deal of life.
Gumby
On 03/29/2017 05:47 AM, John Ricketts wrote:
Gareth,
Thank you for your response.
I can imagine how this could turn into Oil and Gas incident and I
certainly wouldn't want that for myself or anyone else. I'm still
debating the privacy of CC:ing the group. As the m
Nice to finally see this...
"The encrypted email provider announced Thursday it will allow its users
to access the site through the Tor anonymity service.
The aim is to allow its more than 2 million users access the provider by
taking "active measures to defend against state-sponsored censors
y TBB update that allowed their "true" IP to be found -
then doxxed each one and posted the list of child porn frequenters from that?
Based on a scenario such as that - who CAN we trust? Who is actually "in the
circle of trust" - and who ain't?
Gumby
"We're from
t does this entire Tor freedom concept become the field of
rich, unlimited bandwidth mavens?
And incidentally, those jocks would never had graduated if not for the
"nerds" that tutored them - the little guys provide a hell of a lot more
than people realize.
Gumby
On 12/22/2016 12:47
ANY newer Intel hardware?
Gumby
On 12/07/2016 02:35 PM, diffusae wrote:
On 07.12.2016 01:36, Duncan Guthrie wrote:
if some flaw was exploited in the various nasty proprietary bits that
make up the Pi, much of the network might be compromised - due to large
similarities across the different mod
I run two lower bandwidth middle relays, and have been considering
changing one to a bridge to provide for a different level and type of
users. It sounds like this may only be a temporary bump in the system,
so I will continue with my thinking. Surprising to see some of the
recent changes, we n
Exits are badly needed, but is it economically feasible to change to a
relay? Based on your cost, and the ISP attitude to a relay only, does it
make sense to be a relay instead - and still provide for the Tor community?
I would be curious also to know if many of the ISP's have a higher
level t
do you have the full xfinity system with security and wireless cameras?
that would be the encryption points probably - if you do.
Me
On 05/31/2016 05:27 PM, Percy Blakeney wrote:
I've recently taken her Dell out of her room and into mine. She knows
the rules and ALWAYS grabs me before install
as always, ALWAYS, asked the same thing: "Unplug your
modem from your router." And each time I've had to tell them, I
don't have a separate modem, I have the Arris router/modem combo
that you gave me.
On Tue, May 31, 2016 at 5:15 PM, Gumby mailto:i...@gumbyzee.
If you unplug your router, what shows as wireless signal? There could be
neighbors. Else yours may have guest wireless turned on - but E2DE means
End 2 Display Encryption, _someone_ has a tunnel. the 2.4 and 5 are the
frequencies, looks like they are on the same router, whomsoever it
belongs to
Mate is the desktop type, like cinnamon, xfce, kde. What release? Same
one, 17.3?
what type media did you use to install? did it come from Mint for sure,
and did you check the signature? At the bottom of the download page @
Mint there is the checksum to get. That is why, especially with tor, we
Actually, looks like it used the 2.3.25 browser bundle. But it was
through emule file sharing. If he is legit, and I have concerns, could
the daughter download some old infected files - and was it network aware
enough to spread and infect a new Mint/Ubuntu?
New variant back to life, finding any
? questions arise out of the fog.
Sir Percy Blakeney - the Scarlet Pimpernel of fiction. cute.
sorry, just looking under the goat bridge,
Me
On 05/31/2016 04:31 PM, Mirimir wrote:
On 05/31/2016 01:34 PM, Gumby wrote:
That is a fairly old version of Tor to have installed.
On 05/31/2016 03:06 PM
That is a fairly old version of Tor to have installed.
On 05/31/2016 03:06 PM, Percy Blakeney wrote:
And this:
.
.
.
TorVersion Tor 0.2.4.27 (git-412e3f7dc9c6c01a)
CircuitBuildTimeBin 1175 1
CircuitBuildTimeBin 1275 1
CircuitBuildTimeBin 1375 1
CircuitBuildTimeBin 1525 1
CircuitBuildTimeBin
ad signal (hup).
Reloading config and resetting internal state.
May 31 07:35:23.000 [notice] Read configuration file
"/usr/share/tor/tor-service-defaults-torrc".
May 31 07:35:23.000 [notice] Read configuration file "/etc/tor/torrc".
On Tue, May 31, 2016 at 2:12
I am a tech, a good one, who also runs 2 relays from my shop. I have
found in client PC's many hidden things - such as proxys running for
malware delivery. They were totally unaware except for slow and losing
disk space. (Finding Tor running is a bit too extreme) I've also had two
clients that
I recently had some spare time, so sat looking at the list of connections in arm
just for S&G. Most of the connections have fingerprints - but there are always a
few "unknown".
I run 3 relays on 2 different providers, one of them online over a year, and
list my family in torrc. Yet, several "unknow
.6.9. The DMZ'd relay worked until I had to> forward 9001 to the 2nd, then it quit. Uptime was normally 40 - 50> days until a kernel update, or something major. Both are old> laptops on battery backups that never have power down. Router is an> Archer C7, latest firmware.
s Linux 3.2.0-86 and Tor 0.2.6.9. Relay 2 is Linux> 3.16.0-30 and Tor 0.2.6.9. The DMZ'd relay worked until I had to> forward 9001 to the 2nd, then it quit. Uptime was normally 40 - 50> days until a kernel update, or something major. Both are old> laptops on battery backu
19 matches
Mail list logo