In planning how to configure Tor relays, I've been considering various
known attacks. Most involve systemic issues about design and
implementation, and so aren't relevant to relay configuration. But there
is one that seems relevant, and addressable.
I've been reading the work of Sambuddho Chakrava
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I don't know whether introductions are hopelessly old school on this
list, but here's a brief one. Although I've used Tor for many years,
it's been just about a year since I decided to understand it better.
I've also been catching up on the literature.
Thanks Chris,
I will check the links.. :)
Looks like TOR is still going through a development phase which is a good thing
Thanks,
Torzilla11
> Date: Thu, 9 Oct 2014 22:58:06 +0200
> From: christ...@ph3x.at
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays] Need Routing Info o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
Am 2014-10-09 um 22:11 schrieb Tor Zilla:
> Also a quick question jumped in.. Say i have a Raspberry PI which
> is converted to a TOR router and i connect my machine to this
> router. Will this make the entire traffic go via TOR including
> someth
I believe that error means obfsproxy was either not installed correctly or
your torrc is not pointing to the correct location. Follow the below link's
instructions.
Also, a quick google search for that error provided resukts from this
mailing list. Follow its instructions as well.
https://lists.t
Thanks again for taking time to answer all the questions..
This helped me a lot.
I am adding Tor-talk mailing
list
to my address book...
Cheers,
Torzilla11
> From: datzr...@alizeepathology.com
> To: tor-relays@lists.torproject.org
> Date: Thu, 9 Oct 2014 16:16:45 -0400
> Subject: Re: [tor-r
Hi everyone.
I am currently operating 4 bridges on VPSs. They all appear to working
correctly. However, 2 of the 4 bridges have 0kb/s as their advertised
bandwidth while the other two are advertising around 100KB/s.
Is there a reason for the 0kb/s? Does this indicate an error in my bridges
or sim
On Thu, 9 Oct 2014 21:01:24 +0200
Oliver Baumann wrote:
> FYI, I installed obfs4 today on my Pi using this:
> https://packages.debian.org/sid/armhf/obfs4proxy/download
>
> Just pick a mirror near you and wget/curl/... the .deb directly. It
> installs via `dpkg -i` without ado. Whether it's workin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> Thats a ton of information which is very much simplified..
> Specially the graphics ;)
Anytime.
> I have a clear understanding now.. So what i figured is as far
> as my ISP goes, he only knows that i am using Tor, period.
Anyone who can monitor bo
Also a quick question jumped in.. Say i have a Raspberry PI which is converted
to a TOR router and i connect my machine to this router. Will this make the
entire traffic go via TOR including something as simple as a ping request. Say
i ping a machine on the web, will it stay anonymous or i will
Thanks Derric,
Thats a ton of information which is very much simplified.. Specially the
graphics ;)
I have a clear understanding now.. So what i figured is as far as my ISP goes,
he only knows that i am using Tor, period.
Rest all is good to go.. All thanks to encryption. Then i assume this ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Actually this diagram is a pretty good visualisation as well:
https://www.eff.org/pages/tor-and-https
Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)
iD8DBQFUNufCRHoDdZBwKDgRApeLAJsEKbOzeXsrxBLUKCqsbkDC5Q/mRAC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> I am trying to figure out how the packet flows over a Tor network.. There is
> a mix of information.. Some claim that the ISP is not aware of the payload as
> the complete data is encrypted whereas some say that your ISP is not used at
> all when usi
Hi Folks,
I am trying to figure out how the packet flows over a Tor network.. There is a
mix of information.. Some claim that the ISP is not aware of the payload as the
complete data is encrypted whereas some say that your ISP is not used at all
when using Tor network. AFAIK my packets go to th
On 10/09/14, Alexander Dietrich wrote:
> On 2014-10-08 23:30, Yawning Angel wrote:
>
> >obfs4proxy has both armel and armhf packages in unstable. The armel
> >packages should work, the armhf packages will not.
>
> Installing the "armel" package fails because the Pi is "armhf" (or thinks it
> is)
On 2014-10-08 23:30, Yawning Angel wrote:
obfs4proxy has both armel and armhf packages in unstable. The armel
packages should work, the armhf packages will not.
Installing the "armel" package fails because the Pi is "armhf" (or
thinks it is).
I tried building the source package, but got so
Agreed with the above. If you run more than a single exit I would
further recommend that you try to diversify the exit location, IP ranges
and ISP if you can. That's not a huge issue if it's only a few servers
being run, but if you begin to process over 125MB/s of traffic overall,
it's best to star
On 10/9/14, 8:21 AM, Eric Hocking wrote:
> Hi everyone,
>
> Is there a limit to how many exit nodes we can run?
> ___ tor-relays mailing
> list tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
Let m
Hi everyone,
Is there a limit to how many exit nodes we can run?
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
19 matches
Mail list logo