Jesse Victors:
> I've been running some exit nodes for some time now, and they're doing
> well. They've burned through many terabytes of bandwidth, and thanks
> to Tor's recommended reduced exit policy, complaints have been
> minimal. Clearly the vast majority of the Tor traffic is not
> malicious,
OMG dude - take a downer
If you are in a time sensitive situation, and (picking a random offtopic
thought here :) wanting to do some leaks, the best thing might be to find
someone you trust (who is reasonably technically literate), and pass the
material to them, ask them to post it to var
On 7/11/14, Greg Moss wrote:
> Thanks for the help. I have my ORport and DIRport defined in torrc and
> forwarded through the firewall up to the Tor Relay. I was just wondering in
> regards to outbound traffic from the server itself.
What type of tor server did you decide to run (relay, exit, bri
On Thu, 10 Jul 2014 19:48:06 -0700
"Greg Moss" wrote:
> Thanks for the help. I have my ORport and DIRport defined in torrc and
> forwarded through the firewall up to the Tor Relay. I was just wondering in
> regards to outbound traffic from the server itself. In the event it gets
> compromised I r
Thanks for the help. I have my ORport and DIRport defined in torrc and
forwarded through the firewall up to the Tor Relay. I was just wondering in
regards to outbound traffic from the server itself. In the event it gets
compromised I really hate to open all ports outbound let alone possible DNS
lea
On 7/11/14, Greg Moss wrote:
> Newbie to Tor but have a Debian server up and running as a relay. Do I
> need
> to filter outbound traffic from the tor server on my firewall. If yes what
> ports would I need to open. I am also have a good look a Tails any
> suggestions would be helpful.
Sounds l
Newbie to Tor but have a Debian server up and running as a relay. Do I need
to filter outbound traffic from the tor server on my firewall. If yes what
ports would I need to open. I am also have a good look a Tails any
suggestions would be helpful.
Thanks -
gm
Hi Jesse,
On 07/11/2014 01:23 AM, Jesse Victors wrote:> can detect an obvious
> clearnet attack and drop that connection a few milliseconds after
> the attack occurs
I would advise against anything that touches the traffic. There will be
false positives, and I know quite a number of resea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hey guys,
I've been running some exit nodes for some time now, and they're doing well.
They've burned through many terabytes of bandwidth, and thanks to Tor's
recommended reduced exit policy, complaints have been minimal. Clearly the vast
major