On 2011-11-10 13:13 , Anon Mus wrote:
[..]
> I do have a socks listen address specified
>
> SocksListenAddress 127.0.0.1
Unless a SOCKS capable program is listening there already, it should not
be an issue.
See 'netstat -an' in a command prompt to check if this is the case or not.
Greets,
Jero
On 2011-11-10 11:39 , Anon Mus wrote:
[..]
> Nov 10 10:17:10.093 [Warning] Warning from libevent: evsig_init:
> socketpair: Cannot assign requested address [WSAEADDRNOTAVAIL ]
This is the important part, it states that the address is not available.
Did your properly shutdown the old version?
And/
On 2011-10-24 15:29 , Eugen Leitl wrote:
> On Mon, Oct 24, 2011 at 02:40:26PM +0200, Jeroen Massar wrote:
>
>> If you would introduce something like hashcash, does the source node or
>> the intermediate node have to do this hashcash calculation?
>
> Like in BitCoin, onl
On 2011-10-24 14:10 , Eugen Leitl wrote:
> On Mon, Oct 24, 2011 at 01:46:13PM +0200, Jeroen Massar wrote:
>> On 2011-10-24 13:34 , hi...@safe-mail.net wrote:
>> [..]
>>> The problem is that they're using denial of service attacks to overload the
>>> serv
On 2011-10-24 13:34 , hi...@safe-mail.net wrote:
[..]
> The problem is that they're using denial of service attacks to overload the
> servers, and parts of the Tor network as a result. Tor doesn't seem to
> handle this very well.
The internet does not handle (D)DoS attacks either.
> This takes
On 2011-10-22 09:27 , kamyar kamyar wrote:
> Hi all,
>
> What's GeoIP file in TOR directory? what's it used for?
The file contains IPv4 address ranges to Country mappings.
It is used for determining the country that an IP address is in.
This as several configuration commands allow avoiding/reque
On 2011-10-17 12:24 , fati...@safe-mail.net wrote:
> I'm a little new to TOR. I run it in linux and start and stop it from
> a terminal window. I have changed my torrc to include the following:
>
>
> EntryNodes poohbear
>
> where 'poohbear' is the entry node I wish to use.
>
> This setup works,
On 2011-10-13 13:40 , and...@torproject.org wrote:
> On Wed, Oct 12, 2011 at 11:39:12PM -0700, williamwright...@yahoo.com
> wrote 1.1K bytes in 24 lines about: : Keyloggers would, I assume,
> defeat the whole purpose of Tor since the URL would be recorded and
> sent to the fedz.
>
> If you lose co
On 2011-10-12 14:14 , phil...@bailey.st wrote:
[..]
> Opened session for test2@x.onion/foobar
>
> I guess is not normal to have your hostname going to some tor end point,
> is this leak related to PSI or maybe some other misconfiguration.
That 'foobar' portion (or the long number
On 2011-10-11 21:04 , t...@lists.grepular.com wrote:
> On 11/10/11 19:34, Jeroen Massar wrote:
[..]
> Regarding your comments on keys being stored in RAM on crypto
> filesystems, I have a working solution for that too. My Ubuntu laptop
> uses full disk encryption, but the key is shif
On 2011-10-11 19:14 , Faisal Rehman wrote:
> *Dear All,*
>
> As I am working to establish a small tor private network and for this
> purpose I have to and done the following things:
>
> 1. Configuration of Several Directory Authorities (Completed)
> 2. Inter-op connectivity of these authorities f
On 2011-10-11 20:24 , t...@lists.grepular.com wrote:
[..]
> I've been doing this myself for a while now. I wrote/released some
> software to do it. It's described here:
>
> https://grepular.com/Automatically_Encrypting_all_Incoming_Email
>
> And here:
>
> https://grepular.com/Automatically_Encry
On 2011-10-11 17:29 , Eugen Leitl wrote:
> On Tue, Oct 11, 2011 at 02:30:01PM +0200, Jeroen Massar wrote:
>
>> Of course you are raising the bar,
>
> That's the main idea.
>
>> but that is the only thing you are
>> doing, as the adversary can still
another will kick the persons involved and
nicely ask to move along somewhere else.
> On 11.10.2011 14:33, Jeroen Massar wrote:
>>> If the box is at a place under your control, you will at least know.
>>> Replugging can be noticed (packet drops, changes in voltage) and the
On 2011-10-11 16:42 , Eugen Leitl wrote:
> On Tue, Oct 11, 2011 at 12:48:53PM +0100, Julian Yon wrote:
>
>> I think you missed the point Jeroen was making there. If Mallory
>> *really* wants to compromise your server, there will be a level of
>> security beyond which a gun to your children's heads
On 2011-10-11 13:48 , Julian Yon wrote:
> On 11/10/11 09:07, Eugen Leitl wrote:
>>> At one point or another they just apply rubberhose crypto thus don't
>>> make it too difficult.
>> Why do you bother breathing? You'll die, anyway.
>
> I think you missed the point Jeroen was making there. If Mallo
On 2011-10-11 13:18 , Moritz Bartl wrote:
> On 10.10.2011 23:20, Jeroen Massar wrote:
>>>> Does not matter what service you use, they all fail under the pressure
>>> Use your own servers at the co-lo. Use TPM and tamper-proof systems.
>> Does not matter, given
On 2011-10-11 10:07 , Eugen Leitl wrote:
> On Mon, Oct 10, 2011 at 11:20:05PM +0200, Jeroen Massar wrote:
>
>>> Use your own servers at the co-lo. Use TPM and tamper-proof systems.
>>
>> Does not matter, given enough power/money/force your adversary can walk
>
>
On 2011-10-10 22:27 , Eugen Leitl wrote:
> On Mon, Oct 10, 2011 at 07:07:35PM +0200, Jeroen Massar wrote:
>> On 2011-10-10 18:42 , Andre Risling wrote:
>>> Here's how Google is a compliant slave.
>>>
>>> You still use Gmail?!
>>
>> Does not
On 2011-10-10 18:42 , Andre Risling wrote:
> Here's how Google is a compliant slave.
>
> You still use Gmail?!
Does not matter what service you use, they all fail under the pressure
of organizations that want access to it, be that legal or illegal.
(The bigger problem with the context of the ar
On 2011-09-22 07:20 , Orionjur Tor-admin wrote:
> Periodically, about one time in a half of year, some people posts an
> abuses against my Tor-server which seems as idiotical.
I guess you mean your Tor exit node.
> To days ago my vds-provider received the next abuse report:
[..]
> Frankly speekin
On 2011-09-09 05:09 , cmeclax-sazri wrote:
> On Thursday 08 September 2011 22:02:56 Andre Risling wrote:
>> - Who stores the MAC address of the computer you're using? The ISP? An
>> Webmail service?
>
> On IPv4, a MAC address goes only as far as the local network (the MAC address
> my router ha
On 2011-09-03 15:39 , Joe Btfsplk wrote:
> On 9/2/2011 4:46 PM, and...@torproject.org wrote:
>> On Fri, Sep 02, 2011 at 01:31:53PM -0400, col...@averysmallbird.com
>> wrote 4.5K bytes in 109 lines about:
>> : According to a number of bloggers(1), torproject.org was include
>> among those
>>
>> Here
On 2011-09-01 15:24 , Roger Dingledine wrote:
> Several people have asked us on irc about recent news articles like
> http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
[..]
In addiotion I want to refer to the below article from the Dutch "Public
Minis
24 matches
Mail list logo