On 12/22/2014 08:57 PM, Thomas White wrote:
>
>
> Mirimir:
>> On 12/22/2014 07:44 PM, Thomas White wrote:
>>> Assuming the court returns my passport in the court session I
>>> have later today, I will be available to answer any questions on
>>> the operations of such in the UK and on how to handl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Mirimir:
> On 12/22/2014 07:44 PM, Thomas White wrote:
>> Assuming the court returns my passport in the court session I
>> have later today, I will be available to answer any questions on
>> the operations of such in the UK and on how to handle law
On 12/22/2014 07:44 PM, Thomas White wrote:
> Assuming the court returns my passport in the court session I have
> later today, I will be available to answer any questions on the
> operations of such in the UK and on how to handle law enforcement
> given the unfortunate volume of encounters I've ha
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Assuming the court returns my passport in the court session I have
later today, I will be available to answer any questions on the
operations of such in the UK and on how to handle law enforcement
given the unfortunate volume of encounters I've had w
Hi,
Torservers.net invites Tor exit relay operators and organizations to a
meetup. If possible/relevant, for example if you're a member of one of
the 'Torservers partner organizations', please prepare some slides on
your activities. You're obviously also welcome to suggest sessions as a
member of
On Sat, 22 Nov 2014 17:33:59 -0800, Seth wrote:
Thanks for the information. I was able to get the latest git version of
Tor build against the libressl-2.1.1 pkg in a fresh FreeBSD 9x jail
using the following steps:
pkg install libressl autoconf git gmake gettext
mkdir /usr/local/src;cd /usr
On 12/22/2014 06:44 PM, Michael Renner wrote:
> Hi,
>
> my tor exit node was targeted with two DDoS attacks, one on 2014-12-20
> 01:00 CET and one on 2014-12-22 18:00 CET [1], both lasting about 5
> minutes each.
Not sure if this is related too, but somebody uses my exit relay for port scans
(>1
On 2014-12-22 01:42, Felix wrote:
Hi
See: https bugs.debian.org/cgi-bin/bugreport.cgi?bug=773576
There's as of yet no update from Apple applicable to those relays running on
Mac OS X.
In the interim, I've reconfigured ntpd on the Macs to deny queries (steps
below). This may prevent their
I run a guard node but I've also been targeted by a DDoS last week (five
days ago), lasting a mere 15 minutes. I'm not sure I believe in
coincidences. Especially after what you've mentioned and in regards to:
http://www.theregister.co.uk/2014/12/22/stay_away_popular_tor_exit_relays_look_raided/
A
Hello people,
some days ago we sent a mail [1] asking for feedback on our patch
that collects hidden service statistics from Tor relays.
Specifically, we are trying to answer the questions: "Approximately
how many hidden services are there?" and "Approximately how much
traffic of the Tor network
Hi,
my tor exit node was targeted with two DDoS attacks, one on 2014-12-20 01:00
CET and one on 2014-12-22 18:00 CET [1], both lasting about 5 minutes each.
This alone wouldn’t be too noteworthy if it weren’t for the fact that
a) there’s a certain state of alarm WRT the Tor networks integrity
phk to the rescue!
See https://github.com/bsdphk/Ntimed for upcoming ntpd replacement.
On 22 December 2014 at 09:42, Felix wrote:
> Hi
>
> See: https bugs.debian.org/cgi-bin/bugreport.cgi?bug=773576
>
> Debian will be fixed by 'apt-get update' and 'apt-get upgrade'.
> dpkg.log tells if the fix
Hi
See: https bugs.debian.org/cgi-bin/bugreport.cgi?bug=773576
Debian will be fixed by 'apt-get update' and 'apt-get upgrade'.
dpkg.log tells if the fix is in place:
https security-tracker.debian.org/tracker/CVE-2014-9293 ...
Cheers!
___
tor-relays ma
13 matches
Mail list logo