llance bill
currently passing on our country…
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signatu
rivate key.
Regards
--
Aeris
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Description: This is a digitally signed message part.
___
tor-rela
seized servers of big french
providers (OVH & Online at this time) on this list the 13 and 14/05.
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR
ich requires a tor source code change to remove it).
Thanks for this feature, I don't know it !
> Could you also confirm the relay fingerprints (in addition to the
> nicknames)?
kitten1 86E78DD3720C78DA8673182EF96C54B162CD660C
kitten2 2EBD117806EE43C3CC885A8F1E4DC60F207E7D3E
Regards,
-
tory.
Regards,
--
Aeris
https://imirhil.fr/
Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Description: This is a digitally signed message part.
___
tor-re
even begin to see 1TB RAM machine.
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Descrip
a lot of TCP sockets (14k sockets).
Those parameters don’t scale very well if you have more nodes (65k TCP port
only, or some hundred of GB of RAM). Currently, with standard hardware, seems
we can’t host more than 10 or 20× more nodes than today without hitting some
hardware limit.
Regards,
, such undetected attack requires global organisation to
subvert and subponea enough people (network admin, sys admin, companies,
hardware hosting…) to build it. It's more planetary conspiracy theory than
anything else.
Regards,
--
Aeris
Individual crypto-terrorist group self-radical
in such case is to contact the operator to speak about
diversity problem and to ask for shuting down some nodes if we consider he
controls more consensus he should.
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect yo
that's a problem :(
That’s a theorical problem.
Currently, most of the major guard operators are well known people and no
doubt they’re not engaged with three-letter agencies.
https://github.com/ornetstats/stats/blob/master/o/main_guard_operators.txt
Regards,
--
Aeris
Individual cryp
> @Aeris
>
> I do not see how Sybil attacks relate to my question. The adversary will
> simply set up new nodes, without messing with attacking identities of
> existing ones.
Sybil attack is not attacking identity, but just running bunch of relays.
> As to the rest of it
e next rotation).
And last, even if you use an evil guard node, attacker need to control an
other node (middle or exit) on one of your circuit to break anonymity.
So, evil guard nodes are not a big problem :)
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital In
ecause Tor is not fully multi-thread/multi-core, you have to run another Tor
daemon on the same host to use 1 more CPU core and so drain another
150-300Mbps.
Currenly, you can start up to 2 Tor daemons per IP, there is a limitation to
avoid Sybil attack.
Regards,
--
Aeris
Individual crypto-ter
n’t expect to have more
than 0.25-0.3 load with only Tor (1 core fully used).
You have to start another Tor instance to use a little more your CPU (1 other
core) and so to drain additionnal 150-300Mbps.
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital I
ndwith before end of august to get guard flags ?
Only the 25% fastest relays can get the guard flag. Today it’s around 2.5 MBps
advertised / 1MBps measured. Babylonian is just at the limit (2.45MBps
advertised, 600kBps measured).
<3,
--
Aeris
Individual crypto-terrorist group self-radic
d flag assignment).
You have to wait 60 days from your guard flag to reach this point.
See https://blog.torproject.org/blog/lifecycle-of-a-new-relay, you’re
currently at the beginning of the 3rd phase.
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://i
han 300Mbps (one core of
2Ghz Xeon is ~ 100Mbits, standard CPU is ~ 300Mbps, best known Tor relay
currently handle 500Mbps).
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EF
> Ubuntu/Debian doesn't have the latest version of Tor. You should use the
> official repository: https://www.torproject.org/docs/debian.html.en
I already use this repo for all my relays :)
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital
amd64.deb
6f2f4118b69420882022b526b956d65dc22a0b12
official tor xenial tor_0.2.8.6-3~xenial+1_amd64.deb
98677a0bfd0d3c22f342b44b824ba4d03f8facd3
IMO, if you rebuild from scratch, you have to achieve reproductible build, to
allow post-build verification (and so, trustability of your snap).
<3,
--
Aeri
> Aeris, I should be worried if any of those matched. Did you know 0.2.8 is
> out?
Currently not on Xenial and Jessie (even in backport). ><
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privac
deb)
6ba3b089029c1ae77ffcfb8fe2ee39335066b98a
Tor project repo (tor_0.2.7.6-dev-20160824T140713Z-1~xenial+1_amd64.deb)
8a2387c986ae98df7b2b78463aa6104ae5ebd080
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encryp
with at least OpenSSL & Tor up-to-date, and so
to use and follow official upstream release.
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2
and more generally all packaging system embeding libs inside are
just a nightmare in terms of security update.
<3
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E2
corrected !
For others nodes of my family, avoid kitten5 and 6 at this moment, potential
migration with IP change in few months.
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
sabled (seems
not human, only 2s duration) ?
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signatu
1 kitten1 hueN03IMeNqGcxgu+WxUsWLNZgw 62.210.124.124 9001 0
735 kitten1 hueN03IMeNqGcxgu+WxUsWLNZgw 62.210.124.124 9001 9030
$ rgrep kitten1 | grep "9001 0"
13/2015-12-13-11-00-00-consensus-microdesc:r kitten1 hueN03IMeNqGcxgu
+WxUsWLNZgw 2015-12-13 10:48:46 62.210.124.
already opt-in for it inclusion on december, with my others nodes
(kitten[1-4])).
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café
etails/
2EBD117806EE43C3CC885A8F1E4DC60F207E7D3E
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Description: T
possible leaks
- because anybody can create an HS and proxify any content, X.509 certs
allow users to verify the authenticity of the HS (you are on the official
Facebook HS if you have a cert with facebook.com *AND* facebookcorewwwi.onion
inside)
--
Aeris
Individual crypto-terrorist group se
> we will only add your relay if you opt in.
You obviously have my opt-in for my kitten1
(86E78DD3720C78DA8673182EF96C54B162CD660C) relay !
<3,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encryp
law about state mass surveillance, with deployment
of « black box » for security interception. Could it be related ?
Regards,
--
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/
Protect your privacy, encrypt your communications
GPG : EFB74277 EC
need to have stable and long running relay to gain more consensus and
bandwidth usage.
And it take more than 68 days for a stable relay to reach full capacity.
See https://blog.torproject.org/blog/lifecycle-of-a-new-relay
Regards,
--
Aeris
Individual crypto-terrorist group
self-radicalized on
eed
formal application details before that) and even this law doesn’t forbid
crypto.
Regards,
--
Aeris, french citizen
Groupe crypto-terroriste individuel
autoradicalisé sur Internet
Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https
> I'm unaware if Vidalia is still operational in its current state.
Using Vidalia from Debian repo and still operate correctly.
--
Aeris
Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Des
, bridge fingerprints are obfuscated before publishing.
Perhaps this is the reason of the error ?
--
Aeris
Protégez votre vie privée, chiffrez vos communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/
signature.asc
Description: This is a digi
35 matches
Mail list logo