Please excuse any poor wording, networking is not my strong suit;)
i understand my ??'s are basic but it wont take me long & I'll be
sharing any knowledge I gain here.
1) have 4 extra unused devices, 2 android & 2 older laptops running
Xubuntu & Lubuntu that can run full time & my 2 primary
mac
Hi!
The torservers.net Indiegogo campaign has ended today, and yields
3771.84 Euro to be spread equally across our current seven
organizations. Each organization can hand in receipts and get
reimbursed, or, alternatively, we can transfer their share up front.
I will mail out stickers and posters
Hello,
Can you remove my email adress from your contact list?
Thanks in advance.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Uhh, what?
This is a mailing list. You signed up to it, and you will need to remove
yourself by signing into here:
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.
On Tue, Aug 27, 2013 at 1:11 PM, That Guy wrote:
>
> 1) have 4 extra unused devices, 2 android & 2 older laptops running
> Xubuntu & Lubuntu that can run full time & my 2 primary
> machines(android tab and Debian laptop). With only so much bandwidth,
> what helps best in that situation?
> a. few
Just wanted to follow up - I emailed yelp, never heard back from them, but
now we can access it. We can also access TDBank North (I can't remember if
I emailed them or not).
On Mon, Aug 26, 2013 at 11:37 AM, Konstantinos Asimakis
wrote:
> Chuck do you run Tor on a separate machine to do that? O
If you can execute shell commands directly from the
ram folder (ssh, sftp) and therefore pull files
straight into it with sftp, this seems exactly right.
It sounds like you'll only need the secure connection
on an occasional/rare basis. Imo don't try for an
always-on connection for that such as
On Aug 22, 2013, at 11:56 AM, mick wrote:
>> The other thing that I am weighing is just a moral question regarding
>> misuse of the Tor network for despicable things like child porn. I
>> understand that of all the traffic it is a small percentage and that
>> ISPs essentially face the same dil
On Tue, 27 Aug 2013 11:08:34 +, Jon Gardner wrote:
...
> Then why have exit policies?
To keep spammers at bay (or getting your exit blacklisted);
to keep traffic at bay (bittorrent), to keep law harrassment
at bay (again bittorrent, others as well).
> Exit nodes regularly block "unwelcome" tr
On 08/28/2013 12:08 AM, Jon Gardner wrote:
> Then why have exit policies? Exit nodes regularly block "unwelcome" traffic
> like bittorrent, and there's only a slight functional difference between that
> and using a filter in front of the node to block things like porn (which,
> come to think of
by virusessince starting relay. I run several anti
viral and malware routines daily and ever since deciding to start
relaying, they are all being stretched to their capacity. Let me know
when the sys is cleaned up. Maybe include an anti viral with the relay
setup and upda
>they are all being stretched to their capacity.
1: Anti virus and malware detection don't have a 'capacity' - no idea what
you're talking about.
Make it so no one can connect to Tor unless they are certified clean.
>
2: Whether your an exit relay or not, viruses would not come from Tor. Your
r
A mechanism which empowers detecting and
stopping what you and I consider to be
'evil' could be harnessed and used to
target non-evil things, and that's
where the problem is.
Let's pretend that tomorrow, Tor gained
the ability to filter out evil images.
Shortly thereafter, governments might
start
On Tue, 27 Aug 2013 11:08:34 -0500
Jon Gardner allegedly wrote:
> On Aug 22, 2013, at 11:56 AM, mick wrote:
>
> > Tor is neutral. You and I may agree that certain usage is unwelcome,
> > even abhorrent, but we cannot dictate how others may use an
> > anonymising service we agree to provide. If
On Tue, Aug 27, 2013 at 12:52:14PM -0400, Allan Moon wrote:
> by virusessince starting relay.
What signs do you have that this is happening? Are you running AV on
your relay node, or something? What messages are you getting?
Good luck cleaning up your system. You mightw wan
On 13-08-27 12:52 PM, Allan Moon wrote:
> by virusessince starting relay. I run several anti
> viral and malware routines daily and ever since deciding to start
> relaying, they are all being stretched to their capacity. Let me know
> when the sys is cleaned up. Maybe include
>> The Tor devs go to great lengths to try to keep "evil" governments from
>> using Tor against itself. Why not devote some effort toward keeping "evil"
>> traffic off of Tor?
I agree. Why not block the most obvious abuse? All professional Apache
webservers install a module named 'mod_secure'
On 13-08-27 05:12 PM, Tor Exit wrote:
>>> The Tor devs go to great lengths to try to keep "evil" governments from
>>> using Tor against itself. Why not devote some effort toward keeping "evil"
>>> traffic off of Tor?
>
> I agree. Why not block the most obvious abuse? All professional Apache
>
On Tue, Aug 27, 2013 at 11:08:34AM -0500, Jon Gardner wrote:
> Then why have exit policies? Exit nodes regularly block "unwelcome"
> traffic like bittorrent, and there's only a slight functional
> difference between that and using a filter in front of the node to
> block things like porn
The exit
On Tue, 27 Aug 2013 23:12:01 +, Tor Exit wrote:
>GET /index.php?file=../../../../../../../etc/passwd
>
> Why not employ similar techniques on a Tor exit? We can be 100% sure about
> the malicious intent.
No, you can't be sure. That request could quite well be totally legitimate;
you are
20 matches
Mail list logo