VZW uses NAT
(so the device actually has a 10.x.x.x private IP).
Having the IP fixedly assigned to the
On Tue, 19 Jun 2012 11:10:27 +, William Snavely wrote:
When using Microsoft Outlook Web App with a university account, with the Tor
browser I get kicked out after a few minutes and have to log back into the
mail account. This happens repeatedly, and am curious what is the reason.
Hi all,
I'm occasionally seeing bursts of that in my log:
Jul 08 08:37:59.000 [warn] Your computer is too slow to handle
this many circuit creation requests! Please consider using the
MaxAdvertisedBandwidth config option or choosing a more restricted
exit policy.
I already have
On Sun, 08 Jul 2012 09:24:58 +, Andreas Krey wrote:
...
This time I only stumbled over that because of how
the traffic on my DSL link looked:
http://nr1.h.apk.li/traf-21600s-2012-07-08.png
The vertical grid lines are twentieths of a day, or 72 minutes each.
The incident did thus go
On Sun, 08 Jul 2012 10:41:32 +, Gitano wrote:
...
Did you reboot your dsl router? IIRC, there was a similar problem when I
run a Tor relay behind my Fritz!Box (AVM).
Nope. The DSL router is NetBSD/sparc, and it doesn't NAT; the tor relay
machine has its own public IP, so many TCP
On Sun, 08 Jul 2012 16:08:14 +, Julian Wissmann wrote:
Just out of curiosity: Do you also get
[notice] cull_wedged_cpuworkers(): Bug: closing wedged cpuworker. Can
somebody find the bug?
Cute one. :-)
[err] cpuworker_main(): Bug: writing response buf failed. Exiting.
[warn] Tried to
On Sun, 08 Jul 2012 20:32:30 +, Julian Wissmann wrote:
...
As it triggers on FreeBSD, I'd assume it to also do so on NetBSD.
Oh; you jumped the wrong trigger. :-) The router is NetBSD, the
tor node is linux. I didn't manage to get tor running on the router
itself due to problems getting
On Sun, 08 Jul 2012 21:35:07 +, Julian Wissmann wrote:
Ah, okay, so then you can probably just forget about it. Never had
that bug trigger on Linux.
Would've been interested about Tor performance on SPARC, though ;-)
You may possibly help out there. :-)
With 1.0.0.g - can't compile.
With
On Sun, 22 Jul 2012 19:02:02 +, Jacob Appelbaum wrote:
...
Another interesting problem is that the Raspberry Pi doesn't have a RTC. :(
Tor does a time check against other nodes. Can't we use that to obtain
the time as well?
I wouldn't mind running tor as root on a raspi dedicated as a tor
On Thu, 09 Aug 2012 00:47:26 +, Maxim Kammerer wrote:
...
are stupid? As I said, it detracts from the project's credibility.
Anyone who installs Tor (or I2P, for that matter) and explores the
hidden services,
Erm, how *do* you 'explore' hidden services? After all, they are
not indexed by
On Sat, 11 Aug 2012 03:39:27 +, grarpamp wrote:
...
There's nothing stopping anyone from forking Tor, throwing it up on
github and moving to an unfunded, unspoken development model to
do all these things.
The valuable part of tor is not the code base but the
installed base of relays; you
On Sat, 11 Aug 2012 11:49:24 +, Moritz Bartl wrote:
...
It isn't? I believe this is a perfect place to ask such questions?
It is (probably) the right forum to ask how it is done (namely
connecting to the tor-provided socks5 proxy.
*How* that is done in ruby is to be left as an exercise to
On Wed, 05 Sep 2012 02:15:21 +, Justin Aplin wrote:
...
ExitPolicy accept 127.0.0.1:*
ExitPolicy reject *:*
This will allow exiting (connecting) to the local machine (where the hidden
service should be listening) on all ports, and reject all other traffic.
No, you don't need an
On Sun, 09 Sep 2012 05:57:42 +, warms0x wrote:
...
There's a couple of problems with this approach:
* HAProxy doesn't know how, nor do I think nginx would know how to
resolve and send traffic to a .onion domain
It might be possible to run HAProxy/nginx under torsocks or similar,
but...
On Tue, 18 Sep 2012 10:26:21 +, Chris Smart wrote:
not for blind users using screen reader software, who don't want to
hear tons of quoted material first. :)
I don't like tons of quoted material either and would rather
have it trimmed to the referenced part. But some lists seem
to be
On Wed, 19 Sep 2012 22:17:18 +, David H. Lipman wrote:
From: David H. Lipman dlip...@verizon.net
On the WGET command line add the following switch parameter after Tor has
been loaded.
--execute=http_proxy=http://127.0.0.1:8118/
That looks like telling wget to use an http proxy, not
On Tue, 25 Sep 2012 13:06:10 +, esolve esolve wrote:
I'm just wondering how can the website know your ISP or location?
Website sets up DNS server for its dns entries with low ttl, so it gets
asked every time. Trace where requests come from: gotcha. Depending on
the DNS setup you get the ISP
On Sat, 06 Oct 2012 14:21:39 +, antispa...@sent.at wrote:
...
with Pidgin through Tor. In my proxy configuration for the account in
Pidgin I left the user and password empty. And it still worked. Am I
missing something? Shouldn't the authentication be set to Nothing in
order to make it
On Tue, 16 Oct 2012 10:51:37 +, k e bera wrote:
...
Why are anonymous signups assumed guilty of abuse before anything happens?
How about limiting usage initially,
Because per-account limits don't help when you can easily create as many
accounts as you want.
Andreas
--
Totally
On Tue, 16 Oct 2012 22:59:40 +, Daniel Dennis wrote:
...
But I also think all the content in a hidden service are not
beneficial to anyone.
So what? It is sufficient when my hidden services are beneficial
to me - I can operate a computer behind a NAT or firewall and
expose its ssh port as
On Wed, 17 Oct 2012 09:25:46 +, Daniel Dennis wrote:
...
But I didn't think about accessing a computer via ssh using hidden
services. Having ssh access can ruin security but is there a reason the
server/computer must be hidden? I'd understand why you or your connect
should be hidden but
On Fri, 19 Oct 2012 11:25:34 +, Anon Mus wrote:
...
Within 24hrs of making that Tor hidden service live I could see, in my
firewall logs, hundreds of repeated attempts trying to hack my server,
directly from the internet, not via my hidden Tot service.
Welcome to the internet. Have an
On Sat, 20 Oct 2012 16:54:53 +, Anon Mus wrote:
On 20/10/2012 14:46, Andreas Krey wrote:
I expect most people would read your remark as talking down to someone..
Possibly.
...
Don't you use router firmware firewalls? So you wouldn't see this kind
of traffic?
Nope. NetBSD box.
I
On Mon, 22 Oct 2012 18:40:02 +, esolve esolve wrote:
...
besides, do anybody has any idea on how is Tor's flow control mechanism
interact with Firefox's application flow control ?
What application flow control? I don't think there is any place (in the
protocols above layer 3) where
On Wed, 31 Oct 2012 09:05:36 +, adrelanos wrote:
...
How is the clock synced right now? NTP? Because without the clock being
correct, Tor and/or hidden services won't work.
I have a node that is off by 50 minutes (the VPS provider won't bother,
and I can't set the clock within), but it
On Wed, 31 Oct 2012 10:09:05 +, adrelanos wrote:
...
For relays that might not be such a big anonymity problem.
Ah, ok; sometimes it would help to point out that there is
a difference between 'it works apparently' and 'it is actually
preserving your anonymity'. I've yet got some to learn
On Wed, 31 Oct 2012 12:32:04 +, adrelanos wrote:
...
This is not bad, but also not good. I guess it will limit network/Tor
speed to 0,5 MB/s.
It would be helpful if MB/s vs. Mb/s were used a bit mor consistently;
half a megabyte per second is what I can afford on my VPS; half
a megabit
On Sat, 03 Nov 2012 21:05:38 +, lacorov affiliate amazon wrote:
...
I have try to get the fingerprint ($ with 40 caracters) of the Unamed
nickname , with no success,
I think there is a way to calculate it, but i don't how to do that ?
There is no way to do that; otherwise all the
On Mon, 05 Nov 2012 17:00:32 +, esolve esolve wrote:
...
and I have to download the new version: *Version 2.2.39-5 - Linux, Unix,
BSD (64-Bit)*
*but this problem is still there, and the browser automatically closes*
Which problem? The 'please update' or the crash? For the latter
part I
On Mon, 05 Nov 2012 20:22:05 +, esolve esolve wrote:
2012/11/5 Andreas Krey a.k...@gmx.de
...
---
the TBB prompts 'please update ' and the browser closes automatically
and suddenly
You mean
On Sat, 17 Nov 2012 17:41:12 +, Julian Yon wrote:
...
or dedicated server, or colocate a machine of your own in a datacentre.
While in theory you could run a server off a cable or DSL line, I
wouldn't recommend it. Even if your ISP is friendly towards the idea
they're unlikely to guarantee
On Sat, 17 Nov 2012 18:38:24 +, Julian Yon wrote:
...
Don't think that regular colo/VPS server promise much more. The main
problem on cable/DSL is the usual lack of an actually fixed address.
Yes, that's also a problem. Not unsolvable, but irritating.
Actually, that's the line I
On Sun, 18 Nov 2012 16:18:35 +, Andrea Shepard wrote:
...
Servers doing the former deserve to be walked away from (to another
provider), and admins of servers doing the latter are criminals,
at least in my local jurisdiction.
*boggle* criminal prosecutions for one's mail server
On Tue, 20 Nov 2012 14:02:14 +, Fabio Pietrosanti (naif) wrote:
...
So, rather than Blocking it would be really nice to be able to apply
certain Rate Limits to the amount of outgoing, new TCP connection that
can be done over an established circuit.
Let's say that outgoing circuit change
On Sun, 25 Nov 2012 11:14:22 +, Quan wrote:
...
Your system clock just jumped 121 seconds forward; assuming established
circuits no longer work.
...
Your system clock just jumped 123 seconds forward; assuming established
circuits no longer work.
...
Your system clock just jumped 122
On Tue, 20 Nov 2012 00:34:05 +, te...@tormail.org wrote:
Running a non-exit Tor relay on Linux and have iptables set up to block
inbound and outbound RFC1918 addresses on the outside interface. Notice in
the firewall logs several seemingly random private IP addresses connection
attempts to
On Thu, 29 Nov 2012 18:48:35 +, Jon wrote:
...
Running a exit node on DSL or Cable from home, is just as safe, I believe,
Remember, people also take fire insurances. That is on about the same
risk/paranoia level as is a raid for a tor exit at home.
Andreas
--
Totally trivial. Famous last
On Fri, 30 Nov 2012 08:24:42 +, Eugen Leitl wrote:
...
On Thu, Nov 29, 2012 at 11:18 AM, Tom Beecher tbeec...@localnet.com wrote:
Assuming it's true, it was bound to happen. Running anything , TOR or
otherwise, that allows strangers to do whatever they want is just folly.
Such as, say,
On Wed, 26 Dec 2012 11:17:38 +, Jerzy ??ogiewa wrote:
Hello!
I have server only for hidden service. ssh is accessible ONLY via different
hidden service address. I want to push code to server from local git (git
push ...). Are any special setups needed for this? Ideal is that I do not
On Fri, 11 Jan 2013 12:58:08 +, David Fifield wrote:
...
This is a nice idea. Would you consider opening a ticket on
https://trac.torproject.org/?
- #7944. Hope I got the categorization right. :-)
Andreas
--
Totally trivial. Famous last words.
From: Linus Torvalds torvalds@*.org
Date:
Hi David,
...
Maybe you could run flashproxy.js with the Rhino JavaScript interpreter
(we already use Rhino for some of our tests). You would need to make
some changes to flashproxy.js to remvoe some of the browser assumptions.
After arma's bug comment I turned down the python road[1]
On Sun, 03 Feb 2013 12:03:33 +, coderman wrote:
...
(there is nothing wrong with C++ used properly and done well...
At some project size the 'used properly and done well' becomes
a big if. I do some C++, but I can easily understand people
not liking C++.
Andreas
--
Totally trivial. Famous
On Tue, 26 Feb 2013 19:34:07 +, Van Gegel wrote:
...
The user must decide how to use this software on the basis of the source
code examination and own tests,
How do you expect the average GFW-encumbered chinese or journalist in
syria to examine the code of tor, let alone the browser or the
On Fri, 19 Apr 2013 03:34:15 +, grarpamp wrote:
...
As you've noted, reputation (and learning systems in general) are
a powerful tool over time. With the same noted exception regarding
new users... the real world tells us that the first driveby from a
new user bent on trouble may not ever
On Fri, 19 Apr 2013 07:35:27 +, grarpamp wrote:
...
If you require accounts, invest time in better rollback systems
so that a single click makes the user and their contributions
disappear.
You keep ignoring that determined troublemakers can't be forced
to use a single account. Who is
On Thu, 02 May 2013 13:19:59 +, Lucia Liljegren wrote:
...
Because these not attackers are guessing addresses they tend to hit my 404
page which is dynamic and does some checks. When I detect an IP doing this
sort of stuff, I use Cloudflare's API and ban the IP 7 days .
You mean, when
On Fri, 03 May 2013 12:06:27 +, lu...@rankexploits.com wrote:
...
You mean, when I set up a bit of link farming, you will block Googlebot? :-)
Oh you silly billy. :-) Everyone knows it's trivially easy to block one
link farmer without blocking google. If I detected you doing rapid or
On Thu, 23 May 2013 17:14:14 +, Tom Ritter wrote:
On 23 May 2013 16:27, Nathan Suchy theusernameiwantista...@gmail.com wrote:
The hidden service protocol needs major modifications as it is very slow. I
actually don't use hidden services but see the use in them and think that
the hidden
On Fri, 24 May 2013 07:22:28 +, Tom Ritter wrote:
...
... Actually that's not true. I could have bought a certificate for a
.onion address, any .onion address, from any CA until the end of 2015.
How that?
They're starting to phase them out now so any CA is probably not
correct some
On Fri, 31 May 2013 19:32:50 +, luis redondo wrote:
Other times instead of: ...etlservicemgr...,I get ...https...,or
...SSHI guess it is related to the entry node I use.
Not directly. tcpdump by default looks up port numbers in /etc/services
and uses the names there for display.
On Fri, 31 May 2013 21:17:35 +, Sebastian Pfeifer wrote:
...
Or you could use 85.214.20.141 (FoeBud) or 213.73.91.35 (Chaos Computer
Club)
These addresses stand no chances of me remembering them when I'm
out there somewhere in a year or so on naked IP connectivity and
need a name server
On Fri, 14 Jun 2013 19:39:31 +, Mike Perry wrote:
...
Please try these out, test them, and give us feedback! The plan is to
post them on the blog by Monday, unless something goes horribly wrong.
https://people.torproject.org/~mikeperry/tbb-3.0alpha1-builds/official/
Erm, I used
On Sat, 15 Jun 2013 19:09:28 +, Mike Perry wrote:
...
For everyone who is experiencing these crashes: Do you have a system tor
installed? If so, if you uninstall it and reboot, does TBB still crash?
Not sure what 'system tor' is. I have older TBBs on the system, but
they shouldn't do
On Sat, 15 Jun 2013 23:05:12 +, Mike Perry wrote:
...
Are any of you who experience crashes installing to the Desktop (the
default)?
I have it in the desktop, just renamed the folder (and did installation
and execution as the same user). But I will try a different machine on
monday; this
On Mon, 01 Jul 2013 22:18:06 +, coderman wrote:
...
you should assume this number will always approach anything greater
than zero; and how do you handle a reduction? axe clients without
prejudice?
Put new clients into the next instance of this service, formally
operated by someone else?
On Tue, 02 Jul 2013 12:33:10 +, Mike Perry wrote:
...
But I got distracted by more pressing issues before I could finish the
scripts.. Also, many of those encrypted+authenticated Tor container
things probably don't make much sense without Secure Boot to
authenticate the boot process up
On Thu, 04 Jul 2013 20:55:53 +, anonymous coward wrote:
When you connect to a SSL secured web site, is the URL itself encrypted
or can an attacker see the full URL?
No, the full URL is only in the encrypted stream. But at least the DNS query
beforehand will give away the host name, as will
On Thu, 11 Jul 2013 14:26:43 +, Marcos Eugenio Kehl wrote:
Hello friends.
1. How could my exit Tor node be in Kabul or Kandahar? As ipcatcher.net
showed many times. How it is possible a Tor ISP or relay in Afeganistan?
Some of the geolocation services have the strange habit to
On Tue, 16 Jul 2013 00:38:46 +, krishna e bera wrote:
...
Your IP address appears to be: 96.44.189.98
Reverse DNS ist axigy2.torservers.net, but atlas.torproject
doesn't find the address either. Looks like is has fallen out
of the database.
Andreas
--
Totally trivial. Famous last words.
On Sat, 20 Jul 2013 23:44:36 +, Pokokohua wrote:
I am running a hidden service website that uses user sessions made up from
individual visitors server variables. Unfortunately $_SERVER[ 'REMOTE_ADDR' ]
is reporting all visitors IPs as 127.0.0.1.
IP addresses are unsuitable for sessions
On Sun, 21 Jul 2013 13:06:31 +, Eugen Leitl wrote:
...
tor uses a circut guard - middle - exit and unless the NSA can get access
to the guard's isp, the middle's isp, and the exit's isp which more than
The Internet topology is mostly a tree. Tapping the fiber at a few chokepoints
(e.g.
On Sun, 04 Aug 2013 15:39:40 +, Arian Sanusi wrote:
Hi Jerzy,
If relays were homogeneous distributed among the globe, two random relays
will be 1/4 earth circumference apart on average.
That assumption is a bit skewed. Most of the time fast relay will be
selected, and they aren't quite
On Wed, 07 Aug 2013 13:38:31 +, adrelanos wrote:
scarp:
It is inappropriate for a web browser to not be automatically updated.
Generally a good idea... Once concern.
What about the claim, if The Tor Project had an auto updater, they could
get gag ordered to ship a backdoor (to
On Wed, 04 Sep 2013 10:36:32 +, Roman Mamedov wrote:
...
For example if all of these new users are in fact a single botnet, that's now
connecting to Tor and then sitting dormant waiting for an order to instantly
DDoS into the ground any hidden service that publishes undesirable info...
On Fri, 06 Sep 2013 14:04:58 +, Eugen Leitl wrote:
...
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
Is there a connection between the two sentences? TrueCrypt is open source,
so why wouldn't you use it?
Andreas
--
Totally trivial. Famous last words.
From:
On Mon, 30 Sep 2013 18:14:25 +, Joe Btfsplk wrote:
...
I don't know where / how it gets the screen size, but mine definitely
isn't 947 wide. It's actually a very common size.
Tor browser seems to use the windows size as the display size.
I assume the color depth is bit value.
On Mon, 30 Sep 2013 21:08:58 +, Joe Btfsplk wrote:
...
No cookies are set, so that doesn't affect outcome. In fact, the bits
of identifying information shown in results chart largely remain
identical (except screen size sometimes changes), but their estimate of
One in X browsers have
On Tue, 01 Oct 2013 13:43:10 +, Joe Btfsplk wrote:
...
I believe in same TBB version (maybe the same in many versions) they
spoof the useragent time zone, but wouldn't differences in screen
sizes color bit ALONE, among a few users on one entry / exit
combination, at a given moment be
On Sun, 06 Oct 2013 03:19:31 +,
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch wrote:
If there is any wiretap in place to monitor VPN then it would instantly drop
the connection because encryption has been tampered with - that's the whole
design for VPN.
A tap is a completely
On Tue, 08 Oct 2013 11:38:35 +, Crypto wrote:
...
This may not work. I can open an exit relay using my normal IP address
on the router with no VPN active. All works well and it gets published.
But if I try to run it through a VPN the Tor client will eventually
connect but the logs show
On Mon, 14 Oct 2013 16:32:01 +, Luther Blissett wrote:
...
Griffin! If all machines are accessing the internet though one gateway
or a couple of them, it makes more sense to have tor node running on
those gates and directing the internal machines traffic to tor socks
host/port.
Possibly,
On Wed, 16 Oct 2013 19:42:41 +, Joe Btfsplk wrote:
...
One thing jumps out, Tor doesn't know for sure who's running Guard or
exit nodes - can't unless they start doing (regular, repeated)
extensive personal interviews, background checks, giving polygraph
tests, injecting sodium
On Wed, 23 Oct 2013 05:52:07 +, Juan Garofalo wrote:
...
How is that 'pirate radio'? They had an actual RF transmitter that they
accessed through a hidden service?
Oh, there are legislations where it is illegal to stream
to more than N clients at the same time without a permit.
FOr
On Tue, 12 Nov 2013 16:53:45 +, Mirimir wrote:
...
Why not just tell people to use a proxy? Sure, it reduces their
anonymity somewhat. But it doesn't reduce it as much as complaining via
email or telephone.
Because someone who can afford to do so successfully complaining
results in others
On Wed, 13 Nov 2013 00:27:15 +, Mirimir wrote:
...
For most people who feel the need to use Tor, complaining is arguably
not a good option.
I don't feel the need to use tor, except for when dealing with a
few government sites or following links dispersed by some people.
Or when wanting
Hi all,
joyoftech has a tor reference today, mashed up with a MAD
reference: http://www.joyoftech.com/joyoftech/joyarchives/1925.html
(MAD, in turn, beside being the publication that first published Donald
Knuth, is the acronym for 'Militärischer Abschirmdienst' the german
military secret
On Fri, 15 Nov 2013 15:31:09 +, intrigeri wrote:
...
2. It will be hard to scale mass-duplication of pre-installed Tails
I didn't read anything about actually putting Talis onto the sticks,
just about providing the sticks (whose unique feature is the working
r/o switch.) Subject: 'for', not
On Tue, 17 Dec 2013 10:46:46 +, frank earnest wrote:
The log is in the attachment.
Hmm, it seems you're using vidalia, and your 'I'SP is blocking
most ports. In Vidalia/Settings/Network there is a field
'my firewall only lets me connect to certain ports, which
you can click and then use the
On Sat, 28 Dec 2013 16:08:58 +, grarpamp wrote:
...
and more laughable that people fall victim to it, especially it happens
to say... drug dealers. There's just no fix for stupid.
Erm, what stupid? How do you find out the correct onion address
when the service isn't as popular as silkroad
On Tue, 07 Jan 2014 12:58:49 +, Mark McCarron wrote:
...
The fact that TBB disables javascript is a testimony to how bad the
javascript coders of Firefox are.
Ex falso sequitur quodlibet.
I think there is a solid argument for adding filters to the exit nodes that
strip anything that
On Wed, 08 Jan 2014 11:25:02 +, Mark McCarron wrote:
...
In regards to identifying Tor users, this is more simple than anyone imagines.
No, it isn't.
A simple DB at an ISP recording IP addresses of those connecting to Tor nodes
is all it takes.
Not all tor nodes are publicly known.
In
On Wed, 08 Jan 2014 13:17:47 +, Mark McCarron wrote:
...
In fact, the EU mandates that this data be held for 2 years:
http://en.wikipedia.org/wiki/Telecommunications_data_retention#European_Union
No, it doesn't. The requirement is for access ISPs to log the association
between
On Tue, 21 Jan 2014 03:23:11 +, Yuri wrote:
...
How can request from www.yahoo.com contain 192.168.1.10 in it? This is
just invalid.
Why? What is the difference to targetting 192.167.1.10[1]?
What if the LAN uses public IP space (like mine does)?
Andreas
[1] Yes, I know RFC1918.
--
On Thu, 13 Feb 2014 18:11:38 +, Fabio Pietrosanti (naif) wrote:
Given that today we have narrowband codecs and that over high-latency
channel we can pack several 20ms sample together easily (also in packets
of 100ms size to reduce the amount of packets/s), the effective overhead
of
On Tue, 08 Apr 2014 13:31:01 +, Geoff Down wrote:
...
a) whether it's the openssl binary (/usr/bin/openssl) that I need to
check or some other 'openssl' object
It's not the binary.
b) if some other object, where is it in OSX10.4 and how do I check the
version
That depends on whether
On Tue, 08 Apr 2014 22:06:31 +, Geoff Down wrote:
...
/library/tor/bin/tor:
/opt/local/lib/libz.1.dylib (compatibility version 1.0.0,
current version 1.2.5)
/opt/local/lib/libevent-2.0.5.dylib (compatibility version
7.0.0, current version 7.4.0)
On Mon, 19 May 2014 15:51:35 +, Joe Btfsplk wrote:
...
Mailing lists aren't as user friendly to search old topics. Yes,
there's an archive.
It's not a friendly / easy to search as forums with (good) software.
There's also google.
Mailing lists ( email) are harder to follow on longer
On Sun, 01 Jun 2014 15:46:27 +, grarpamp wrote:
...
I should try to work on some tools to test against sites people
report as blocking tor, since as in your note re: this one,
often other people say it 'works for them'.
Not only them, my future me as well. mobile.bahn.de is one such
site.
On Thu, 26 Jun 2014 00:50:29 +, Tor Talker wrote:
...
enough to do it securely enough. Also, hidden services are far more
vulnerable than Tor users, simply because they serve stuff.
...
What sort of vulnerabilities would you expect to see?
Problem: Your hidden server can be made to talk
On Mon, 30 Jun 2014 13:19:43 +, Mark McCarron wrote:
...
Then we also have Snowden, who informs of us PRISM.
You mean the Snowden that also delivered an internal slide of NSA,
stating that they are unable to break tor generally, only with some
success for specific targets? Since that is
On Tue, 08 Jul 2014 07:08:50 +, Nurmi, Juha wrote:
...
The wireless router is keeping the SSH connection alive until I reboot it.
I don't understand how this is possible.
On a TCP connection (which the SSH connection is) there is no traffic when
neither side is sending anything. If you
1 - 100 of 196 matches
Mail list logo