Hi,
Gozu-san wrote (23 Oct 2011 04:17:12 GMT) :
> So, I open a few instances of TAILS 0.8.1 routed via VPN services to
> various exit IP addresses. All of them can load my private test
> sites, with typical delays of a minute or so. However, all of them
> report "Proxy error: 504 ... General SOCKS
On 23/10/11 07:14, intrigeri wrote:
> Hi,
>
> Gozu-san wrote (23 Oct 2011 04:17:12 GMT) :
>> So, I open a few instances of TAILS 0.8.1 routed via VPN services to
>> various exit IP addresses. All of them can load my private test
>> sites, with typical delays of a minute or so. However, all of the
Hi all,
Out of context of list, but what is the best GPG plugin for Firefox, as i
searched FireGPG has been discontinued,
thanks in advance,
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/
More froms me about Anonymous. Looks to Tor was broken and users info posted
and found from Tor with IP and home addess in cases of lots.
Please tell me what this is and mean. I say good for to arrest phedos but scary
if Anonymous breaks Tor.
this read for info:
http://pastebin.com/TDzM5G2y
"
I see that infos about how Anonymous found IP addres and home locations of
somes phedos:
"We then started to put together a sting operation. After analyzing the list
of Lolita City users, we were able to identify 13 of them. Also we set off
'Chris Hanson' to start uploading episodes of To Cat
Original Message
From: tortalkm...@safe-mail.net
To: tor-talk@lists.torproject.org
Subject: Anonymous to attacks Hidden Wiki and others hidden service
Date: Sun, 23 Oct 2011 11:21:44 -0400
Read here for Anonymous to explain attacks and post username of pedofiles from
some HS cal
Read here for Anonymous to explain attacks and post username of pedofiles from
some HS called L*city
"#OpDarknet - Lolita City user dump" http://pastebin.com/88Lzs1XR. I say good
for thems to attack
phedo, but bad for Tor people to attack all of Hidden Wiki. Please Tor people,
tell me what they
On Sat, 2011-10-22 at 23:50 +, Gozu-san wrote:
> I didn't mean that people are intentionally DDoSing the Tor network.
> I
> meant that the attacks on hidden-service sites may have spillover
> effects. Let's say that SlowLoris attacks bog Apache serving some
> hidden-service site. With enough
Original Message
> Read here for Anonymous to explain attacks and post username of pedofiles
> from some HS called L*city
> "#OpDarknet - Lolita City user dump" http://pastebin.com/88Lzs1XR. I say good
> for thems to attack
> phedo, but bad for Tor people to attack all of Hidden
Hi Kamyar,
For a recent discussion of the caveats around a GPG plugin for browsers, see
https://lists.torproject.org/pipermail/tor-talk/2011-October/021627.html
and
https://lists.torproject.org/pipermail/tor-talk/2011-October/021642.html
On 23.10.2011 14:23, kamyar kamyar wrote:
> Hi all,
>
> O
So far, there is no sign of them using a "weakness" in Tor. If people
run unsecure software behind Tor hidden services, there is NOTHING Tor
can do about it. Judging from your quotes, they opened the boxes and
found documents allegedly exposing some people behind some sites.
This has all been disc
On Sun, 2011-10-23 at 15:52 -0400, hi...@safe-mail.net wrote:
>
> This _is_ an attack on Tor! And they've already proven, to a certain
> extend, that Tor has some weaknesses.
This is an attack on Tor to exactly the same extent it's an attack on
TCP.
signature.asc
Description: This is a digita
I'm a bit curious about the legal issue on monitoring traffic at a Tor exit?
Is monitoring Tor traffic at an exit legal? Since the traffic passes "my"
computer, seems of course I can monitor it or even change it. When people
set up a Tor exit, is there any policy from Tor governing the behavior of
On Sun, Oct 23, 2011 at 8:42 PM, Xinwen Fu wrote:
> I'm a bit curious about the legal issue on monitoring traffic at a Tor exit?
> Is monitoring Tor traffic at an exit legal? Since the traffic passes "my"
> computer, seems of course I can monitor it or even change it. When people
> set up a Tor ex
I'm just asking the legal liability of running Tor exits and making it
clear. I don't bother with modifying somebody's traffic.
Basically, you are saying once we run exits, the computers are not our own
computers any more:
Tor exit operators == ISP, from the perspective of laws.
What if somebody
On Sun, Oct 23, 2011 at 10:18 PM, Xinwen Fu wrote:
> I'm just asking the legal liability of running Tor exits and making it
> clear. I don't bother with modifying somebody's traffic.
The FAQ in question from that link says:
"Tor relay operators in the United States can possibly create civil
and
On Sun, Oct 23, 2011 at 10:18:41PM -0400, Xinwen Fu wrote:
> I'm just asking the legal liability of running Tor exits and making it
> clear. I don't bother with modifying somebody's traffic.
>
> Basically, you are saying once we run exits, the computers are not our own
> computers any more:
>
> T
Thanks for the information, guys. I'm teaching a digital forensics class and
trying to clean up these tangling laws.
Xinwen Fu
On Sun, Oct 23, 2011 at 10:56 PM, Roger Dingledine wrote:
> On Sun, Oct 23, 2011 at 10:18:41PM -0400, Xinwen Fu wrote:
> > I'm just asking the legal liability of runnin
What makes it legal or not is what you do, why you do it
and what you do with it. Law is different from policy and
contract. And they often do not fully line up or cover the
same things. And LE is different from prosecution/defense,
from judge, from jury, from law school and on the street.
> Is mo
19 matches
Mail list logo