On Fri, Apr 13, 2012 at 10:48:12PM -0400, hi...@safe-mail.net wrote:
> I've heard from several places that Tor's encryption is pretty weak for the
> recent standard.
> I don't know much about the encryption Tor uses, hence why I ask: Is Tor's
> encryption weak?
If you want a serious answer, plea
On Tue, Apr 17, 2012 at 02:14:28PM +0100, Runa A. Sandvik wrote:
> On Tue, Apr 17, 2012 at 1:28 PM, Eugen Leitl wrote:
> > Federal authorities have arrested eight men accused of distributing more
> > than
> > $1 million worth of LSD, ecstasy, and other narcotics with an online
> > storefront that
On Sat, May 19, 2012 at 03:00:19PM -0700, Mike Perry wrote:
> Thus spake Joe Btfsplk (joebtfs...@gmx.com):
>
> > Re: Flash LSO cookies in Windows. The Dec 28, 2011 design document
> > mentions,
> > >Flash cookies...
> >
> > >*...Implementation Status:* We are currently having difficulties
> > ><
On Sun, May 20, 2012 at 08:50:57PM +0200, || ΣΖΟ || wrote:
> A user visits a site wants to log in, but to have an account you are
> NOT anonimous anymore..
You can try http://www.bugmenot.com/
which shares accounts for sites that require registration.
> What about a auto login if user is anonim
On Wed, May 30, 2012 at 08:38:10AM +0200, Fabio Pietrosanti (naif) wrote:
> i've been thinking some days ago that the Tor infrastructure maybe a
> very valuable infrastructure also for other software that would like to
> stay distributed without a "central directory".
>
> In order to do so, a serv
On Sun, Jun 17, 2012 at 08:16:01AM -0400, ahmed wrote:
> http://i.minus.com/ibrPbxW8VvKkWO.png
For their TBB solution, why cant they recognize that
the searches are coming through Tor and allow them to proceed?
Their "more permanent solution" bypasses the Tor network entirely,
with a misleading
On Sat, 02 Mar 2013 01:03:19 +
adrelanos wrote:
> Has it been considered to replace the Tor directory authority with a
> Distributed Hash Table?
https://trac.torproject.org/projects/tor/ticket/5992
___
tor-talk mailing list
tor-talk@lists.torprojec
On Sat, 02 Mar 2013 21:38:13 +0100 (CET)
Outlaw wrote:
> > New TorButton has a "Cookie Management" option in its dropdown menu,
>
> Does it work for you? I mean in new TB it works well once before I
> delete some cookie and close TorButton cookie manager. Then it just
> doesn`t see any cookies a
On Thu, 07 Mar 2013 05:59:01 -0500
eliaz wrote:
> I'm writing to ask if there's been some network or server problem the
> last few days? I've run into a variety of error msgs & non-reproducible
> difficulties, and before I tear my system apart I want to be sure that's
> what I need to do.
Tor
On Wed, 20 Mar 2013 23:26:23 -
stones...@tormail.org wrote:
> The failure occurs like this: upon hitting the submit button to post a
> comment, the page reloads but nothing was posted.
Did you right-click on the NoScript icon or menu item and allow scripts to run
for blogspot and its requisi
On Wed, 27 Mar 2013 15:15:45 -0500
Gramps wrote:
> When I attempt to logon to
>
> > http://jhiwjjlqpyawmpjx.onion/roundcube/
>
> I get an error message
>
> > DATABASE ERROR: CONNECTION FAILED!
> >
> > Unable to connect to the database!
> > Please contact your server-administrator.
>
> Does an
On Fri, 29 Mar 2013 09:42:14 -0700 (PDT)
William Lucas wrote:
> Ok is there any way to make my IP address from USA without showing up
> anonymous
If you dont care about anonymity, there are plenty of public proxy servers.
This page is only one such list and you can Google more:
http://www.publ
On Thu, 11 Apr 2013 13:20:57 +
Andrew F wrote:
> When Tor sends out packets over the Tor network, are they always the same
> size? If not is there a max size?
>
> > ... I thought we were talking about exit
> > nodes that are run by people that are sniffing data.
> > Sure would be nice to i
On Fri, 12 Apr 2013 04:34:43 +
James Brown wrote:
> What the developers think about implementing in the Tor-net bridges
> which will lead out from Tor-net?!
> Many sites including payment systems (like PayPal, Russian YandexMoney
> and others) and even banks now block connections from Tor-net
On Wed, 17 Apr 2013 20:33:21 +
andrewfriedman wrote:
> CiCpa just passed the house. Overwhelming support. Now it goes to the
> Senate.
> If this law passes, will it affect Tor? Well we loose right to use Tor?
>
> I don't know if this the right place for this, if not please tell me and
>
On Tue, 30 Apr 2013 16:03:37 +0100
luis redondo wrote:
> Using Tor(TBB default configuration,plugins disabled) I can see videos.I
> suppose that it is HTML5 videos,so,isn't the same that flash videos? and can
> the anonymity be compromised?
HTML5 is much safer than Adobe Flash. However, if yo
On Wed, 08 May 2013 10:57:29 +0200
Moritz Bartl wrote:
> It's more about unlinkability being one of the required properties for
> anonymity. You don't want anyone to be able to link earlier sessions to
> future sessions.
A number of videos on youtube require login to confirm age and all
require
On Fri, 24 May 2013 13:39:31 -0400
Chris Patti wrote:
> I just had to shut my relay down because someone was using it to hijack
> someone else's Gmail account :\
If someone's Gmail account was "hijacked", they must have had a weak or
compromised password. This has nothing to do with you or anyo
On Fri, 31 May 2013 23:00:20 +0200
Sherief Alaa wrote:
> Why don't you just ask their live chat support?
> On May 31, 2013 10:56 PM, "Nathan Suchy"
> wrote:
>
> > I found a cloud vps provider called VPS.NET do they have a problem with
> > tor exit nodes?
See also
https://trac.torproject.org/p
On 13-06-04 05:01 PM, Kai Childheart wrote:
> How to I sftp to my server to update my Hidden Service? O.o
Set up an additional hidden service on the same machine to accept sftp
connections:
Make opensshd listen *only* on 127.0.0.1 port 22 (not 0.0.0.0)
and be sure to enable its sftp option.
The
On 13-06-05 12:32 PM, Moritz Bartl wrote:
> On 05.06.2013 18:29, Joe Btfsplk wrote:
>>> Ideally, one would place exits in countries that have little or no exit
>>> probability.
>> Little or no exit *probability?* (probability of what?) Do you mean
>> little liability?
>> What would be the point o
https://www.eff.org/deeplinks/2013/06/confirmed-nsa-spying-millions-americans
The report mentions that they have direct access to ISP's servers as
well as service providers such as Microsoft, Google and Yahoo. Since
most US users end up going to US websites, does this imply that NSA now
has end-to
On 13-06-16 06:49 PM, Roman Mamedov wrote:
> On Sun, 16 Jun 2013 15:18:47 -0700
> Mike Perry wrote:
>
>> Roger Dingledine:
>>> Tor 0.2.4.13-alpha fixes a variety of potential remote crash
>>> vulnerabilities, makes socks5 username/password circuit isolation
>>> actually actually work (this time fo
Why dont we encourage the fellow who is doing a serious usability study
on Tor software to apply his expertise to this topic since it affects
Tor users?
signature.asc
Description: OpenPGP digital signature
___
tor-talk mailing list
tor-talk@lists.torp
On 13-06-20 03:38 PM, NoWhereMan wrote:
> Hello all,
>
> i've ran trough your docs, without finding a complete answer. If my
> question is covered by a FAQ or something like that, please don't
> hesitate to "RTFM" me :)
Some of your question is answered here:
https://trac.torproject.org/projects/t
On 13-07-02 12:04 AM, Andrew F wrote:
> How about we eliminate the issue by pushing a campaign for every website to
> offer an ssl option. It really should be the standard.
>
> Anyone a marketing Guru or PR specialist?
Please do support EFF in this initiative!
https://www.eff.org/encrypt-the-web
On 14-07-23 07:05 PM, Tempest wrote:
> Kristy Chambers:
>> Have I written, that there is anything creepy about that?
>> The basic question is, in how the tor project can be trusted if we look
>> on suspicious activities of tor developers (e.g. choosing worse design
>> decisions).
>
> the fundament
On 14-07-24 01:51 PM, s7r wrote:
> Using Tor will encrypt your data totally with multiple layers, this
> means that your ISP can see that you are using Tor, and nothing more.
> They can't see what sites you visit, what data you download,
> intercept, modify or alter the data you download, can't see
On 14-07-24 06:29 PM, ideas buenas wrote:
> I don't trust Gmail nor Yahoo. Roger, found another way. No excuses, please.
I am curious why Riseup.net isnt in the list of popular and relatively
secure email providers. Also there must be several large european and
asian free email providers, but som
On 14-07-29 04:44 PM, cav78 wrote:
> I would like to know if it's necessary to
> install or configure a web proxy (privoxy or polipo) with Tor Browser
> Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
> Orbot
> (a software for Android) includes Polipo, but I don't see it in T
On 14-07-29 07:51 PM, ideas buenas wrote:
> Do you mean TBB over a VPN?
No, but if i did mean that, polipo would be even less relevant.
> On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera wrote:
>
>> On 14-07-29 04:44 PM, cav78 wrote:
>>> I would like to know if it'
On 14-08-02 01:48 PM, Mirimir wrote:
> I've been playing with JAP/JonDo routed through Tor. The JonDo client
> has a SOCKS proxy option, and it works well with Tor v0.2.3.25
> SocksPorts in Ubuntu 14.04.1 x64. I installed Tor from the Ubuntu 12.04
> repository, by the way.
>
> After upgrading Tor
On Tue, Aug 5, 2014 at 3:20 PM, Roger Dingledine wrote:
> On Tue, Aug 05, 2014 at 03:09:29PM -0400, Andrew Lewman wrote:
>> Given the resources of a national police force, it seems probable they
>> can create a crawler to simply crawl every permutation of hidden service
>> addresses on port 80 alo
On 14-08-07 05:57 AM, Andreas Krey wrote:
> On Wed, 06 Aug 2014 23:38:54 +, Yuri wrote:
> ...
>> So what is the reason that UDP isn't supported?
>
> Because what you describe is a transparent proxy/router, while tor
> only offers a SOCKS5 interface and doesn't (and doesn't want to)
> care abou
On 14-08-07 11:06 AM, mick wrote:
> This is worrying.
>
> http://www.theregister.co.uk/2014/08/07/london_cops_close_down_site_arrest_suspect/
>
> If this reporting is accurate, it implies that UK City of London Police
> may be co-operating with copyright enforcers in closing down a service
> whic
On 14-08-08 04:01 AM, grarpamp wrote:
> [Rant aside, people have a right to be forgotten, and those, like CL,
> who willfully disregard that right, without verbosely or obviously
> saying so in context (ie: mailing lists obviously have self-run, even
> public, archives... that you cannot 'delete'),
On 14-08-13 10:26 AM, Ben Healey wrote:
> I came across 2 connections that were able to stay established with my
> hardware disabled.
The software keeps trying for a while before it gives up.
Secondly, netstat for Windows may be reporting the last active
connections rather than the current state
On 14-08-13 12:28 PM, t...@skrilnetz.net wrote:
>
> Hi,
>
> Not sure if that has been discussed yet... the site torbundlebrowser.org
> is a almost perfect copy of the TOR webpage and has a TBB download which
> has malware in it. (down at the moment)
>
> http://dustri.org/b/torbundlebrowserorg.ht
On 14-08-24 11:56 PM, I wrote:
> Fair enough, although it was published elsewhere.
>
>
>
>
>>> One thing revealed is that this list doesn't get the full facts from the
>>> TOR core.
>>
>> Huh? That's a good thing, because this is not a trusted list.
Would be nice to see Tor media coverage link
On 14-08-30 02:31 AM, elrippo wrote:
> Very nice :)
>
> My browser, rekonq, reports that your certificate is not valid. Maybe you
> check
> that.
>
> Kind regards,
> elrippo
>
> Am Samstag, 30. August 2014, 02:28:22 schrieb Juris - torservers.net:
>> Update:
>>
>> https://www.torservers.net/wi
On 14-08-30 07:31 AM, Patrick Schleizer wrote:
> Cypher:
>> On 08/24/2014 09:43 PM, Michael Wolf wrote:
>> The article was very interesting - except the part about 'here's how you
>> might want to fix this'. I certainly hope that the Tor project /is not/
>> accepting patches submitted by NSA or GCH
On 14-09-03 05:46 AM, bao song wrote:
> 10.6 still supports Rosetta to run old apps.
>
> 10.7 means having to upgrade EVERYTHING.
>
> That's why I still run 10.6
>
> (and there was even more to be said for 10.4 which ran pre-OSX apps, but my
> 10.4 machine died).
Do these old apps need to be c
On 14-09-03 10:25 PM, Roger Dingledine wrote:
> On Wed, Sep 03, 2014 at 04:10:13PM -0700, Virgil Griffith wrote:
>> https://docs.google.com/document/d/1SaBK664SchhZOP9XBsB8KK63k4xlmMTlkhfF28f2204/pub
> [...]
> - Figure 3 is a bit weird. Our bandwidth-per-relay stat is a function of
> how many total
On 14-09-10 12:26 AM, Griffin Boyce wrote:
> Things that are important to note for hidden service operators:
> - Firewall rules are really useful for keeping out unwarranted scrutiny.
Would it be better to have a separate firewall appliance to ensure the
hidden service box cannot be as easily DD
On 14-09-11 04:36 PM, John Pinkman wrote:
> It all started 4 days ago, when PinkMeth site posted a profile with the
> self-taken nudes of the daughter of the company owners.
>
> [http://pinkmethuylnenlz.onion/us/pa/ligonier-pa/jeanne-markosky]
>
> The company, Markosky Engineering of Ligonier, P
On 14-09-23 12:45 PM, Fabio Pietrosanti (naif) wrote:
> Il 9/22/14, 11:42 PM, grarpamp ha scritto:
>> Whether clones or worse, there's something
>> very weird going on with these guys.
> Here an OSINT notes/analysis on several of that "suspicious" software:
> https://docs.google.com/spreadsheet/ccc
On 14-12-21 06:54 PM, Thomas White wrote:
> Ok now the dust has settled a little, a few updates on the situation:
>
> 1. The likelihood of this being the work of law enforcement seems to
> be lower than originally anticipated. This is good in many ways but
> asks more questions than it solves righ
What about making a TorProject filter list for Adblock* users so that
we all look the same to sites visited?
Or go further and include (or add some functionality of) RequestPolicy
into TBB. Its purpose is to ensure no URLs outside the domain you
intended to visit are opened, and the user has to s
The new copyright law in Canada would seem to require anyone claiming
ISP safe harbour protection to log data of users for 6 months and to
forward alleged copyright violation notices to them.
http://www.michaelgeist.ca/2014/12/notice-difference-new-canadian-internet-copyright-rules-isps-set-launch
They are tapping the cables and getting ip addresses of browsers, then
sharing that with other "intelligence" agencies. E.g. you could be
stopped at the border if someone in your house clicked on a monitored site.
Another reason to use Tor (not an uppercased acronym) all the time.
https://firstlo
On 15-02-02 09:57 PM, Mike Ingle wrote:
> http://www.confidantmail.org
> Mike Ingle
> d2b89e6f95e72e26e0c917d02d1847dfecfcd0c2
I am curious why someone delivering security and privacy software does
not have HTTPS on their webserver. Also what is that string after your
email address for?
sign
On 15-02-07 02:29 PM, grarpamp wrote:
> On Sat, Feb 7, 2015 at 5:01 AM, Mirimir wrote:
>> "if you ever need info about anyone at harvard just ask.
>> i have over 4000 emails, pictures, addresses, sns.
>> They trust me — dumb fucks."[0]
>> http://gawker.com/5636765/facebook-ceo-admits-to-calling-us
On 15-03-05 02:07 PM, t...@t-3.net wrote:
>
> On 03:05:2015, Travis Bean wrote:
>
>> Stuff
>
> I wonder if this giant pile of mess you've posted in this mailing list
> is related to the products/services you are trying to sell on the web
> site linked in your sig?
>
> I didn't like what I read
On 15-03-10 08:38 PM, z...@manian.org wrote:
> Fred says the deterministic builds for iOS are impossible because Apple's
> FairPlay DRM.
>
> RAM can't be trusted either.
>
> Everytime I think we've hit local peak dystopia, we go deeper.
>
>
>
> On Tue, Mar 10, 2015 at 3:17 PM, Mike Perry
> wr
On 13-07-13 11:45 AM, cl34r wrote:
> Honestly, do yourself a favour and use either Torbrowser or Tails. Its much
> easier and much more secure.
>
> Best Regards,
> cl34r
>
Indeed. Do not use Microsoft products at all if possible. The company
shares vulnerability information with the US Govern
i got a weird negative from the check page today while running TBB
0.2.3.25-10-dev:
*
Sorry. You are not using Tor.
Your IP address appears to be: 96.44.189.98
*
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bi
On 13-07-17 12:47 PM, The Doctor wrote:
> On 07/16/2013 11:07 PM, Andrew Lewman wrote:
>
>> The first question is why people think we produce it at all.
>
> It seems to be common that, if it involves Tor somehow, the Tor
> Project was somehow behind it. I don't know how that thought process
> wo
On 13-07-22 06:33 PM, Feinberg Mark wrote:
> Dear friends,
>
> When clicking on some links in news stories and elsewhere TOR often prevents
> me from visiting that site. Just now when clicking
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk I got this
> message:The proxy serve
On 13-07-26 10:13 AM, Sebastian G. wrote:
> 25.07.2013 15:27, Marcos Eugenio Kehl:
>> "Could a printer or another software that I have check for updates or
>> something like that and reveal information about me or my machine?"
>
>
> If one redirects all traffic through Tor and software contacts
For sharing movies and other large content anonymously, look into I2P
which was designed for such things. It is a kind of complement to Tor,
in that I2P transfers over UDP while Tor transfers over TCP. It also
uses a different architecture. Further discussion of I2P would be
off-topic for this lis
In the last few weeks, i have encountered captchas almost every session
i go onto Youtube. Is this a consequence of the decision to raise the
required bandwidth bar for "fast" relays, so that more connections come
from fewer exits?
Or is it a policy change at Google? I dont understand why a logg
On 13-07-30 12:47 AM, Thomas Asta wrote:
> http://bitmail.sourceforge.net/
No design, no specs, no discussion, no docs.
A feature list that looks remarkably like GoldBug, minus the fraudulent
EFF endorsement.
Is this a sneaky attempt to catch "darknet" users with a weak email and
messaging client
Does txtfaker use Tor?
On 13-07-31 05:34 PM, mirimir wrote:
> WTF?
>
> On 07/31/2013 05:20 PM, jimba...@bellsouth.net wrote:
>
>> Thanks for the offer but I do not have a service to advertise at this time.
>> I will keep it in mind.
>>
>> - Reply message -
>> From: "Slim Ex"
>> To:
t but try to access the site
> anyway? What happens when you're logged out?
>
>
> -Original Message-
> From: krishna e bera
> To: tor-talk
> Sent: Tue, Jul 30, 2013 10:14 am
> Subject: [tor-talk] Youtube becoming unusable
>
>
> In the last few weeks
On 13-08-02 12:50 AM, mirimir wrote:
> On 08/02/2013 03:36 AM, grarpamp wrote:
>
>>> I've seen lines along "using Tor is dangerous" a lot.
>>> Are there any stories on news pages that I could read on the topic?
>>
>> Foremost is often at your employer. Silly and unfortunate to mention,
>> but true
On 13-08-13 06:59 AM, mick wrote:
> On Tue, 13 Aug 2013 06:10:34 +0200
> Jon Tullett allegedly wrote:
>
>> On Aug 12, 2013 6:16 PM, "Roger Dingledine" wrote:
>>>
>>> Hi folks,
>>>
>>> I rewrote our two FAQ entries on JavaScript-in-TBB, and merged them
>>> into one:
>>>
>>> https://www.torproject
On 13-08-22 05:01 PM, ziggy wrote:
> I use a service that doesn't allow Tor. But I'd like to use Tor anyway,
> except at the end of the path where, hopefully, there is a way to use an
> exit that won't be detected as Tor. Is something like that possible?
There are no official "exit bridges" provid
On 13-08-23 06:46 AM, σмαя ησƒℓ wrote:
> Thanks much Seth for your effort and help but sadly I got the error
> "Permission denied". I've googled and found
> chmod +x start-tor-browser" but didn't worked, I think I've to
> chmod all the folder not just "start-tor-browser" file.
You should not need
On 13-08-23 01:15 PM, Randolph D. wrote:
> at least the design of version 0.2 is much better.
> http://goldbug.sourceforge.net/img/goldbug-encryptionmodel.png
How is this relevant for Tor users?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go
On 13-08-27 02:06 PM, Bernard Tyers - ei8fdb wrote:
>
> On 27 Aug 2013, at 18:44, The Doctor wrote:
>
>> Signed PGP part
>> On 08/26/2013 07:29 AM, Nathan Suchy wrote:
>>> First off Edward Snowden did not need anonymity. He went public on
>>> this.
>>
>> Is it known if he chose to go public, or
On 13-08-31 12:25 AM, Roger Dingledine wrote:
> On Fri, Aug 30, 2013 at 04:29:18PM +, Matt Pagan wrote:
>> # Configured for speed
>
> Just for the record, the three lines here don't help speed much (or
> maybe at all).
>
>> ExcludeSingleHopRelays 0
>
> This first line says it's ok to use rel
On 13-08-31 01:29 PM, Missouri Anglers wrote:
> Is this a good group for a newbie to ask stupid questions? Or is there
> another group I should be involved with?
The "About tor-talk" page
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
says
"This mailing list is for all discussion
On 13-09-03 03:56 PM, mirimir wrote:
> On 09/03/2013 03:35 PM, adrelanos wrote:
>
>> New hypothesis:
>> This is an attempt to shut down the Tor network once and forever.
>>
>> Might this be an attack on the Tor network with the goal to make it that
>> slow for everyone, that no one will use it any
How is this directly related to Tor?
Perhaps it is more effective to support EFF and tell your non-tech
correspondents about SOPA.
On 13-09-04 05:22 PM, Nathan Suchy wrote:
> Sent from my Android so do not expect a fast, long, or perfect response...
> -- Forwarded message --
> Fr
On 13-09-05 04:20 PM, Edgar S wrote:
> I'm running on an old version of Tor Browser because every new version
> I've tried does not support remembering passwords or leaving on the
> option to remember passwords over new invocations. Has this ever been
> fixed? Is it even scheduled to be fixed?
The
On 13-09-05 03:58 PM, mirimir wrote:
> On 09/05/2013 03:05 PM, Robert G wrote:
>> Could there be an initial, one time, human test for for access? Unique
>> tokens could be granted after a CAPTCHA, or something similar, and
>> exchanged for initial handshakes between routers and clients. Of course
On 13-09-05 03:59 PM, Nathan Suchy wrote:
> How private is Tor?
What do you mean by private?
The Users of Tor article shows several types of users with different
privacy needs. https://www.torproject.org/about/torusers.html.en
The notes on the Tor download page give some hints how to ensure you
SSL connections have been MITM'd and the content
read.
Good luck.
> Sent from my Android so do not expect a fast, long, or perfect response...
> On Sep 5, 2013 6:15 PM, "mirimir" wrote:
>
>> On 09/05/2013 09:55 PM, krishna e bera wrote:
>>
>>>
On 13-09-06 10:26 PM, Nick Mathewson wrote:
> Over the 0.2.5 series, I want to move even more things (including
> hidden services) to curve25519 and its allies for public key crypto.
> I also want to add more hard-to-implement-wrong protocols to our mix:
> Salsa20 is looking like a much better choi
On 13-09-07 01:20 PM, Asa Rossoff wrote:
> Trust is involved. Speaking of which, do we have bios of all Tor
> contributors, esp. those that authorize code changes and those that compile
> code? Do we have public ongoing accounting of who gets paid how much and
> for what?
Why would we need perso
On 13-09-24 11:49 AM, David Green wrote:
> On Mon, Sep 23, 2013 at 08:24:40PM -0400, David Green wrote:
>> I have -- for my own reasons -- stopped advancing my OS X machine's OS at
>> Tiger. I enjoy working with it and doing my small-time programming. I
>> have been exposed to 'tor' in the recent
On 13-09-28 04:57 AM, Graham Todd wrote:
> I've started to find that my Ebay.co.uk account is rejecting my contact
> when Tor is running, but does not do that if I switch off Tor.
What do you mean by "when Tor is running"? e.g.
- connecting to Ebay.co.uk via TBB
- running a Tor exit node on the
On 13-10-02 08:00 AM, harmony wrote:
> The latest iteration is based on Firefox 10.0.9esr, which brings with it
> a lot of important security fixes.
I hope you mean Firefox 24.0esr or at least 17.0.9esr
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other set
On 13-10-03 09:13 PM, Juan Garofalo wrote:
> --On Thursday, October 03, 2013 6:54 PM -0400 Roger Dingledine
> wrote:
>
>>> that he was sold out by his VPN provider. Hopefully, the identity of
>>> that VPN provider will come out soon.
>>
>> Why? So everybody can abandon that VPN and move to a diff
On 13-10-04 09:01 PM, adrelanos wrote:
>> * Is Ubuntu a good option as a guest (and maybe use here the TBB from
>>time to time)? So far is the only Linux distro that I've used
>
> Ditch Ubuntu:
> https://www.eff.org/deeplinks/2012/10/privacy-ubuntu-1210-amazon-ads-and-data-leaks
Those proble
On 13-10-05 01:47 AM, Moses wrote:
> Just a example, you can argue that. Though in my opinion, for
> security, Firefox should never be the first choice.
Can you give some reasons for that statement and tell us what
alternative(s) you are using that are better?
Have you seen the TorBrowser design
Having "intelligence" or other government agencies run normal relays is
great, especially exits. After all, some (all?) government funding for
Tor is based on the theory that dissidents (and agents) in rival
countries communicate securely and anonymously over the network.
Nothing to be ashamed of.
On 13-10-07 11:44 PM, Joe Btfsplk wrote:
> Yes, the pages are timing out - immediately, repeatedly, spread out
> dozenS of times over a week. Also happening on DDG. I would've used
> dozens of circuits & new identities. Some were U.S. exit relays. The
> only way I know of that could happen, is
On 13-10-08 05:19 AM, Lunar wrote:
> Sean Alexandre:
>> In light of FoxAcid and the NSA hijacking traffic coming out of exit nodes
>> [1],
>> I'm wondering about the possibilities for building counter measures into exit
>> nodes. To start it might be something as simple as bundling some type
>> a
On 13-10-09 04:00 AM, Sebastian G. wrote:
> 09.10.2013 06:24, Joe Btfsplk:
>> On 10/8/2013 6:13 PM, Moritz Bartl wrote:
Is there a reason even stable Win versions never reference the OS in
file names?
>>> .exe is a Windows(-only) extension. I agree that the OS could be added
>>> to the f
On 13-10-09 07:14 PM, Joe Btfsplk wrote:
> After manually adding prefs.js entries in 3.0a4, that were suggested on
> Tor project Trac to make it work, there's no change in being unable to
> connect to Startpage, Ixquick, DDG; often even Wikipedia -SSL & Google.
>
> Could it be (for Startpage & Ixq
On 13-10-10 02:10 PM, Joe Btfsplk wrote:
> On 10/10/2013 11:26 AM, Joe Btfsplk wrote:
> ...
When you find yourself replying a lot in your own troubleshooting
thread, it may be time to start a ticket on https://trac.torproject.org
and followup there. When the problem is solved, a report back to th
On 13-10-15 10:29 AM, Jon wrote:
> Another article from the Washington Post may be interested in.
>
> *http://tinyurl.com/lcdas97
Please make your emails worthwhile to read and useful to index, by
providing a sentence in your own words saying what the link you are
forwarding means. Failing that
On 13-10-17 02:47 AM, Roger Dingledine wrote:
> 11) Refused my invite to the IEEE Security & Privacy (Oakland) 2004
> Program Committee because of IEEE's anti-science publishing policy:
> http://www.researchwithoutwalls.org/
Perhaps a typo - should that be 2014 or is IEEE S&P somewhat backlogged?
On 13-10-22 02:58 PM, aut...@anonymousbitcoinbook.com wrote:
> As far as I can tell, the main competitor to Tor, which is far behind in
> network size, is I2P.
>
> en.wikipedia.org/wiki/I2P
>
> -Kristov
>
> On 2013-10-22 11:58, Anonymous wrote:
> Hello!
>
> How many ways are there to be anonymo
On 13-10-22 11:56 PM, Peter Tonoli wrote:
> On 10/23/13, 5:42 AM, Trigger Happy wrote:
>> Check out new Tor distro - Linux Kodachi
>>
>> http://www.digi77.com/linux-kodachi/
>>
>> http://sourceforge.net/projects/linuxkodachi/
>
> Where's the source code to Kodachi?
If anyone has time please check
On 13-10-23 01:53 PM, Andrew F wrote:
> Andrea,
> This sets a terrible precedence. I would hate for other jurisdictions to
> move in this direction.
>
> On Wed, Oct 23, 2013 at 2:42 PM, Andrea Shepard wrote:
>
>> On Wed, Oct 23, 2013 at 12:24:04PM +0200, Andreas Krey wrote:
>>> On Wed, 23 Oct 201
On 13-10-24 09:45 AM, e-letter wrote:
> On 24/10/2013, tor-talk-requ...@lists.torproject.org
> wrote:
>>
>> --
>>
>> Message: 5
>> Date: Thu, 24 Oct 2013 10:45:57 +
>> Subject: Re: [tor-talk] linux configuration, root installation
>>
>>
>> : The linux installation i
On 13-10-24 02:21 PM, aut...@anonymousbitcoinbook.com wrote:
> By changing the browser fingerprint, do you mean altering the HTTP
> request headers, such as the User-agent? You'd need to decrypt SSL/TLS
> traffic in order to modify the headers of any request sent over SSL/TLS,
> so that limits you
On 13-10-26 07:06 AM, Griffin Boyce wrote:
> So Imgur is blocking uploads from the Tor network (even when logged
> in) but still allows people to view images/galleries, upvote/downvote,
> comment, and change their account details.
>
> Overall, I think this is a pretty reasonable way to minimiz
1 - 100 of 203 matches
Mail list logo