I'm interested in how tor has been affected and will be affected in the
coming weeks. Are there less users now that many onion sites
disappeared? More? Is there a decrease in bittorrent which I doubt. How
about the bandwidth is it 1/5 of what it was last week? etc
I'm curious if users or hidden se
What are some myths and real things to watch for when using tor?
One example may be connecting and immediately posting somewhere. Someone
can track you connecting to the network with the post. Is this real or a
myth? From my understanding only guard nodes would know if your
connected to the networ
After trying to think of privacy flaws in hidden service (which i still
don't like) I began to wonder
What happens if you have MULTIPLE servers with the same hidden service?
As in you have a small VPS which is getting busy and you'd like to share
the load with another VPS. Assuming they know about
>> Personally I don't really like them. I think using hidden service as an
>> IP address for peer to peer (like torchat) is a risk factor although I
>> don't know enough to know for sure.
>You think. Not saying it's perfect and security should not be increased,
>but no one was ever exposed due to
ue, 16 Oct 2012 22:59:40 +, Daniel Dennis wrote:
> ...
> > But I also think all the content in a hidden service are not
> > beneficial to anyone.
>
> So what? It is sufficient when my hidden services are beneficial
> to me - I can operate a computer behind a NAT or fire
Personally I don't really like them. I think using hidden service as an
IP address for peer to peer (like torchat) is a risk factor although I
don't know enough to know for sure. (Maybe the already in place guards
fix that?). But I also think all the content in a hidden service are not
beneficial t
I found this and decided to try it in my VM
http://security.stackexchange.com/questions/17059/how-do-you-properly-setup-tor-on-windows-7
What the incorrect (yet marked accepted) answer doesn't say is how to
block all outgoing ports. When you open "windows firewall with advance
security" there is a
I just posted in tor-dev "My RSA-PM client-server"
(https://lists.torproject.org/pipermail/tor-dev/2012-August/003946.html)
and last month with the subject "Encrypted PM site/hidden service"
(https://lists.torproject.org/pipermail/tor-dev/2012-July/003761.html)
I finished some client/server code s
While prototyping an app i was looking at ip addresses and connections.
I notice all my connections uses the same circuit and have the same IP
Address. Then it hit me, it just may be because i am using one proxy
(silly thought, proxies shouldnt affect circuits) so i tried making two
proxies. Well a
I read about a successful attack on hidden services. The two major
attacks i remember were 1) Looking at IP addresses in the network and
check if the hidden service is up. When its down you can narrow the ip
address down. 2) Disconnecting and reconnecting to the hidden service
hoping you become a p
10 matches
Mail list logo