> I just want to make sure that... the ISP is not throttling traffic without
> notification.
Yeah, that's a valid concern. Aside from running through some of the
M-LAB tests (https://www.measurementlab.net/tests/), it can be hard to
predict or detect this.
Another issue that can crop up is poor
On 22.08.16 19:22, Green Dream wrote:
> https://blog.torproject.org/blog/lifecycle-of-a-new-relay
Thank you. I had read about this, but the relay in question already had
both the 'stable' and 'guard' flags (which probably meant it was in
phase 3), and lost both flags after I enabled accounting. I
@Ralph
https://blog.torproject.org/blog/lifecycle-of-a-new-relay
It is normal to experience a dip in traffic. Just keep the relay
running and let things play out. It can take weeks for utilization to
peak.
___
tor-relays mailing list
tor-relays@lists.to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/21/2016 10:28 PM, Petrusko wrote:
> Thx for sharing this kernel option, and this experience.
Under Gentoo Linux it is very easy to have GRSecurity. I do use it both on my
desktop and my server w/o bigger problems.
> But if I understand well,
Arisbe writes:
>
>
I agree in general with a lot of what is said here, but I have to take
issue with one point:
>
>
>
> Okay, so I've been concerned about the safety of at-risk Tor users
> since all this shit broke. New employees at the organizational
> structure serv
Or six-years-old-sand...@lists.torproject.org
This whole manifesto sounds like it was written by spoiled teenager or counter
intelligence
agent who is trying to incite unrest. Its designed to provoke emotions and
doesn't deal with anything real.
And I think its really awesome. This means that t
Thanks for all the replies!
It's actually a good advice, not to run backup and tor on the same
server, in case it gets seized or the ISP kills it.
Also, the small monetary savings aren't really worth the increased
attack surface for both, the tor relay and the other services.
I therefore won'
On 21.08.2016 13:29, Sebastian Hahn wrote:
> Just keep your relay up and you should regain the flag.
Followup:
Now that another day has passed, the relay's traffic has unfortunately
dropped significantly, to roughly 10% of what the relay could process
according to AccountingMax and the specified
Sometimes it can because of a bad/cheap power supply... Not the ARM-Pi
or the OS :s
> Hi, used to run a Banana PI with Debian as a TOR Relay. This is not
> recommendable since the system froze after a while. Although this could just
> be my system that is unstable.
>
> but from my experience I
I concur with all you say below.
Exceptionally well spoken. Evidently you have some solid experience in
your corporate managerial role.
Thanks for speaking up.
On Sun, Aug 21, 2016 at 11:50:37PM -0700, Arisbe wrote:
>Okay, so I've been concerned about the safety of at-risk Tor users since
Torsdag den 18. august 2016 12:35:11 skrev Zack Weinberg:
> Has anyone had any experience running *exit* nodes on Raspberry Pi-grade
> hardware, or slightly beefier? We are thinking of replacing the old,
> bulky, power-hungry machine currently running exit
> 78C7C299DB4C4BD119A22B87B57D5AF5F3741A7
This thread should be moved to [ tor-knitting-cir...@lists.torproject.org ] or
write to The Tor Corporation you think exists.
Robert
> -Original Message-
> From: tor-am...@foofus.com
> Sent: Sun, 21 Aug 2016 20:35:50 -0700
> To: tor-relays@lists.torproject.org
> Subject: Re: [tor-relays]
12 matches
Mail list logo