We should at some point probably look into banning or de-prioritizing
relays hosted under the 4 AS's listed above, given enough network
capacity.
Or maybe only allow x% of guard / middle / exit fraction per AS and
then de-prioritize.
2020-08-24 21:17 GMT, nusenu :
> Hello CypherpunkLabs,
>
> I no
It would be nice to read short and concise messages about how to run relays the
best way for privacy and security.
You can run relays without sending messages.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/c
On Thu, Apr 4, 2019 at 2:50 PM Old Man Tor wrote:
>
> Sorry to hear that, that's really unfortunate and I would never want to wish
> that upon anyone. I wish you a speedy recovery with hopefully no lasting side
> effects.
Thank you, I appreciate that. Unfortunately, I am unable to walk anymore.
Exhibit A, 'look at me' show.
You previously noted your withdrawal from DeadGreyPonyIT to the list, and if I
remember correctly, more than once. No need to do so again.
If you want to provide a friendly, warm, and respectful response (and *gain*
the respect of others here), lose the pompous 192
Following up,
I am not longer associated with Greypony IT nor Mr. Rockenhaus. If Mr.
Rockenhaus decides to discuss his next Tor Exit Hosting Service do know
that I am not involved with said messages. Please do not contact me
requesting them to stop as I have no say or control over what Mr.
Roceknh
Sorry to hear that, that's really unfortunate and I would never want to wish
that upon anyone. I wish you a speedy recovery with hopefully no lasting side
effects.
That said, it has been a GOOD amount of quiet while you've been gone.
For the love of god/shiva/onions, please don't let these new
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Welcome back Conrad.
I too have had a stroke. Glad to see you are alright.
‐‐‐ Original Message ‐‐‐
On Wednesday, April 3, 2019 9:48 PM, Conrad Rockenhaus
wrote:
> Hi Tor-Relays,
>
> I apologize that I just disappeared, I wound up with a
Glad you are back and feeling OK.
On 4/4/2019 at 4:48 AM, "Conrad Rockenhaus" wrote:Hi Tor-Relays,
I apologize that I just disappeared, I wound up with a massive stroke
last year which was more significant than the last one and was
hospitalized longer for recovery and rehabilitation. Things just
Hi Nusenu
Am Samstag, den 24.03.2018, 13:51 + schrieb nusenu:
> Hi Tim,
>
> > > I saw you recently added 8 new
> > > tor exit instances and wanted to thank you for
> > > contributing exit bandwidth to the tor network!
> >
> > At the moment this is a (small) Host with 10 GBE and multiple
> >
Hi Tim,
>> I saw you recently added 8 new
>> tor exit instances and wanted to thank you for
>> contributing exit bandwidth to the tor network!
> At the moment this is a (small) Host with 10 GBE and multiple
> addresses. I hope the computing power is enough to handle a bunch of
> Tor traffic. We n
Hi Nusenu
Am Samstag, den 24.03.2018, 10:18 + schrieb nusenu:
> I saw you recently added 8 new
> tor exit instances and wanted to thank you for
> contributing exit bandwidth to the tor network!
At the moment this is a (small) Host with 10 GBE and multiple
addresses. I hope the computing power
Alrighty, I've dug a little deeper into the tails mirroring and I think at best
I could do some sort of throttled torrent seeder. The bandwidth requirements
for a full mirror or even just the HTTP download mirror… yeah that's a little
much for my resources.
However, I think in addition to seedi
On Wed, 28 Aug 2013 10:37:34 -0400
"Kevin C. Krinke" allegedly wrote:
> What services (other than Tor) can I host?
> What else is needed in the general community?
>
Kevin
Congratulations and welcome.
You could consider a tails mirror
https://tails.boum.org/contribute/index.en.html
But I'd r
Kevin C. Krinke:
> I've also been struggling to find a way to confirm that the node is working
> properly.
> […]
> Is there a way, aside from the weather service, to know immediately that the
> service is correctly functioning?
You can use Atlas [1] and search for your relay fingerprint.
I als
Hi Lunar,
I just tried subscribing to the Weather Service and it seems I haven't been
running my node long enough?
I've also been struggling to find a way to confirm that the node is working
properly.
Using the arm utility, I can see traffic and connections (9 outbound an 5
circuits) but I ca
Hi Kevin,
Welcome and thanks for running a Tor relay! :)
Feel free to subscribe to the Tor Weather service [1] if you have not
done it already. It will warn you if it detect anything problematic with
your relay.
Kevin C. Krinke:
> I want to help more. What services (other than Tor) can I host? W
Hi Kevin,
This is great. Thank you for running an exit relay, and welcome!
I don't have other suggestions right now.
--
Moritz Bartl
https://www.torservers.net/
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/c
Do you mean how many can you use I in parallel for different circuits? Or
how many you can put one after the other?
I'm pretty sure that without changing the source code you can only use one
bridge at the start of each circuit. Now if you mean in parallel I don't
know how Tor behaves if you give i
On 1/9/2013 2:57 PM, Coyo wrote:
On 1/9/2013 4:41 AM, Konstantinos Asimakis wrote:
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them
to 4 nodes.
When I say "entry guards" i mean entry guards from the perspe
On 1/9/2013 4:41 AM, Konstantinos Asimakis wrote:
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them
to 4 nodes. With that in mind you might be able to do this:
your client -> bridge (obfuscated or not) ->
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them to 4
nodes. With that in mind you might be able to do this:
your client -> bridge (obfuscated or not) -> tor node B -> tor node C ->
whatever (clearnet / intro
On 1/8/2013 7:21 PM, Coyo wrote:
If you have a hidden service, and hide that on Server A, then have it
connect via obfsproxy to Relay B, can you configure a manually-chosen
list of entry guard relays to enter the wider Tor Network from Relay B?
[Hidden Server] -- obfsproxy --> [Bridge Relay] -
22 matches
Mail list logo