On 2019-09-13 6:17 p.m., nusenu wrote:
> I suspect these non-exit relays are up to no good
What was risky about those relays? They all seem to be running Tor
0.3.5.8 with no contact given. Is that a
Btw your message looked corrupted like a binary virus or some such until
i turned on enigmail; ma
On Sat, Sep 22, 2018 at 5:49 PM, qubenix wrote:
> I've notice over (at least) the past few days that while using tbb all
> links to Reuters that I follow end up on a "Page not found". Even
> https://reuters.com shows it. This is with or without scripts allowed.
>
> Have others noticed this? Is thi
On 27/12/17 12:51 PM, Fernando Fernández Mancera wrote:
> Hi,
>
> about point 2 if I am not wrong, in your tor browser path you should find
> the torrc file that it uses.
Not shown in manual but if you have TBB check at
./tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc
ExcludeNodes isnt in
On 03/11/17 03:38 AM, Jon Tullett wrote:
> On 31 October 2017 at 07:07, x9p wrote:
>> On 2017-10-30 23:47, krishna e bera wrote:
>>>
>>> I tried to donate by Paypal via TBB (medium security setting) and got an
>>> error page when it was almost done:
>>
I tried to donate by Paypal via TBB (medium security setting) and got an
error page when it was almost done:
"
Method not allowed
Method not allowed. Must be one of: POST
"
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproj
There can be no guarantees - all software has bugs. However Tor Project
people are making best efforts to help users get anonymity and security.
https://blog.torproject.org/tor-social-contract
TorBrowser cannot protect you against exit relay operators who sniff the
contents of traffic. You must
On 21/09/17 11:25 AM, grarpamp wrote:
> https://netzpolitik.org/2017/secret-documents-reveal-german-foreign-spy-agency-bnd-attacks-the-anonymity-network-tor-and-advises-not-to-use-it/
>
>
https://netzpolitik.org/2017/geheime-dokumente-der-bnd-hat-das-anonymisierungs-netzwerk-tor-angegriffen-und-wa
On 20/09/17 06:00 AM, Alec Muffett wrote:
> In certain respects this can be read as "TBB's threat model excessively
> trades-off consistency and usability in favour of protections which
> $SOME_MAJORITY of its userbase do not actually need" - but I'm okay with
> the status quo.
>
> I would rather
On 13/09/17 11:41 AM, "I" wrote:
> https://zerodium.com/tor.html
Anyone caught selling Tor bugs and exploits to anyone but TorProject
should be subject to some kind of severe penalty. It is an offence
against the right to privacy, in other words a crime against humanity.
Well, a misdemeanor anywa
On 30/08/17 10:07 AM, Ben Tasker wrote:
> On Wed, Aug 30, 2017 at 2:55 PM, Jon Tullett wrote
>> For example the "China Dissident Blog" could choose a stable site hosted
> in the United States or Europe and have it point to the current unvalidated
> name. Or they can just use a friend's Internet si
On 12/08/17 07:08 AM, Jason Long wrote:
> Hello.Can I use Tor with static IP? I don't like my IP changed.
Your own IP address is not changed by the Tor network.
What the Tor network changes periodically is route taken to wesites you
visit in Torbrowser. Each route will use 2 or 3 different IP add
On 12/08/17 07:59 AM, eric gisse wrote:
> Please don't use OpenDNS. They insert ads into lookups.
thanks, fixing.
>
> On Fri, Aug 11, 2017 at 7:07 PM, krishna e bera wrote:
>> On 11/08/17 06:42 PM, blo...@openmailbox.org wrote:
>>> I am a little confu
On 11/08/17 06:42 PM, blo...@openmailbox.org wrote:
> I am a little confused when using Tor with https://browserleaks.com/ip
>
> My exit node is ogopogo in Canada. But the "DNS leak test" component of the
> above page says that my DNS servers are in Belgium:
>
> 74.125.181.9 n/a Google Bel
Followup: laws passed.
"
President Putin has signed a law that, as of November 1st, bans
technology which lets you access banned websites, including virtual
private networks and proxies. Internet providers will have to block
websites hosting these tools.
...
Accordingly, the President has signed
On 22/07/17 08:14 AM, Udo van den Heuvel wrote:
> Hello,
>
> Where can I find the tor ReleaseNotes for 0.3.0.9 that actually mention
> details about changes in 0.3.0.9?
>
> Kind regards,
> Udo
>
These?
https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html
--
tor-talk mail
On 04/07/17 02:13 AM, intrigeri wrote:
Answered on tails-...@boum.org.
That shows as a mailto: link. Perhaps meant to point to
https://mailman.boum.org/pipermail/tails-dev/2016-August/010898.html
which leads to these issues:
https://labs.riseup.net/code/issues/7380
https://labs.riseup.net/code/
On 18/06/17 05:50 AM, Alec Muffett wrote:
In other news, the FB Onion, for some time after it launched, geolocated to
London. I can't imagine why.
How can a .onion geolocate anywhere? Arent they supposed to be entirely
in cyberspace and hidden?
--
tor-talk mailing list - tor-talk@lists.torp
Am 08.06.2017 um 21:16 schrieb Suhaib Mbarak:
> My task goal is to show how Tor works and to proof that it
> relay anonymise user traffic...
> My question is to make sure wether tor source code is open and
> available for public or not?
> In case it is open source and can be modified how it is sec
A blog post that envisions Tor working as part of mainstream infrastructure.
https://medium.com/@alecmuffett/tor-is-end-to-end-encryption-for-computers-to-talk-to-other-computers-34e41d81c9e2
"
Tor protocol enables end-to-end encrypted communications between
computers — eg: Tor Browser on your l
On 25/04/17 05:37 AM, c...@browserprint.info wrote:
I'm a PhD student.
I have no employer other than my university.
All my work is done with the intention of publishing it in academic journals,
conferences, my blog, and my thesis.
Going to the site we can see this project purports to be run by
On 01/04/17 10:12 PM, neokulak wrote:
So the Tor mailing list is now being used to promote anti-Semitic spam?
How lovely.
This mailing list is not filtered through a moderator, which means stuff
gets through and abusers of the list get removed after the fact.
Some hate propaganda like that v
"The Department of Justice filed a motion in Washington State federal
court on Friday to dismiss its indictment against a child porn site. It
wasn’t for lack of evidence; it was because the FBI didn’t want to
disclose details of a hacking tool to the defense as part of discovery.
Evidence in Un
""Year Zero" introduces the scope and direction of the CIA's global
covert hacking program, its malware arsenal and dozens of "zero day"
weaponized exploits against a wide range of U.S. and European company
products" [0]
The good news is no mention of exploits against Tor, TorBrowser, TAILS,
On 10/01/17 11:44 AM, Joe Btfsplk wrote:
On 1/10/2017 3:53 AM, Georg Koppen wrote:
Joe Btfsplk:
How does Browserspy.dk get the correct local time & time zone from TBB
6.08 on my PC?
I guess https://trac.torproject.org/projects/tor/ticket/20981 is a good
candidate for explaining this.
Thanks
On 10/01/17 08:30 PM, grarpamp wrote:
Rather than disclose the source code that the FBI used to target a
child porn suspect, federal prosecutors in Tacoma, Washington recently
dropped their appeal in United States v. Michaud.
The case is just one of 135 federal prosecutions nationwide involving
t
On 02/12/16 01:28 PM, Flipchan wrote:
Hidemyass did deanonymize and gave out information to the goverment
about One if their own users. If dns is your problem run dns throw
Tor. Use dnscrypt throw Tor . A cpanel is often just some php script
sure it might record ur ip and useragent But that is mo
On 12/11/16 04:40 PM, John Doe wrote:
Recently, Istumble relatively often over a message by my Antivirus
that a file was removedfrom the TB “doomed” cache, where binary
files like images are cached. These filesseem to contain an exploit
like “Win32/ShellCode.A”. Firstly Iassumed a bad exit node t
On 02/11/16 09:17 PM, grarpamp wrote:
On Tue, Oct 25, 2016 at 5:04 PM, krishna e bera wrote:
Perhaps our new Board member from CMU can provide more details
Tor is not transparent. Sorry. Move along.
(Or contact the press office for some unfreespeech.)
Heh. I was not suggesting there is
On 25/10/16 01:55 PM, tort...@arcor.de wrote:
http://www.theregister.co.uk/2016/10/25/judge_orders_fbi_to_reveal_whether_exploits_were_okayed_by_white_house/
"The case is one of several the Feds are pursuing against more than 100 alleged
users of the child sex abuse material exchange network cal
On 11/10/16 12:17 PM, Flipchan wrote:
Hi *:)
I have been playing around with some telnet and ssh honeypots lately and caught
some malware to learn More about reverse Engineering. And i thought it would be
cool to run a Tor honeypot , something that listens on port 9001 and is ofc not
connected
On 04/10/16 10:03 PM, Joe Btfsplk wrote:
In TBB 6.0.5 (Win), NoScript 2.9.0.14 it seemed to be misbehaving.
It wasn't showing many trackers in the icon drop list, on sites where
there would be plenty.
I UNchecked "Allow Scripts Globally."
I uninstalled it - closed TBB. Removed NoScript entries
We are already starting to see people switching away from Google for
privacy reasons and soon it will also be because of censorship
(nationstate edicts and EU "right to forget") and biasing (due to
Google's political involvement, e.g. suppressing typeaheads negative to
Clinton). The alternative se
On 26/09/16 03:02 PM, Joe Btfsplk wrote:
> But several current, relevant technical questions I've asked about Tor
> issues get no comments.
> Questions I'm pretty sure a lot of people would be interested in. And
> that at least some advanced users would have partial answers or
> suggestions for, bu
On 20/09/16 01:28 PM, Andrew F wrote:
> How do i check the archives? thanks
Look at the bottom of every message on the list (including this one):
there is a link to the website that contains the archives.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other se
On 14/08/16 05:23 AM, shirish शिरीष wrote:
at bottom :-
On 13/08/2016, grarpamp wrote:
Общество шифропанков
http://vabu56j2ep2rwv3b.onion/
BitTorrent трэкер.
http://vabu56j2ep2rwv3b.onion/Tracker.html
Это одна из его установок которую вы можете использовать в своих torrent
файлах.
http://xodv6
When trying to login to Youtube from TBB, NoScript blocks a bunch of
stuff seemingly related to fonts (see screenshot at
https://postimg.org/image/c0sfrf2kh/41fa1875/ ), and i cannot proceed
(the Sign In button doesnt work. Otherwise Youtube works fine with
HTML5 videos.
The website's font oug
> Should add that users with NoScript enabled would not have been
> vulnerable - I get the "noscript decreases privacy" argument, but I'd
> still kinda like it to be on by default to protect users. Maybe with a
> big red "Turn on Javascript because I'm happy to get pwned by
> malicious ads, FBI mal
On 07/05/2016 06:51 PM, grarpamp wrote:
> On 7/5/16, gdfg dfgf wrote:
>> how accurate are this results?
>> https://imgur.com/a/6cZjf
>
> Be sure whatever tool you're using is not in fact bypassing tor.
> Browsers are often a quick hack, better standalone tools exist
> for more accurate / in dept
On 07/05/2016 12:30 AM, Paul Syverson wrote:
> On Mon, Jul 04, 2016 at 10:55:25PM +, Cannon wrote:
>>
>> Just a paper I found, thought you all might find it interesting.
>> What are your thoughts on this?
>>
>>
>> http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf
>
> A work of penetr
On 06/26/2016 04:59 AM, grarpamp forwarded some links:
> https://www.reddit.com/r/TOR/comments/4pw7bz/tor_infiltrated_by_cia_agent/
Incident summary.
> http://pastebin.com/WPAmqkW8
Can one of participants verify that as an authentic unedited transcript
of the tor-internal irc? I'm guessing a b
On 06/17/2016 03:39 PM, Florian Weimer wrote:
> Is there a constellation of bugs which recently conspired in such a
> way that a web server might receive a flood of HTTPS requests on port
> 80/TCP instead of 443/TCP?
It is only a convention (common practice) that HTTPS listens on port
443. A webs
On 05/31/2016 12:41 PM, Fabio Pietrosanti (naif) - lists wrote:
> Hello,
>
> i where considering to start running Tor Relay on retro' operating
> systems under virtualized environment and i was particularly interested
> in having a Tor Relay running on OS/2 Warp and i was particularly
> interesti
On 05/18/2016 11:40 AM, Joe Btfsplk wrote:
> I'm surprised there are no discussions or questions on tor-talk about
> this issue .
> Since any exploits - whether due to "flaws" in Firefox or TBB, or not -
> potentially have broader implications & applications.
>
> Normally, there'd be many comments
followup-
Mozilla files brief in the case to get disclosure before defendant:
https://blog.mozilla.org/blog/2016/05/11/advanced-disclosure-needed-to-keep-users-secure/
Since the case involves TorBrowser more directly than Firefox, will Tor
Project legal team also file an /amicus curiae/ ?
(The g
On 05/06/2016 08:53 PM, Jonathan Wilkes wrote:
>> Go to https://www.torproject.org/download/download and click on 'source
> code'.
> Starting from the frontpage I click on the "Download" button and arrive
> here:https://www.torproject.org/download/download-easy.html.en
> And no obvious links to th
(quote from article [0])
The rule change, sent[1] in a letter to Congress on Thursday, would
allow a magistrate judge to issue a warrant to search or seize an
electronic device if the target is using anonymity software like Tor.
Over a million people use Tor to browse popular websites like Facebook
On 04/05/2016 07:23 PM, Phil Mocek wrote:
> On 04/04/2016 03:13 AM, Roger Dingledine wrote:
>> On Mon, Apr 04, 2016 at 12:04:44AM -0400, krishna e bera wrote:
>>> Somewhere is a piece of advice from TorProject recommending people
>>> not to run an exit node from h
On 04/03/2016 10:06 PM, grarpamp wrote:
> https://www.thestranger.com/slog/2016/03/30/23885710/police-go-on-fishing-expedition-search-the-home-of-seattle-privacy-activists-who-maintain-tor-network
> https://twitter.com/seattleprivacy
>
quote:
> Robinson said the authorities should have known bett
"In February 2015, the FBI seized a dark web child pornography site and
ran it from their own servers for 13 days. During this time, the agency
deployed a NIT against people who visited specific, child pornography
threads, which grabbed their real IP address, among other technical
details."
articl
On 03/26/2016 07:32 AM, CANNON NATHANIEL CIOTA wrote:
> Seeking technical information on how hidden services were de anonymized
> and what updates to HS protocol was applied as a mitigation.
> Thanks,
https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous
--
tor-talk mail
On 03/17/2016 03:09 AM, Ben Stover wrote:
> Assume I wrote some instructions into "torrc" file with wrong syntax.
>
> How do I get informed about this mistake?
>
> Is there a logilfe?
>
> Can I enable a warning prompt?
>
> Or are such invalid instructions simply silently ignored?
tor --verify-
On 03/19/2016 07:02 AM, Oskar Wendel wrote:
> Roger Dingledine :
>> The third question you might ask is: can I inject these signals in a
>> way that they're still recognizable to me, but observers don't realize
>> that anything weird is going on with the traffic? That is, can I do
>> this active tr
How would the TBOCR work with Bridges?
https://www.torproject.org/docs/bridges.html.en
On 03/15/2016 10:51 AM, Martin Kepplinger wrote:
> What do you mean? blocking traffic from the Tor network is very common
> and a standard feature that torproject itself supports.
>
> This is just the same in r
On 03/12/2016 10:18 AM, Spencer wrote:
> 1 de·sign verb \di-ˈzīn\
> ...
> Copied -dev, -ux, and -teachers once for relevance but, should there be,
> responses live on -talk.
Dictionaries and etymology can be fun and controversial and offtopic.
What are you trying to say about "Design" and Tor?
Wh
Are developers working on the mouse wheel browser leak?
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html
https://www.rt.com/viral/335112-tor-mouse-movements-fingerprint/
When i tried the demo, Noscript was blocking javascript on the page.
--
tor-talk mailing l
On 02/22/2016 04:03 PM, Guido Witmond wrote:
> If either the blogger or responder wishes to send a private message,
> they can use the others' persons public key after validating there is no
> MitM. Message transport goes through the site. After a few round trips
> of messages, there is certainty
https://user.riseup.net/forms/new_user/first
- works with Tor
- does not require alternate email or phone
- does not tolerate spamming
- supports StartTLS
- does not send or log ip addresses
- requests donations, bitcoin accepted
more info:
https://help.riseup.net/email
On 02/09/2016 01:15 PM, D
A recent Schneier blog points to this research
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2700347
Summarizing, it seems possible to match anonymized users (at least in a
marketing profile sense) to registered users or past purchasers, by
analyzing how they interact with a site. I wonder h
On 02/07/2016 07:25 AM, nusenu wrote:
> Fabio Pietrosanti (naif) - lists:
- it is *not* a good idea to run exits from your home (limited exit
policies are no guarantee for no troubles)
>> It depends only on how finely we can be capable of precisely defining
>> the destinations to which yo
On 15-03-10 08:38 PM, z...@manian.org wrote:
> Fred says the deterministic builds for iOS are impossible because Apple's
> FairPlay DRM.
>
> RAM can't be trusted either.
>
> Everytime I think we've hit local peak dystopia, we go deeper.
>
>
>
> On Tue, Mar 10, 2015 at 3:17 PM, Mike Perry
> wr
On 15-03-05 02:07 PM, t...@t-3.net wrote:
>
> On 03:05:2015, Travis Bean wrote:
>
>> Stuff
>
> I wonder if this giant pile of mess you've posted in this mailing list
> is related to the products/services you are trying to sell on the web
> site linked in your sig?
>
> I didn't like what I read
On 15-02-07 02:29 PM, grarpamp wrote:
> On Sat, Feb 7, 2015 at 5:01 AM, Mirimir wrote:
>> "if you ever need info about anyone at harvard just ask.
>> i have over 4000 emails, pictures, addresses, sns.
>> They trust me — dumb fucks."[0]
>> http://gawker.com/5636765/facebook-ceo-admits-to-calling-us
On 15-02-02 09:57 PM, Mike Ingle wrote:
> http://www.confidantmail.org
> Mike Ingle
> d2b89e6f95e72e26e0c917d02d1847dfecfcd0c2
I am curious why someone delivering security and privacy software does
not have HTTPS on their webserver. Also what is that string after your
email address for?
sign
They are tapping the cables and getting ip addresses of browsers, then
sharing that with other "intelligence" agencies. E.g. you could be
stopped at the border if someone in your house clicked on a monitored site.
Another reason to use Tor (not an uppercased acronym) all the time.
https://firstlo
The new copyright law in Canada would seem to require anyone claiming
ISP safe harbour protection to log data of users for 6 months and to
forward alleged copyright violation notices to them.
http://www.michaelgeist.ca/2014/12/notice-difference-new-canadian-internet-copyright-rules-isps-set-launch
What about making a TorProject filter list for Adblock* users so that
we all look the same to sites visited?
Or go further and include (or add some functionality of) RequestPolicy
into TBB. Its purpose is to ensure no URLs outside the domain you
intended to visit are opened, and the user has to s
On 14-12-21 06:54 PM, Thomas White wrote:
> Ok now the dust has settled a little, a few updates on the situation:
>
> 1. The likelihood of this being the work of law enforcement seems to
> be lower than originally anticipated. This is good in many ways but
> asks more questions than it solves righ
On 14-09-23 12:45 PM, Fabio Pietrosanti (naif) wrote:
> Il 9/22/14, 11:42 PM, grarpamp ha scritto:
>> Whether clones or worse, there's something
>> very weird going on with these guys.
> Here an OSINT notes/analysis on several of that "suspicious" software:
> https://docs.google.com/spreadsheet/ccc
On 14-09-11 04:36 PM, John Pinkman wrote:
> It all started 4 days ago, when PinkMeth site posted a profile with the
> self-taken nudes of the daughter of the company owners.
>
> [http://pinkmethuylnenlz.onion/us/pa/ligonier-pa/jeanne-markosky]
>
> The company, Markosky Engineering of Ligonier, P
On 14-09-10 12:26 AM, Griffin Boyce wrote:
> Things that are important to note for hidden service operators:
> - Firewall rules are really useful for keeping out unwarranted scrutiny.
Would it be better to have a separate firewall appliance to ensure the
hidden service box cannot be as easily DD
On 14-09-03 10:25 PM, Roger Dingledine wrote:
> On Wed, Sep 03, 2014 at 04:10:13PM -0700, Virgil Griffith wrote:
>> https://docs.google.com/document/d/1SaBK664SchhZOP9XBsB8KK63k4xlmMTlkhfF28f2204/pub
> [...]
> - Figure 3 is a bit weird. Our bandwidth-per-relay stat is a function of
> how many total
On 14-09-03 05:46 AM, bao song wrote:
> 10.6 still supports Rosetta to run old apps.
>
> 10.7 means having to upgrade EVERYTHING.
>
> That's why I still run 10.6
>
> (and there was even more to be said for 10.4 which ran pre-OSX apps, but my
> 10.4 machine died).
Do these old apps need to be c
On 14-08-30 07:31 AM, Patrick Schleizer wrote:
> Cypher:
>> On 08/24/2014 09:43 PM, Michael Wolf wrote:
>> The article was very interesting - except the part about 'here's how you
>> might want to fix this'. I certainly hope that the Tor project /is not/
>> accepting patches submitted by NSA or GCH
On 14-08-30 02:31 AM, elrippo wrote:
> Very nice :)
>
> My browser, rekonq, reports that your certificate is not valid. Maybe you
> check
> that.
>
> Kind regards,
> elrippo
>
> Am Samstag, 30. August 2014, 02:28:22 schrieb Juris - torservers.net:
>> Update:
>>
>> https://www.torservers.net/wi
On 14-08-24 11:56 PM, I wrote:
> Fair enough, although it was published elsewhere.
>
>
>
>
>>> One thing revealed is that this list doesn't get the full facts from the
>>> TOR core.
>>
>> Huh? That's a good thing, because this is not a trusted list.
Would be nice to see Tor media coverage link
On 14-08-13 12:28 PM, t...@skrilnetz.net wrote:
>
> Hi,
>
> Not sure if that has been discussed yet... the site torbundlebrowser.org
> is a almost perfect copy of the TOR webpage and has a TBB download which
> has malware in it. (down at the moment)
>
> http://dustri.org/b/torbundlebrowserorg.ht
On 14-08-13 10:26 AM, Ben Healey wrote:
> I came across 2 connections that were able to stay established with my
> hardware disabled.
The software keeps trying for a while before it gives up.
Secondly, netstat for Windows may be reporting the last active
connections rather than the current state
On 14-08-08 04:01 AM, grarpamp wrote:
> [Rant aside, people have a right to be forgotten, and those, like CL,
> who willfully disregard that right, without verbosely or obviously
> saying so in context (ie: mailing lists obviously have self-run, even
> public, archives... that you cannot 'delete'),
On 14-08-07 11:06 AM, mick wrote:
> This is worrying.
>
> http://www.theregister.co.uk/2014/08/07/london_cops_close_down_site_arrest_suspect/
>
> If this reporting is accurate, it implies that UK City of London Police
> may be co-operating with copyright enforcers in closing down a service
> whic
On 14-08-07 05:57 AM, Andreas Krey wrote:
> On Wed, 06 Aug 2014 23:38:54 +, Yuri wrote:
> ...
>> So what is the reason that UDP isn't supported?
>
> Because what you describe is a transparent proxy/router, while tor
> only offers a SOCKS5 interface and doesn't (and doesn't want to)
> care abou
On Tue, Aug 5, 2014 at 3:20 PM, Roger Dingledine wrote:
> On Tue, Aug 05, 2014 at 03:09:29PM -0400, Andrew Lewman wrote:
>> Given the resources of a national police force, it seems probable they
>> can create a crawler to simply crawl every permutation of hidden service
>> addresses on port 80 alo
On 14-08-02 01:48 PM, Mirimir wrote:
> I've been playing with JAP/JonDo routed through Tor. The JonDo client
> has a SOCKS proxy option, and it works well with Tor v0.2.3.25
> SocksPorts in Ubuntu 14.04.1 x64. I installed Tor from the Ubuntu 12.04
> repository, by the way.
>
> After upgrading Tor
On 14-07-29 07:51 PM, ideas buenas wrote:
> Do you mean TBB over a VPN?
No, but if i did mean that, polipo would be even less relevant.
> On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera wrote:
>
>> On 14-07-29 04:44 PM, cav78 wrote:
>>> I would like to know if it'
On 14-07-29 04:44 PM, cav78 wrote:
> I would like to know if it's necessary to
> install or configure a web proxy (privoxy or polipo) with Tor Browser
> Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
> Orbot
> (a software for Android) includes Polipo, but I don't see it in T
On 14-07-24 06:29 PM, ideas buenas wrote:
> I don't trust Gmail nor Yahoo. Roger, found another way. No excuses, please.
I am curious why Riseup.net isnt in the list of popular and relatively
secure email providers. Also there must be several large european and
asian free email providers, but som
On 14-07-24 01:51 PM, s7r wrote:
> Using Tor will encrypt your data totally with multiple layers, this
> means that your ISP can see that you are using Tor, and nothing more.
> They can't see what sites you visit, what data you download,
> intercept, modify or alter the data you download, can't see
On 14-07-23 07:05 PM, Tempest wrote:
> Kristy Chambers:
>> Have I written, that there is anything creepy about that?
>> The basic question is, in how the tor project can be trusted if we look
>> on suspicious activities of tor developers (e.g. choosing worse design
>> decisions).
>
> the fundament
On 14-07-03 02:05 PM, grarpamp wrote:
> You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
> Alexander Volynkin / Michael McCord
if they have followed a responsible disclosure process, tor developers
should already be working on remedies...
--
tor-talk mailing list - to
The same thing happened to Yahoo and AOL users in tor-relays:
https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
To summarize, your only practical remedy at this time is to use an email
address not on Yahoo or AOL.
On 14-07-01 04:41 PM, Bobby Brewster wrote:
> What does this
On 14-07-02 10:59 PM, Seth David Schoen wrote:
> ideas buenas writes:
>
>> Why is markmonitor.com and its derivates in my TBB? How can I do to delete
>> this ? Are they watching me?
>
> Hi,
>
> Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
> Enable/Disable Rules men
(tl;dr: humor, no content)
On 14-06-30 02:14 PM, Mark McCarron wrote:
> Mick,
>
> I would be very careful what you claim in your emails. I have the capability
> of suing you into oblivion, that email constitutes defamation. Nothing like
> that was ever said, either retract it or I will take y
On 14-06-20 06:30 AM, Erik de Castro Lopo wrote:
> George Kadianakis wrote:
>
>> Hello friends,
>>
>> this is a brief post on recent and upcoming developments in the PT
>> universe.
>
> Err, sorry, what is PT?
pluggable transport
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsu
On 14-06-18 07:04 AM, Lunar wrote:
> Collecting statistics from Tor exits in a privacy-sensitive manner
> --
>
> Optimizing the Tor network to better support the most common use-cases
> could make a real difference to its perceived us
On 14-06-16 03:17 PM, Joe Btfsplk wrote:
> In at least the last couple TBB versions, or longer, I've found
> FlashPlayerPlugin_x.x.exe (latest *13_0_0_214.exe) running in background
> - numerous times.
> Actually, 2 instances of flash exe files are always shown running.
>
> Biggest question is, wh
On 14-06-14 01:00 PM, Collin Anderson wrote:
> On Sat, Jun 14, 2014 at 10:07 AM, Joe Btfsplk wrote:
>
>> I'm not a legal or embargo rules expert, but I wonder if an embargoed
>> country or individuals in it, giving money to a non-profit for which they
>> receive nothing valuable, or that benefits
On 14-06-11 04:23 AM, Wayland Morgan wrote:
>> 4) you trust the users ?
>>
>> 5) you trust the websites they will visit ?
>
> Yes. I don't really want or need to know what sites they will be
> visiting and nightly rebuilds are a major success factor IMO with
> regards to this implementation. If I
On 14-06-10 02:12 PM, Wayland Morgan wrote:
> I have been considering potentially building some type of remote
> jumphost for a University research setting that automatically connects
> its users to the Tor network and am looking for feedback/implementation
> ideas.
>
> A few assumptions:
>
> 1)
On 14-06-02 12:26 PM, Gerardus Hendricks wrote:
> On 6/2/14 3:59 PM, David Rajchenbach-Teller wrote:
>> I'm curious, how does this fingerprinting technique work?
>
> Like this:
>
> http://www.w2spconf.com/2012/papers/w2sp12-final4.pdf
What if all the HTML5 and CSS3 calls to read back any data in
On 14-05-31 12:59 PM, Tempest wrote:
> Bobby Brewster:
>> What do people who use .onion addresses use to communicate?
>
> bitmessage.ch, which runs the bitmail onion you listed, has been usable
> for me. however, the accessibility of the onion has not been consistent
> and, at one point, the proje
Seems clear to me, the right thing to do is boycott the event or at least
deplore the ban, individually and as organizations. Any chance of Tor
Project signing onto such thing?
On Mon, May 26, 2014 at 9:37 PM, Griffin Boyce wrote:
> Juan wrote:
>
>> I once was told that the swedish governemnt
1 - 100 of 203 matches
Mail list logo