Just a reminder to keep it on-topic and friendly. Personal attacks are not
allowed.
If you want to fight, take it off-list.
thanks,
Griffin
--
“Cypherpunks write code, not flamewars” ~Jurre Van Bergen
PGP: 0x03CF4A0AB3C79A63 // sa...@jabber.ccc.de
On Apr 29, 2019, 2:43 PM -0400, Lara , wrote:
Try it and report back =)
On March 27, 2018 12:41:13 AM EDT, Mirimir wrote:
>On 03/26/2018 12:05 PM, grarpamp wrote:
>> On Mon, Mar 26, 2018 at 6:22 PM, Yuri wrote:
>>> I remember seeing this project. It creates a virtual IPv6 network by
>such
>>> onion->IPV6 mapping.
>>
>> There are two of the
Flipchan wrote:
So something that listens on port 9001 and logs all incoming request
just to see if there is anything scanning for Tor ports and trying to
hack them, has this been done? Would be cool to look at the data from
that if anyone got a link. I cant be able to find something like this
o
tort...@arcor.de wrote:
It depends on what you want to read. If you want some scary rants
about Tor and 0 days you might want to read:
http://arstechnica.com/security/2016/09/bug-that-hit-firefox-and-tor-browsers-was-hard-to-spot-now-we-know-why/
"Bug that hit Firefox and Tor browsers was hard t
pa011 wrote:
I know of someone who believes there is a censorship on this list.
So could the moderator of the list please answer whether this is the
case?
If so, what are the rules for it apart from a bad stomach feeling?
If there are - where are they published please?
So I've been doing m
myz...@openmailbox.org wrote:
Their post seems to be somewhat political and based on recent events.
The user's concern on the lack of technical posts makes a lot of
sense. I feel like Tor has become increasingly user-friendly and the
Tor Browser Bundle is by far less 'intimidating' to perform fir
Marina Brown wrote:
How does one remove one stealth onion from a tor host. Do you remove
the
username from the torrc or do you edit the hosts or the keys file ?
I'm thinking of what to do should one user need to be removed from a
group. I don't want to have to contact all the rest of the users
That is really awesome! :-) Thanks for the update.
On Thu, Jul 14, 2016 at 5:42 PM, Kate Krauss < k...@torproject.org
[k...@torproject.org] > wrote:
I don't say much on Tor-Talk, but I will say this:
Thanks, Medium, for removing all those CloudFlare captchas for Tor
users. As an activist from
jta...@vfemail.net wrote:
from the leaked tor-interal log.
This is the dumbest thing I've ever read, and I've read a lot of dumb
shit on the internet.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/ma
Zenaan Harkness wrote:
And we are now clear on your choice to exercise your predatorial right
to arbitrary exercise of power. Fascism in action.
Get off the cross, we need the wood.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://
I've been fairly surprised that the response has been almost entirely
positive. The 45-post thread on cypherpunks where Zenaan Harkness
called me a "fake man" (classy) notwithstanding.
And is Zenaan banned? No. Is grarpamp or most of the other people
who posted in support of Jacob App
Hey all,
Just a reminder to keep discussions on-topic, and to be conscientious
when posting. Due to the extreme amount of off-topic posting (centered
around a handful of users), there's much discussion about whether to
replace tor-talk with a moderated list.
best,
Griffin
--
tor-talk mai
Blake Hadley wrote:
Is there a way to mute or unsubscribe from a particular thread without
unsubscribing from the entire mailing list?
Sorry, I'm not very experienced with GNU Mailman.
There's a straightforward way to filter in gmail:
https://support.google.com/mail/answer/6579?hl=en
With t
Chris Dagdigian wrote:
It's sorta disgusting to see the creep defenders come out in force on
this list - especially the ones who talk big about anti-establishment
stuff and post anonymously from privacy friendly ISPs who suddenly and
magically have decided to start proclaiming their love for the
blo...@openmailbox.org wrote:
Can anyone suggest a reputable webmail provider that is not totally
anti-Tor.
I've had a good experience with Autistici/Inventati -- which is a
small Italian co-op similar to RiseUp. MayFirst/PeopleLink and Electric
Embers are also great co-ops that are fine w
No worries! A colleague was lamenting a schedule conflict for it, so
thought I'd ask. :-)
Are you ever in Boston?
-- Sent from my phone. Expect cat gifs. On Thu, May 19, 2016 at 3:03 PM,
Aaron Johnson < aaron.m.john...@nrl.navy.mil [aaron.m.john...@nrl.navy.mil]
wrote:
Hi Griffin,Just curi
Hey Aaron,
Just curious if HotPETS allows talks to be given via distance.
Thanks!
Griffin
--
There are 10 kinds of people in the world: those who understand binary,
those who don't, and people who didn't expect a base 3 joke.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubsc
Roger Dingledine wrote:
Anybody who wants to help fix the FAQ, that would be grand. I started
going through it earlier but there are so many entries, and so many of
them have become subtly (or obviously) wrong in the past years, and
also
many of them are not FA anymore.
Certificate informat
Found an interesting talk from Adam Wick about implementing Tor (and
perhaps onion routing more broadly) in Haskell unikernels. Unikernels are
basically single-purpose virtual machines, in this case using HaLVM.
"Adam Wick takes a deep dive into a unikernel implementation of the Tor
anonymity
Just remember that with this approach you have location privacy and
circumvention, but lose anonymity and make it much easier to both tie your
traffic to your identity *and* have a bit higher risk of data retention on the
VPS side.
~Griffin
-- Sent from my phone. Please excuse typos and
e̳͖̲̮n
Sort of - though that was an increase in daily users from ~2m to ~5m, rather
than an increase in onionsites.
-- Sent from my phone. Please excuse typos and
e̳͖̲̮n̞̟̭̬̯c̞̘̹̜̰̯͍o̬͍̫d̢i͉͈̗͖̳̫ng̢͉̹̤ ̥̻̥ͅer̝͎̰̞̩͉̟r̠̼̩̬̱̹͔o̟̳r̫̜͎̥̹̀s̖̦.
On Thu, Feb 18, 2016 at 1:50 PM, Collin Anderson < col...@averysm
People also set up lots of onionsites for testing and other reasons. At one
point, Andrew Lewman (Tor's past ED) scripted something to create 5000 onion
addresses to see how long it would take to generate. While working on Stormy, I
generated a few hundred onionsites just during the testing process
rizzo wrote:
Also, when I once tried the email bot, the only option was to be sent
a download link to Dropbox, which isn't of much use when Dropbox is
also blocked in the country. Has there been any discussion on using
Amazon or Azure servers instead, following the same rationale like the
meek br
Markus Hitter wrote:
schrieb Christian Stöveken:
> - Why do you see a need for dedicated hardware? An off the shelf router
> running OpenWRT works just fine. Install the tor package, edit torrc and
> it works.
Because that just works for it savvy people. How many are there around
you?
If one
Spencer wrote:
Patrick Schleizer:
What are your experiences with OFTC and Tor blocking recently?
The exchange is from early October after a few months of the same -
but only through browsers; clients seem to work fine.
OFTC has been consistently blocking exits and limiting the number of
us
Virgil Griffith wrote:
For unrelated reasons I'm meeting with Cloudflare. Can someone
enlighten
me on the current state of the captcha situation? Presuming they are
unwilling to completely drop the captcha, what would be a step in the
right
direction?
The last I heard from Cloudflare is:
ht
For video chatting, I like using Talky.io . Using Skype with Tor
doesn't work very well. But Tor does work in Uzbekistan and Russia.
During some blocking events, you may need to use a bridge or obfs3
bridge to connect to the Tor network.
best,
Griffin
On 2015-09-14 01:31, Vladimir Teplo
Kevin wrote:
Hello. I found an onion link in the comment section of my site. Now,
I removed the comment and marked it as spam but I am wondering if it
can be traced or reported. Should I take further action?
The content of .onion links can't be traced. If the content was
objectionable, th
I've had issues for a long while now, which is why I'm just typically
not on OFTC at all (because all connections fail as they're routed
through Tor). Unfortunately, the trade-off of maintaining location
security but not being available on IRC is one I have to make. Worth
noting that OFTC d
Most of the configuration (at least in my case) has to do with
deciding on the right speed for the relay and setting a bandwidth cap.
And when using a VPS, I set "AccountingMax" and "AccountingStart" to
stay within my expected billing range. So I would say that would
present the biggest iss
Fabio Pietrosanti (naif) - lists wrote:
Given that there could be sketchy reasons to distribute Tor Browser
unofficially and that Tor it's a copyright of Tor Project, shouldn't
the
Tor Project ask to SourceForge to act to:
a) Or Remove those project
b) Or ask to change name and remove any occ
Max Bond wrote:
Organized criminals will probably achieve better operational security
by
conducting themselves in the real world as much as possible. This is
not an
option available to a lone dissident in an oppressed country.
Indeed. There's a great quote from Eliot Spitzer, who used to be
Yuri wrote:
m.wege...@466buer.de wrote:
as this is under "oldpackages" (sept. 2014) I don know wether this
package might get updated or not.
Right now, I'm creating the Openwrt - cross compile enviroment, takes
longer than excpeted; though I keep beeing patient :)
You also need to make su
Travis Bean wrote:
The developer(s) behind TorBrowserBundle are not the authority on
computer security. They may think installing vanilla Firefox with
Privoxy and Tor is not sufficient, but this is not a valid point. Linux
computer users find TorBrowserBundle to be unwieldy and completely
insuffi
Jacob Appelbaum wrote:
On 2/24/15, kev...@ruggedinbox.com wrote:
This issue has been ongoing for months now.
I think I read Ioerror write he isn't interested in fixing the bug for
Windows, but Sukhbir is willing (yet unable to even reproduce the
bug).
This bug is NOT only for Windows, it's f
Patrick Schleizer wrote:
Forgot to say, they need to be for public use.
Aside from those, the duckduckgo hidden service has been
really useful and has good uptime as well.
Good one.
Forgot to mention keybase.io, which runs an onionsite at:
http://fncuwbiisyh6ak3i.onion
~Griffin
--
tor-ta
Patrick Schleizer wrote:
What web servers do you consider trustworthy, to take great care of
their visitors' privacy, that are stable and that get great amounts of
traffic, and most important, are reachable over .onion as a Tor Hidden
Service?
Please post them here.
The services that I trust
Paul Syverson wrote:
On Thu, Jan 29, 2015 at 11:24:18AM -0800, spencer...@openmailbox.org
wrote:
Krishna,
krishna e bera keb at cyblings.on.ca:
>Tor (not an uppercased acronym)
>
Why?
See p. 129 of http://www.acsac.org/2011/program/keynotes/syverson.pdf
also
https://www.torproject.org/docs/
"I" wrote:
http://slur.io/
Something to mull
It seems like an amalgamation of the worst ideas to promote
whistleblowing. There are just layers of assumptions about
whistleblowers that cast them in a bad light for no real reason.
There's a huge difference between "I have critical infor
Virgil Griffith wrote:
Anyone on list know of anyone?
-V
Quite a few. Definitely talk to Viet Tan, GreatFire, and the Vietnam
Open Internet Project. Not Singapore exactly, but there's a fairly
tight-knit community in southeast Asia.
~Griffin
--
tor-talk mailing list - tor-talk@lists.to
Greg Norcie wrote:
Also, from a less philosophical POV, adding any add-ons increases
attack surface.
Yeah. Aside from all of the other legitimate reasons why to not
bundle an ad blocker with TBB, this is also a large amount of code (and
filtering rules) that are maintained by an outside en
Sieme wrote:
I think so too. But what's the default policy now? 3 hops?
It's three hops. 100ms is pretty short, but not ridiculously so.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/t
Seth David Schoen wrote:
> Virgil wrote:
>> "Turn your website into an onionsite"
>> "Access the onionsite in the same way you access a website"
>
>It could be technically consistent to say both "hidden services" and
>"onion sites" -- you could say that onion sites are web sites that are
>served
On 2014-10-26 08:21, Johnny Cash wrote:
I'm setting up a blog and I need a secure hosting service.
I use DigitalOcean for most of my projects and like it a lot. I also
run Tor bridges from there, so they probably allow you to set up your
account via Tor.
best of luck,
Griffin
PS: FWIW,
Jacob Appelbaum wrote:
Call for help:
We're looking for assistance with Translations - if you'd like to
translate TorBirdy, we'd gladly accept a patch that prepares TorBirdy
for translation work. We now have an amazing number of translations!
Even if you can't help translate, we'd love to know w
On 2014-10-19 22:43, Rick wrote:
The "DoJ... 3%" reference was in the 20C3 talk (2013) by RD & JA at
about 11 minutes in. I've got the video and don't recall where I got
it but it wasn't YouTube. The talk at that point was about the
perception of Tor and a slide was put up with four bullet points
On 2014-10-19 19:04, Runa A. Sandvik wrote:
On Sun, Oct 19, 2014 at 11:02 PM, Virgil Griffith wrote:
researchers setup an exit node and then recorded what sites people
were going to?
I believe you are referring to
http://homes.cs.washington.edu/~yoshi/papers/Tor/PETS2008_37.pdf
He might a
Casey Rodarmor wrote:
I just thought of an additional perk: The custom distro could
blacklist known-bad hardware.
I think this is a really bad idea overall, but I'd be curious to see
what this would look like in practice. Do you detect the (unpatched for
past five years) Cisco routers on t
Casey Rodarmor wrote:
There are lots of issues with hardware projects and it costs an
obscene amount of money -- not to mention the implications on
security and anonymity that it would introduce.
Do you think there's any way it could be done without creating said
problems for security and anony
Casey Rodarmor wrote:
I totally want one now. I am all for worldwide splendidness.
I think a super worthy project might be to design and sell a minimum
spec/size/power/price box pre-loaded with tor relay software.
When I was working on Commotion [1], we had a few of these to run
local applic
Took me a second to find the tiny server I was thinking of:
http://www.newegg.com/Product/Product.aspx?Item=N82E16856119098
That plus a 2.5" HDD, plus an 8GB ram stick, will come in under $200 for
a pretty awesome relay (includes integrated 2.5ghz cpu).
Griffin Boyce wrote:
But to a
I wrote:
Isis,
Why, then, has there been discussion of the use of Raspberry Pis
without mention of this?
People have taken it upon themselves to run relays on raspis, but
that's not exactly Tor's fault.
It seems really obvious not to run a relay off of an extremely
low-power computer.
Hey Patrick,
Most newspapers have a taste for the salacious, and the DailyDot is not exempt
from that criticism. People buy drugs online (which is incredibly stupid for
several reasons), but that is in no way the largest use case for hidden
services. Not even close. It sells papers (and their d
Sebastian G. wrote:
How does that hide the existence of the hidden-service?
It shouldn't actually resolve if you don't have the authorization
details in your torrc file.
~Griffin
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https:
Nima Fatemi wrote:
Seems like the one mentioned in #11515 is gone, either those letters
have been actually effective or the maintainer decided to remove the
project (which imo is unlikely to be the case).
I say it's worth a shot to submit another complaint for these two
forks.
I've complain
No. As I clarified previously, I recommend against running a hidden service for
others to use as you are likely to be legally reasonable for their content.
On September 17, 2014 6:45:47 AM EST, "Артур Истомин"
wrote:
>On Wed, Sep 10, 2014 at 12:26:03AM -0400, Griffin Boyce w
As some of the list knows, my introduction to Tor was while working on a peer
counseling project that primarily served women. Even now, the *vast* majority
of people that I teach about online privacy and security are women in very
high-risk situations -- frequently involving stalking, domestic v
John Pinkman wrote:
What about facebook, or gmail, or yahoo selling your
information to advertisers?
These women also send them to multiple random parties,
this also makes them not private.
What is private anyway?
Stupidity just isn't compatible with privacy much.
So because other people d
John Pinkman wrote:
As for PinkMeth, disgusting people do disgusting things all the
time
without using Tor. If I could burn that hidden service to the ground,
I
would, but that doesn't solve the underlying problem in our society.
PinkMeth case only points out the underlying problem in soc
Rick wrote:
Roger Dingledine wrote:
This article confuses me.
For example, it has this statement:
"Because Tor Browser provides online anonymity to its users, only the
ISP used along with it can ascertain what activity takes place on
Tor."
which sure makes it sound like the author thinks that
krishna e bera wrote:
>Would it be better to have a separate firewall appliance to ensure the
>hidden service box cannot be as easily DDoS'd or exploited?
No, this can be done very effectively with software firewalls. Though some
people are doing more with authenticated hidden services. Some p
Kyle Maxwell wrote:
Griffin Boyce wrote:
Actually, no, I *am* surprised that they decided to not even
bother trying to gift malware to Mac or Linux users.
Probably just playing the odds, I'd suspect. Though they could've
examined the access logs at some point - do we know either w
Roger Dingledine wrote:
Two lessons I've learned from recent CCC talks:
A) Social commentary works much better than technical things. That is,
the audience respects us for our technical work, and now they want to
hear
our perspective on what's going on in the world. So while my instinct
is to
The State of the Onion Address ?
It seems like there is never time for Q&A anyway ;-)
Damian Johnson wrote:
I suppose another updated 'tor ecosystem' presentation could be an
option (*). Question I've learned to ask for presentations is: what is
your goal? What are you hoping to get out o
Mirimir wrote:
Also interesting is the fact that Magneto is a _Windows_ executable ;)
Unsurprising Facts: Volume 1 ;-)
Actually, no, I *am* surprised that they decided to not even bother
trying to gift malware to Mac or Linux users.
--
tor-talk mailing list - tor-talk@lists.torproject.o
Mirimir wrote:
It's the same malware.
Operation Torpedo _preceded_ the Freedom Hosting takedown.
| From the perspective of experts in computer security and privacy,
| the NIT is malware, pure and simple. That was demonstrated last
| August, when, perhaps buoyed by the success of Operation Torp
Tim Retout wrote:
I'm still watching it, but it seems relatively balanced, and features
interviews with Bruce Schneier, Jacob Applebaum, Julian Assange, Tim
Berners-Lee and so on.
(And Horizon had average viewing figures of around 1.7 million people
in 2013, according to the internet, so that me
krishna e bera wrote:
>There are several pseudonymous development sponsors (named only by
>single letters). Any of them could be GCHQ or NSA or one of their
>front
>agencies.
>It doesnt matter - all of the code remains open source and the
>developers have their own public reputation to maintain
Martin S wrote:
We run an ownCloud server so I have experience with that. Unless
anyone knows anything to deter me I'd use that, but still, again, good
to know it's being done!
They're really similar -- cozy is easy to install via the command
line* but is more geared towards individuals than
Martin S wrote:
Today I've had a conversation with colleague regarding email
encryption, encrypted telephony and hidden services on the Tor
network. In regards to the latter, what - in your opinion - would be
suitable services to put on Tor (.onion) sites? Would you for example
put PGP keys excha
Mirimir wrote:
On 08/25/2014 12:31 AM, Lunar wrote:
I don't find this particular BBC article relevant to Tor Weekly News.
It's just one more drop on the “BBC hates Tor” series.
It would be nice to have a section in TWN for notable public statements
by Tor Project folk. Andrew Lewman's comment
Hey all,
For those who missed it, the first Aphex Twin album since 2001 was
announced on a Tor hidden service: http://syro2eznzea2xbpi.onion
More info:
http://pitchfork.com/news/56341-aphex-twin-announces-new-album-syro-via-the-deep-web/
~Griffin
--
"I am very much in love with no one
Hey Virgil,
The answer depends on what you'd like to do with consensus files.
There was (is?) a GSoC project by Daniel Marti in furtherance of
proposal 140 [2][1], but that's probably not what you're looking for.
There's also a script by Moritz Bartl that analyzes consensus files
and tu
Roger Dingledine wrote:
On the other hand, there are some real downsides to having large relays
where we don't know the operators. We know the operators of many of
the large relays in the network, but there are many more where we don't
know them.
And of course, confirming that some email address
Hey Virgil,
I'd say that the issue with Tor's speed is one of inconsistency,
rather than outright slowness.
Give you an example: I was watching a friend set up a new laptop, and
she elected to fetch drivers direct from the manufacturer's website. So
someone downloads a few dozen files
Matthew Finkel wrote:
> This actually has very little to do with trust, and (as Roger said)
> these providers were chosen because of the difficulty of creating new
> accounts.
Preventing bridge enumeration is a hard problem to solve, but I don't
think that limiting gettor to gmail/yahoo actually
ttzeqq wrote:
> I am in US.What can I do?
The easiest way to bypass such a restriction is to select Configure
when launching TorBrowser, select No when asked if you need to use a
proxy, then select Yes when asked if the firewall only allows access to
certain ports. Here are some screensho
Fosforo wrote:
> I am a big fan of pinkmeth hidden service
Then I question your ethics. Nonconsensual porn is an extreme
violation of someone's trust -- not to mention gross and illegal. It's
also a slap in the face to people who run hidden services because their
free speech rights are being vio
On 2014-07-11 17:18, Артур Истомин wrote:
On Fri, Jul 11, 2014 at 08:33:52PM +, simonsn...@openmailbox.org
wrote:
I don't understand how to set-up an .onion domain...
Can anyone please provide me with the address of a reputable .onion
hosting
company?
It is very young business, so don't
Mark McCarron wrote:
> Tor was designed to fit into that global view and provide US intelligence
> with the locations of both users and hidden services, whilst pretending to
> provide anonymity.
[citation needed]
> I don't see anyone denying it. Do you? Its been 6 days already.
There's also
Hi jOe,
Perhaps because it's not an acronym. ;-) And keep in mind that calling
something "the" onion router would be rather incorrect as there are now
multiple onion routing projects.
~Griffin
Joe Btfsplk wrote:
>The "why called tOR" article says,
>"/Note: even though it originally *came from
Interesting find from n8fr8:
On June 17, 2014 9:02:19 AM EDT, Nathan of Guardian
wrote:
>Glad someone finally did this!
>
>http://bluishcoder.co.nz/2014/06/12/using-tor-with-firefox-os.html
>Guardian-dev mailing list
--
Sent from my tracking device. Please excuse brevity and cat photos.
--
to
Sebastian G. wrote:
> Andrew wrote:
>> - Looked into legality of receiving a large financial donation from a
>> country on the US Treasury embargoed list. Unsurprisingly, we cannot
>> accept such a donation due to the source.
> Money is speech, isn't it? It's just a promise.* If that is true, the
Andrew Lewman wrote:
> IPs are for routing, not reputation. Ugh.
It's doubly stupid because the "most dangerous" address would be one
that *isn't* on a public blacklist. And it's not even remotely
difficult to setup throwaway proxies to spam or send abuse.
I just really don't get the whole b
Andrew Lewman wrote:
There was an unpublished study in Nevada by some grad students who
setup
a few malware defense appliances on the end of a tor exit relay. They
found 3% of the traffic passing through their exit relay was tagged as
malware, by however the appliance was configured to determine
Juan wrote:
I once was told that the swedish governemnt and the americunt military
were great supporter of 'free speech'...or something like that?
As an Americunt, I take exception to that! From where I stand, the
issue seems much more to do with SIF's policies not matching their
founding
Hi all,
Is there a good reference for the assertion by DOJ that 3% of Tor's
traffic is "bad"/used for piracy/etc? This has been referenced in a few
talks, but was just wondering if this is written anywhere that can be
easily referenced.
thanks,
Griffin
--
tor-talk mailing list - tor-talk@
Patrick Schleizer wrote:
Too large as in download time or your traffic bills?
Sure, I can imagine you don't want to pay the amazon aws traffic bill.
Download time.
Satori could download from http://mirror.whonix.de. It's not SSL. But
also not censored yet to my knowledge. For now, I would be
Patrick Schleizer wrote:
Too large as in download time or your traffic bills?
Sure, I can imagine you don't want to pay the amazon aws traffic bill.
Download time.
Satori could download from http://mirror.whonix.de. It's not SSL. But
also not censored yet to my knowledge. For now, I would be
Patrick Schleizer wrote:
terrific project! Especially the integrated hash verification is a big
security gain!
Is a port to firefox planned?
Do you take project suggestions?
I'd be interested to see Whonix added.
Thanks! ^_^ A firefox port is not planned for various reasons, but I'm
looki
Sorry for the delay in responding. Life gets in the way sometimes.
;-)
Runa A. Sandvik wrote:
Sounds interesting! Could you say a bit more about how it distributes
software?
So it offers downloads from places that are not currently blocked or
MITM'd: Google's Chrome Web Store, Amazon, a
Hey all,
So Satori is this app for Google Chrome that distributes circumvention
software in a difficult-to-block way and makes it easy for users to
check if it's been tampered with in-transit. I've been kind of
obsessive about it, and now that it's been released, I'd love to see
what the T
السلام wrote:
Are there field-tested guides for configuring a service in the most
anonymous way possible in order to publish files?
What format is the data in? Photos, video, or just text? Can you run
a shell script?
I say this from personal experience -- you are more likely to be
de-
Fascinating project =) I look forward to watching it progress.
best,
Griffin
John Brooks wrote:
> I’d like to present a project that I hope will interest some of
> you:
>
> Torsion is a ready-to-use hidden service instant messaging client
> with bigger goals and better implementation than the p
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Patrick Schleizer wrote:
> Seems like the honest way "no funding yet, may or may not work out,
> send your application and quote so we can sort funding out" is less
> effective than the usual "let's just collect applications and then
> see how it works
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Patrick Schleizer wrote:
> The Whonix project has currently two job offers:
>
> - https://www.whonix.org/blog/project-coordinator/ -
> https://www.whonix.org/blog/job-offer-developer/
>
> We don't have founding for these yet, but hopefully soon.
O
Adrian Crenshaw wrote:
> I'm working on a talk that will be on real life examples of people
> being caught while using Tor, and how it can be avoided.
Just for the record, people who get de-anonymized aren't usually
horrible criminals. Tor isn't a replacement for solid security
practices. Obvi
Well, it's an interesting idea, and one that has cropped up
throughout the years. This is something that makes the most sense for
websites that are at huge risk of being taken down through domain
seizures or DNS shenanigans, with a number of rulesets in the TBB. But
I *think* this problem i
On 2014-02-23 22:21, Anon wrote:
Why so many bugfixes?
455 tor.git Changelog entries with names "(Major|Minor) Bugfixes".
Do tor need better testing?
There was just a major event where there was extensive testing and
bugfixes. But as a rule, more testing reveals bugs which leads to
bugfi
Nathan Freitas wrote:
> Hello from the Tor dev meeting. I'm working on trying to help come up
> with some better narrative around the types of features, functions and
> actions a user of Tor-based software might want. The goal is to get
> beyond "anonymity" or "better privacy" as an answer to what
1 - 100 of 222 matches
Mail list logo