Hi everyone,
The Tor Cloud [1] images for all the seven regions have been updated
to include the latest cloud image for stable Ubuntu release 10.04 LTS
(Lucid Lynx). These new images are available on the Tor Cloud website.
The new images include a fix to allow Tor to upgrade automatically
without
On Thursday, August 9. 2012, 23:23:52 adrelanos wrote:
>
> And/or a port or destination IP wise statistic.
Just checked exit port stats of one of my relays. 97 % are HTTPS/HTTP.
Regards
___
tor-talk mailing list
tor-talk@lists.torproject.org
https:/
tor-admin:
> On Thursday, August 9. 2012, 23:23:52 adrelanos wrote:
>>
>> And/or a port or destination IP wise statistic.
>
> Just checked exit port stats of one of my relays. 97 % are HTTPS/HTTP.
Interesting. Thanks!
Mind telling what kind of exit policy you are using? I mean, on a
restrictive
On Thu, Aug 09, 2012 at 11:23:52PM +, adrelanos wrote:
> I'd be also interested in a top50, 100, 1000, x of regular Tor exit
> traffic.
The following two papers took a look at that, among other things:
http://freehaven.net/anonbib/#mccoy-pet2008
http://freehaven.net/anonbib/#huber2010tor
On Thu, 9 Aug 2012 00:47:26 +0300
Maxim Kammerer wrote:
> The “Tor users” page isn't presented as a promotional page, it is
> presented as a factual one. I also remember discussion on this list
> where I expressed doubt about some aspects listed there (military
> uses), and the overall claim was t
Original Message
>
> Date: Fri, 10 Aug 2012 02:00:39 +0300
> From: Maxim Kammerer
>
> Yes, if gathering .onion access statistics were possible, I would load
> each .onion address in a top-50 list and see what it contains, or
> search for the address if access requires authentic
Thus spake Maxim Kammerer (m...@dee.su):
> On Wed, Aug 8, 2012 at 8:09 PM, Andrew Lewman wrote:
> > How would you have us promote Tor?
>
> The “Tor users” page isn't presented as a promotional page, it is
> presented as a factual one. I also remember discussion on this list
> where I expressed d
On Fri, Aug 10, 2012 at 5:26 PM, With Weather Eye Open
wrote:
> It is, in fact, difficult to do just by the nature of how Tor functions.
> Even if you were logging everything that came out of an exit node that you
> control, you wouldn't be able to get good stats from that. You'd need a
> sig
At 10:26 AM 8/10/2012 -0400, you wrote:
> Original Message
>>
>> Date: Fri, 10 Aug 2012 02:00:39 +0300
>> From: Maxim Kammerer
>>
>> Yes, if gathering .onion access statistics were possible, I would load
>> each .onion address in a top-50 list and see what it contains, or
>> sea
At 12:01 PM 8/10/2012 -0700, you wrote:
>Tor is a relatively new and underdeveloped technology, used exclusively
>by early adopters, technophiles, weirdos, and people who really really
>need it. We don't advertise. We're not in stores. This is because we're
>pretty much still in the prototype stag
On Fri, Aug 10, 2012 at 10:01 PM, Mike Perry wrote:
> For example, in terms of number of users, I'd wager a top current
> demographic is "Paranoid Schizophrenic". If it's not #1, it's gotta be
> top 5. The more general category "Antisocial tendencies" is probably
> another top 5. "People who secre
Original Message
> Date: Fri, 10 Aug 2012 22:21:18 +0300
> From: Maxim Kammerer
>
> That's not true, but it shows that you lack the probabilistic
> background required to reason about such things.
No. It shows that I'm simply not willing to accept an incredibly limited
enviro
On Fri, Aug 10, 2012 at 11:20 PM, With Weather Eye Open
wrote:
> No. It shows that I'm simply not willing to accept an incredibly limited
> environment to speak for a network as a whole.
Only because you don't understand how Tor works. The less you
understand, the more data you need.
> I've co
Thus spake Juan Garofalo (juan@gmail.com):
> At 12:01 PM 8/10/2012 -0700, you wrote:
>
> >The early Internet (even as late as the mid-90s) was also dominated by
> >these same classes of people. Eventually it became usable by the
> >normals and the demographics shifted quite dramatically.
> >
Thus spake Maximum Camera (m...@dee.su):
> On Fri, Aug 10, 2012 at 10:01 PM, Mike Perry wrote:
> > The Tor users page is in my mind a reflection of what our demographics
> > will look like as we improve our technology enough to be useful for
> > everyone who wants Internet privacy. We leave out t
On Fri, 2012-08-10 at 22:21 +0300, Maxim Kammerer wrote:
> On Fri, Aug 10, 2012 at 5:26 PM, With Weather Eye Open
> wrote:
> > It is, in fact, difficult to do just by the nature of how Tor
> functions. Even if you were logging everything that came out of an
> exit node that you control, you would
On Fri, 2012-08-10 at 02:00 +0300, Maxim Kammerer wrote:
> On Thu, Aug 9, 2012 at 7:00 PM, Ted Smith wrote:
> > How would you do that without facing the same problem as someone
> > wiretapping their own exit node? Do you have a CP classifier? Are you
> > going to load each .onion and manually veri
On Fri, Aug 10, 2012 at 10:11 PM, Ted Smith wrote:
> The obvious problem with this (((this, right here, is the productive
> contribution to discussion this email has: it points out the problem
> with your proposed methodologies))) is that it presumes that these top
> 50 .onion domains comprise the
> From: gruby...@tormail.org
>
> Please send me a simple example in Ruby lua or C.
> How I can read from onion adress.
>
> connect to ypr7i2smxhcjalla.onion
> sock.write("string")
> and get ansver.
>
> I need simple 2way communication. No comunication outside tor only inside.
Wouldn't you want
On Thu, Aug 9, 2012 at 5:28 PM, adrelanos wrote:
> ...
> Conclusion:
> ... if the robot and attack is well designed, neither exit
> nodes nor anyone else are able to distinguish between robots and
> humans.
i thought this might be a person contributing to an incendiary topic...
now i'm convinced
Thus spake Gregory Maxwell (gmaxw...@gmail.com):
> On Fri, Aug 10, 2012 at 10:11 PM, Ted Smith wrote:
> > The obvious problem with this (((this, right here, is the productive
> > contribution to discussion this email has: it points out the problem
> > with your proposed methodologies))) is that i
On Fri, Aug 10, 2012 at 8:19 PM, Andrew Lewman wrote:
> The Tor users page is based on a number of people who have told us how
> they use Tor. They didn't want to be named, so the profiles are
> anonymous and aggregated.
Sure, that's why the “Tor users” page is more or less a rewritten and
expand
On Mon, Aug 6, 2012 at 10:56 AM, Joe Btfsplk wrote:
> ...
> Since there are sites on "whatismyipaddress.com's blacklist-check" that seem
> totally dedicated to tracking / listing Tor addresses, seems a good bet _any
> sites using this list_ will block many / ? most ? Tor addresses. So far, I
> ch
On Mon, Aug 6, 2012 at 1:44 PM, wrote:
> Please send me a simple example in Ruby.
> How I can read from onion adress.
>
> connect to ypr7i2smxhcjalla.onion
> socker.write("string")
> and get ansver.
behind transparent Tor proxy (see FAQ :)
s = TCPSocket.new 'ypr7i2smxhcjalla.onion', 80
s.puts "
On Thu, Aug 9, 2012 at 1:58 PM, Nick Mathewson wrote:
> ...
> Not sure I understand what you're talking about here. What is making
> you conclude that the openssl library isn't loading?
this gentleperson appears confused by static vs. dynamic linking.
not every application does it the same!
I think (but could be wrong) that you can look at a bitcoin's history
and see who's given to whom and use that data to trace who the person
is, if they weren't careful. (Eg: if they bought from a bitcoin
exchange in the US which could have it's logs subpoenaed)
Anyways, those drugs have to get del
>>No offense to the weirdos, though. You guys are my people :).
> Really? You don't come across as very friendly to the 'weirdos'.
Oh, but he is! You see, I'm an astrophysicist with minor in geology
and ancient history. I lose three jobs and eventually were committed to
green sanitarium b
27 matches
Mail list logo