esn't take political parties commitment, yet
it would be valuable for it's evident complementary values and core
mission, to advocate those point of EU political programs.
Is that something that has been considered?
Fabio Pietrosanti (naif)
Below snippets of the program again
Hi all,
i'm supporting with some technical analysis a volounteer-non-profit
collaborative torrent forum/site with their future-looking upgrades of
infrastructure.
I would love them to bring all their public forum and public tracker on
Onion, while exporting their +160k releases database as o
nage techniques to be put
in places for that specific purposes.
Then the problem is "what to do when there's suspect that someone is
passively sniffing" but there's no scientifically proven evidences?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digita
Security
http://security.stackexchange.com/questions/121266/how-secure-is-browser-in-the-box
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing
evaluating the amount of asymmetric
crypto operations per source IP / time and deciding whenever to slow it
down.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor
in a opensource-code arm-race for detection and anti-detection?
c. Does nothing?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing list - tor
Hello,
i where considering to start running Tor Relay on retro' operating
systems under virtualized environment and i was particularly interested
in having a Tor Relay running on OS/2 Warp and i was particularly
interesting in having it running on OS/2 Warp [1] .
Are there any aficionado that kn
On 2/7/16 1:25 PM, nusenu wrote:
>
>
> Fabio Pietrosanti (naif) - lists:
>>>> - it is *not* a good idea to run exits from your home (limited exit
>>>> policies are no guarantee for no troubles)
>> It depends only on how finely we can be capable of pr
On 2/2/16 1:50 PM, Roger Dingledine wrote:
> On Sun, Jan 31, 2016 at 03:42:51PM +0100, Fabio Pietrosanti (naif) - lists
> wrote:
>> But 90% of my resources (given the previous hypotetical assumption)
>> would be happily pumping non-abuse-generating Tor exit traffic.
>>
On 2/7/16 10:44 AM, nusenu wrote:
>
> - it is *not* a good idea to run exits from your home (limited exit
> policies are no guarantee for no troubles)
It depends only on how finely we can be capable of precisely defining
the destinations to which you're sending your Tor exit traffic.
If i get
olicy by Autonomous System Numbers
https://trac.torproject.org/projects/tor/ticket/18267
Make Tor aware of the top-30 destinations of Tor Exit traffic
https://trac.torproject.org/projects/tor/ticket/18268
Enable TorBrowser users to become "easy to be run" Tor Exit relay
https://trac.torproject.org/proje
ng* the life of a Tor Relay operator.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change
Answers in-line.
On 1/31/16 5:00 PM, amuse wrote:
> Hi Fabio:
>
> TLDR: No, I haven't and wouldn't try this.
>
>
> If I understand, you're asking "Why don't TOR operators discriminate on
> traffic by passing packets to popular, acceptable sites and
> discriminating against traffic headed "elsew
iven the previous hypotetical assumption)
would be happily pumping non-abuse-generating Tor exit traffic.
Does anyone ever done some kind of testing or analysis about that kind
of approach?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.
le Contact Information" that
would provider a lot of benefit for Tor Network and for Tor Relay
operators themselves.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.
On 1/26/16 10:58 AM, Pickfire wrote:
> On Mon, Jan 25, 2016 at 09:09:37PM +0100, Cain Ungothep wrote:
>>> That way a normal web client, normally browsing a website, would not be
>>> impacted from end-user experience, but any automated system (the ones
>>> causing
>>> problems to Cloudflare)
>>
>>
ation.
Maybe it's a bad idea, but the key to be addressed is imho:
- reducing the automated attacks from Tor netwok by increasing it's
costs while leaving intact the end-user experience on Tor Browser
- having cloudflare to implement application protection system that does
not require
a multicast group, that will then deliver me the streaming and
in their network topology there are "edges" that does cache and
redistribute the content.
So, i was wondering if the multicast streaming concept for content
distribution with edges-caching, couldn't fit somehow in a fut
ere would be no private information disclosure.
What i don't know, is how many persons buy stuff online by using the Tor
Browser!?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
ht
On 1/2/16 10:37 PM, Moritz Bartl wrote:
>> We could trigger that if a Tor Exit operator would be able to have an
>> ExitPolicy that deny traffic going to the destination IPs of the country
>> where it's located, leading any kind of abuses to be originated because
>> of Tor Exit traffic flowing to
On 1/3/16 6:52 PM, Nurmi, Juha wrote:
> Hi,
>
> I released refactored new version of Ahmia search engine :)
>
> It's not finished yet but the main parts are working. Be patient, it's far
> from perfect. It has some performance issues etc.
>
> Deeper than ever: you can also search i2p network h
reduce the risks of being waked up at 6.00am by law
enforcement agents because of an uninformed search and seizure order.
What do you think?
p.s. I've not re-read this email, so it may contain some grammar
mistake, sorry!
--
Fabio Pietrosanti (naif)
HERMES - Center for Tr
ailable on something like Google BigQuery?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change othe
point letsencrypt too.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Hello,
does anyone ever tried that CAPLoader tool with Port Independent
Protocol Detection on Tor traffic?
www.netresec.com/?page=Blog&month=2015-10&post=Port-Independent-Protocol-Detection
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rig
, color,
disability, gender, national origin, race, religion, sexual orientation,
veteran status, or any classification protected by law.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - https://tor2web.org -
https://ahmia.fi
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torprojec
Hi all,
sorry for cross-posting but it's relevant to know that nmap is going to
start supporting high performance port scanning over proxy, including Tor.
That would likely means an increase in the issues for Tor Exit Relay
operators for abuses related to port-scans being reported.
Should Tor im
e, to which i'd like to
present such an analysis + request for action, that they are also going
to deploy https across all the mirrors for software download.
Time to fix this!
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://gl
move any occurrence of "Tor" in the name
of the projects, title, sub descriptions that may lead to misleading
interpretation that "this is tor browser"
?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://
he 2FA/App
Password approach and gives back a feedback of use for a couple of
weeks it would be lovely.
I think that having a confirmation that using 2FA + Gmail App Password
fix the issue, has to become part of any existing documentation:
https://support.google.com/mail/answer/1173270?hl=en
--
Fabi
dead, SMTP is dead, PGP is dead!" and i concretely
think that we shall improve the existing internet-standards to fulfill
new requirements, rather than create new ones.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://glo
(non spam) email trough that account when behind Tor.
Does anyone have report of success sending email (with authenticated
username, over TLS) with Gmail behind Tor?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https
quot;unsolicited,
free-text tip" .
It would be considered "ethical" to push for anonymous whistleblowing of
very structured qeustionnaires going trough independent anti-corruption
authorities or anti-corruption NGOs that would eventually, at a later
stage, decide whenever it'
rests too to be
gathered in the area of "Tor HS Statistics".
Currently "some stats" is gathered from Tor2web software at application
level, but not from the underlying Tor software:
https://github.com/globaleaks/Tor2web-3.0/wiki/OpenData
--
Fabio Pietrosanti (naif)
HERMES - C
l community values, not for private economic
gain.
Btw Happy Birthday Jesus...or like more politically-correct people like
to say "Happy Holidays!"
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - https://globaleaks.org - ht
On 12/22/14 4:59 AM, Roger Dingledine wrote:
> On Sun, Dec 21, 2014 at 11:49:00PM +0100, Fabio Pietrosanti (naif) - lists
> wrote:
>> http://uptime.statuscake.com/?TestID=OY4sh1M6R6
> Hi Naif,
>
> You list two in NL, even though there is only one v3 directory authority
>
On 12/21/14 9:17 PM, Thomas White wrote:
>
> I will do my best to keep this list updated on the situation as it
> develops.
I added the IPs you reported to such ping monitoring stuff:
http://uptime.statuscake.com/?TestID=OY4sh1M6R6
I see that all IPs are down, except 89.207.128.241 that's up.
I
On 12/19/14 11:19 PM, Roger Dingledine wrote:
> https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network
>
> --Roger
I've put a cloud hosted ping monitoring service with all TorDA IPs here:
http://uptime.statuscake.com/?TestID=OY4sh1M6R6
--
Fabio Pie
Hi,
one nice elements that Tor could provide EU private citizens, will be
VAT saving on electronic services acquired within the Union.
Have a look at how new EU VAT rules are being implemented by e-commerce
platform http://www.woothemes.com/2014/12/handling-eu-vat-woocommerce/ :
"To deal with th
articularly
targeting UAE users from Sourceforge's stats:
- TorBrowser (16.170 download with 2nd top-country UAE)
- Browser4Tor (357 download, with 46% from UAE)
That analysis is a bit old, September 2013, but may contain userful info
for people digging into that problem.
--
Fabio Pietrosa
nel Broker?
I've read:
* IPv6 Relay Howto
https://trac.torproject.org/projects/tor/wiki/doc/IPv6RelayHowto
* IPv6 Roadmap
https://trac.torproject.org/projects/tor/wiki/org/roadmaps/Tor/IPv6
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshe
pt: */*
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-
?
>From usability perspective the user just expect the browser to be the
same of the language that he speak (usually the OS's language).
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http
Greetings,
any plan to introduce support for HTTP2 in TBB given it's nice
opportunistic encryption features?
https://wiki.mozilla.org/Networking/http2
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org -
ys has to be considered safe?
Maybe Linux is immune to private key dislcosure but FreeBSD is not?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torpr
Il 3/9/14, 2:28 PM, Paul Syverson ha scritto:
> I understand that many organizations are dysfunctional and don't use
> common sense, but that isn't something to recommend. Solving such
> dysfunction is hard, highly contextual, and I'm not pretending it is
> something for which I have expertise. Bu
Il 3/8/14, 8:39 PM, Paul Syverson ha scritto:
> If you naively view Tor as Yet Another Pulbic Proxy, I agree. But this
> is the same thinking that leads you to block all encrypted traffic you
> aren't MITMing. There may be environments where it makes sense, but
> most of the time you are hurting yo
Il 2/7/14, 4:46 AM, grarpamp ha scritto:
> What can we do, as a collective social entity, to put an end to
> this madness?
>From a "Security-Wise" point of view, if i was the IT Security Manager
of a company, i would definitively block Tor's access to my IT
infrastructure.
I would also block most
ding/receiving 10 times more the amount of data is something
acceptable.
Obviously the multimedia transport channel must take into account all of
those kind of issues, must also trash channels that get congested
establishing new ones, etc, etc
The jitter buffer must also understand that'
he trusted computing
technologies hasn't been evaluated properly for the values that it could
be provide in terms of operating system and application integrity.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://global
gurable access policy like we're
doing into GlobaLeaks software.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsub
additional load over Tor network by the need to connect and disconnect
to the Tor network and does some Guard/Directory traffic.
So i'd consider to be careful in which kind of "use case" are defined
for such kind of project, especially when compared to Tor2web
--
Fabio Pietrosanti
Nice reading
IETF Technical Considerations for Internet Service Blocking and Filtering
http://www.ietf.org/id/draft-iab-filtering-considerations-05.txt
Fabio
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-b
e persona
research, planning, acquisition, and use."
It would be very interesting if someone would spent some more time
investigating it, to get a bit more a in depth picture, other than just
my early OSINT.
Former spy, experts on COMINT and SIGINT, running an online privacy
service? mmm
work fine with torsocks.
>
> best,
> Jan
>
> Am 13.12.2013 15:29, schrieb Fabio Pietrosanti (naif):
>> Greetings,
>>
>> i'm looking for a solution to enable all email sent from a linux system,
>> to be sent going trough Tor, with a sendmail compatible s
sendmail
replacement" that can be configured to operate trough socks on localhost.
Any idea?
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torp
Il 11/1/13 12:36 PM, Bry8 Star ha scritto:
>
> TAILS should release a VirtualBox VM based edition.
The use of Tails with a Virtual Machine would break the SecureDrop
threat model, so virtualization cannot be used in that context.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparen
At GlobaLeaks we are using too Tails since a couple of years for the
receivers.
However our practical experience is that Tails is a good platform for
journalists only in theory.
That's because most of the journos use an Apple Macbook and Tails is
very badly supported on that platform.
Btw GlobaLea
r has been done:
https://github.com/globaleaks/iGlobaLeaks-Tor
p.s. We're looking for a funding slot for the guy to keep on the
development of GL mobile apps GLDroid (integrating ORBot and Obscuracam)
and iGlobaLeaks
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Hum
back on it
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.o
Hi all,
does anyone have reviewed and/or commented out the Ahmia's proposal for
Description Linked Data Proposal to WWW Servers Inside Tor ?
It's at https://ahmia.fi/documentation/descriptionProposal/
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human R
256
- GCM (Authenticated Encryption)
- SHA385
Kudos to Evilalive for this strong improvement, done by improving the PyOpenSSL
package:
https://code.launchpad.net/~evilaliv3/pyopenssl/pyopenssl/+merge/184401
-- Fabio Pietrosanti (naif) HERMES - Center for Transparency and Digital
Human Rights
Il 8/30/13 6:29 PM, Matt Pagan ha scritto:
>
> The PirateBrowser also has these sites automatically bookmarked in its
> browser bar:
The venue of the Tor Porn Browser [1] has come!
-naif
[1] https://lists.torproject.org/pipermail/tor-talk/2012-October/026115.html
--
tor-talk mailing list - tor-t
ably would need another, different piece of software, to provide
easy "encryption gateways" .
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.to
be integrated into any kind
of existing mailserver, while in the Tor2web approach, this would be a
standalone SMTP listener for exclusive use.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
ind of
database.
p.s. Tor2web is looking for love, funding and research grant to develop
it with the needed effort.
p.p.s. Tor2web is now deployed across 9 servers over many tor2web.org,
tor2web.fi, onion.sh, onion.lu, onion.to, tor2web.blutmagie.de and
onion.is is coming .
--
Fabio Piet
-3.0/wiki
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject
Il 7/22/13 11:44 AM, Jerzy Ćogiewa ha scritto:
Well this is quite some surprise: http://www.bbc.co.uk/news/uk-23401076
Wasn't it Star Wars? More and more the countries will tighten grip on internet
content, more will slip through? So now Tor bandwidth will be huge for porn
market.
In invite y
P approach more
similar to GnuNET (Nat bypass, UDP, etc)
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
___
tor-talk mailing list
tor-talk@lists.torpr
.
It would be interesting to try to build a TinyXP live-iso machine, with
TorWall integrated to create a "sort of Tails based on Windows" .
https://sites.google.com/site/tinyxpfiles/
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logios
Il 7/2/13 3:48 PM, Nathan Freitas ha scritto:
They said we must cross-compile any native code into Javascript. I am
not sure if that was meant to be a joke or not.
I am wondering if a Client-Only, lightweight Tor Library in Javascript
would be feasible, maybe considering SilverTunnel porting
ht
Il 7/2/13 4:36 PM, Ed Fletcher ha scritto:
http://learn.adafruit.com/onion-pi/overview
I'd like to see the reverse setup; connect to the RPi with the cable
and then to a wifi network using Tor. Most hotels only have wifi
these days, not a wired connection.
I would like to see major nerd websi
Hi all,
does anyone made a technical analysis to understand whenever would be
possible to have Tor running on upcoming FirefoxOS ?
https://people.mozilla.com/~myk/r2d2b2g/
-naif
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.to
On 6/17/13 9:32 PM, Nick Mathewson wrote:
Also, its API hooking system is based on the ubiquitous ZDisasm.c
file written by Z0MBiE, who to the best of my knowledge never actually
put a license on it. So it might be legally problematic to
redistribute (unless I'm wrong about that, and Z0MBiE *
ary/closed
applications.
Please check TorCap2: https://github.com/cpatulea/TorCap2
Relevant discussion thread:
https://lists.torproject.org/pipermail/tor-dev/2012-January/003214.html
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://glob
ower.
In case of internet exposure, this exposure is managed trough the use of
Tor2web software.
The server is, in any case, always behind a Tor Hidden service and
partitioned/sandboxed to work behind Tor.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human R
Hi all,
are there some plan for a gathering of Tor community and related at
OHM2013 http://ohm2013.org this summer?
-naif
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 3/31/13 5:55 AM, Jesus Cea wrote:
>
> 3. Maybe, a Python proxy to create hidden services without installing
> TOR. This point could be detrimental to TOR ecosystem, nevertheless,
> since a server using TOR would be "nice" if giving back.
>
> I am interested in easing the entry barrier to access
On 2/14/13 11:06 PM, adrelanos wrote:
> Should I contact them and politely ask if they activate it for me? Do
> they enable it on a by case base?
>
> Or do they all read that list and there is no reason to ask again?
Currently there's no such a feature in the code of Tor2web:
https://github.com/glo
On 2/14/13 10:28 PM, t...@lists.grepular.com wrote:
> On 14/02/13 10:55, Fabio Pietrosanti (naif) wrote:
>
> > Tor2web software by default: - setup a robots.txt to prevent search
> > engine scraping - block a wide set of Crawler UA to further block
> > search activities -
On 2/14/13 11:37 AM, adrelanos wrote:
> Hi!
>
> How can I get my hidden service indexed by Google, startpage and so on?
>
> My page, nothing much to see yet, but I may consider moving Whonix
> homepage to a hidden service. Without being indexed, it has limited
> usefulness.
>
> http://p4vm6o4n4hbfq
On 2/12/13 3:04 PM, Alexandre Dulaunoy wrote:
> Hi All,
>
> Looking at the current ways of people getting .onion addresses
> (using dubious forums or source), I was wondering if there is someone
> working/researching on a way to rank .onion addresses to allow a user
> to see the ranking/trust of an
On 2/3/13 9:23 PM, coderman wrote:
> "push-to-talk" with procedure words over zrtp would be applicable. use
> FEC to accommodate reasonable loss over datagram Tor.
>
> both Whisper Systems and Guardian Project are working on PTT
> capabilities, iirc.
>
> last but not least, the codec makes no diffe
On 2/3/13 2:49 PM, adrelanos wrote:
> Hi!
>
> I haven't seen TOR Fone discussions on this list. Description (selection
> by adrelanos, see TOR Fone homepage [1] for original text).
While i appreciate the effort, i think that the approach of TorFone
(http://torfone.org/) is not good and cannot scal
Original Message
Subject: [Hackmeeting] TOR Protocol fan art.
Date: Mon, 21 Jan 2013 17:12:36 +0100
From: Scurippio
Reply-To: hackmeet...@inventati.org
To: hackmeet...@inventati.org
http://facce.tracciabi.li/resources/torfanart.jpg
Ringrazio Frahone (l'ar
On 12/9/12 4:47 AM, and...@torproject.is wrote:
>
> I'd be interested if gnunet or i2p have seem similar usage by
> botnets.
Just FYI, at Tor2web abuse handling email we never received a specific
Botnet related complaint.
-naif
___
tor-talk mailing list
On 12/1/12 12:49 AM, Naslund, Steve wrote:
> If he is claiming that the traffic to the forum came through the Tor
> node, that IP would lead them to the hosting company of the Tor node.
> Not his residence. If they had an IP that led to his home, that would
> have to mean that the traffic did not
Hi all,
i would like to measure how much Bandwidth a Tor Client Usage (via
Socks) use over time.
The goal is to have the same data of the Tor Relay bandwidth stats, that
can i can graph, but to collect and save Tor Client traffic (Not Tor
Relay/Tor Exit).
Is it easily possible?
I'm trying to fi
On 11/28/12 9:58 AM, esolve esolve wrote:
> I'm doing research on Tor and I want to modify the tor exit node functions.
Which goal do you have for your research requiring modification to that
part of Tor code?
Regards,
Fabio
___
tor-talk mailing list
tor
Hi all,
does anyone have a clear idea on how to optimize a Tor Client
configuration for Tor2web nodes, by tweaking Torrc?
Tor2web make *tons of new connections* to Tor Hidden services with a lot
of short lived, sometimes pushing also a lot of bandwidth.
Currently there are Tor2web nodes:
- 3 on
On 11/20/12 5:32 PM, SiNA Rabbani wrote:
> I think nmap is smart enough to adjust the number of packets and delay
> between them automatically.
Yeah but portscanning over Tor with nmap is not the best deal as it does
not have any native socks support and it expect to handle directly
socket operati
Hi Griffin,
my comments below.
On 11/20/12 3:11 PM, Griffin Boyce wrote:
> Hi Fabio,
>
> To recap the discussion for everyone else, we were talking about
> blocking portscans on exit nodes. While it's possible to block a
> targeted portscan by limiting what ports can be accessed in iptables,
>
Hi all,
while discussing on twitter with the guy of http://cryptic.be it about
"How to block outgoing portscan from a Tor Exit Node" it arise the idea
that the best way would be to correlate the amount of "outgoing tcp
connection/time" from a specific "Tor Circuit".
So, rather than "Blocking" it
On 11/10/12 1:19 PM, adrelanos wrote:
> If you want you can register as "me" representing Tor Project (i've no
> relationship with Tor Project Inc), with my personal credit card, in
> clear violation of ADP (i don't care that much).
> Not sure if that is legal, what the consequences (probable not t
On 11/10/12 12:49 PM, Peter Tonoli wrote:
>
> On 10/11/12 6:49 PM, Fabio Pietrosanti (naif) wrote
>
> > Whatever apple would try to do against Tor Project, Apple will have to
> > sue me or ask me their rights! :P
> Or they could just revoke your developer certificate, an
On 11/10/12 2:40 AM, and...@torproject.is wrote:
> On Fri, Nov 09, 2012 at 06:05:58PM -0500, mfi...@mfisch.com wrote 1.0K bytes
> in 18 lines about:
> : TorProject should be registered as an Apple software developer, and the
> binary should be signed, both to increase credibility of the torprojec
On 11/3/12 4:09 AM, grarpamp wrote:
> I hope to test some clearnet 2 hop VPN service with double
> encryption to feel that part.
I thin that also one-hop works and that in general Tor is too restricted
given it's threat model.
Generally my feeling is that Tor should "evolve" into something more
fl
On 11/2/12 11:26 PM, grarpamp wrote:
>> Read up on the "Tor2webMode" option.
>Tor2webMode 0|1
>When this option is set, Tor connects to hidden services
>non-anonymously. This option also disables client connections to
>non-hidden-service hostnames through
On 10/31/12 1:24 PM, Sven Wolf wrote:
> Hi adrelanos,
>
> I've done some tests again:
>
> about 1 MB/s over the lan interface, cpu load about 50%, copied via
> scp (filesize 700 mb)
> about 1 MB/s over the wireless usb interface, cpu load about 70%,
> copied via scp (filesize 700 mb)
Wait, maybe t
1 - 100 of 221 matches
Mail list logo