> On Mon, Aug 6, 2012 at 1:44 PM, wrote:
>> Please send me a simple example in Ruby.
>> How I can read from onion adress.
>>
>> connect to ypr7i2smxhcjalla.onion
>> socker.write("string")
>> and get ansver.
>
> behind transparent Tor proxy (see FAQ :)
>
> s = TCPSocket.new 'ypr7i2smxhcjalla.onion
Going to Bugmenot I was welcomed by a spam page. On a closer inspection
I was warned I should have cookies enabled and answer a captcha. Of
course, the „advanced details and evidence” does not work „Sorry, there
was an error”. Is this a new way of pushing advertisments down the
user's throats witho
On Fri, 24 Aug 2012 14:50:09 +0200
antispa...@sent.at wrote:
> When will this restriction go away?
>
> This restriction will disappear when your computer or mobile device is
> cleaned and no more harmful behavior is detected. Completing the
> challenge above proves you are a human and gives you t
On Wed, 22 Aug 2012 04:41:26 +0200
Robert Marquardt wrote:
> Does someone cares about the deb- and rpm repositories or are they
> deprecated?
The debs on deb.torproject.org appear to be current for debian testing
and stable. The rpms are no longer maintained as most distributions
are maintaining
okay, so here we go again: the browser update 1.35 has been released to the
testers and they have sent no failures back,
so dooble is working proper and quite well with tor.
thanks for QUOD ERAT DEMONSTRANDUM.
It now can be bundled to Tor as just another package.
Regards
.
2012/8/18 Karsten N.
>
CenturyLink's ToS prohibits the use of services such as TOR exit nodes on
residential connections. You may want to focus of running a relay instead
of a exit node. They can (and will) disconnect you permanently for repeat
violations. It's because the ISP can detect the signature of the traffic
the
On 08/24/2012 06:03 PM, Randolph D. wrote:
> the browser update 1.35 has been released to the
> testers and they have sent no failures back,
Because Dooble v. 1.35 did not run on my Linux64 test system.
(I have had no problems to get v. 1.31 running.)
> so dooble is working proper and quite well
On Fri, Aug 24, 2012, at 05:34 PM, Karsten N. wrote:
> On 08/24/2012 06:03 PM, Randolph D. wrote:
> > the browser update 1.35 has been released to the
> > testers and they have sent no failures back,
>
> Because Dooble v. 1.35 did not run on my Linux64 test system.
> (I have had no problems to get
On 08/24/2012 05:36 AM, bao song wrote:
If you built your package from scratch in some version of Unix, you'll
have to close Tor manually. People who know how to build packages from
scratch in Unix are expected to know how to close Tor manually, and/or
how to hack the Browser source code so that
On Fri, Aug 24, 2012 at 01:57:22AM +0200, Julian Wissmann wrote:
> Hi Robin,
>
> last time I checked, Hetzner did not allow to run Tor exits. Make sure if
> that still is the case before you run into trouble with them.
Haven't had a problem with them for a while, but that might
be just to an old
> On Mon, Aug 6, 2012 at 1:44 PM, wrote:
>> Please send me a simple example in Ruby.
>> How I can read from onion adress.
>>
>> connect to ypr7i2smxhcjalla.onion
>> socker.write("string")
>> and get ansver.
>
> behind transparent Tor proxy (see FAQ :)
>
> s = TCPSocket.new 'ypr7i2smxhcjalla.onion
Aaron Paden:
> On 08/24/2012 05:36 AM, bao song wrote:
>> If you built your package from scratch in some version of Unix, you'll
>> have to close Tor manually. People who know how to build packages from
>> scratch in Unix are expected to know how to close Tor manually, and/or
>> how to hack the Bro
On 8/24/12, Aaron Paden wrote:
> On 08/24/2012 05:36 AM, bao song wrote:
>> If you built your package from scratch in some version of Unix, you'll
>> have to close Tor manually. People who know how to build packages from
>> scratch in Unix are expected to know how to close Tor manually, and/or
>>
On Thu, Aug 23, 2012 at 08:53:06PM +0200, Moritz Bartl wrote:
> On 23.08.2012 19:14, Robin Kipp wrote:
> > I would also like to work with an ISP that is concerned with user
> > pass on my personal information to third parties whenever a slight
> > sign of trouble arises.
>
> I don't believe in "pr
On 8/23/12, Aaron Paden wrote:
> This is a simple issue, but important. The script should check to see if
> Tor/Vidalia is already running and just open the browser. As it is, if I
> close the browser, come back some time later, and click the Tor icon, it
> results in an error because Tor is still
> SOCKS is better but I don't know what use it
Maybe this will help Ruby TorCtl programmers with SOCKS?
http://socksify.rubyforge.org/
TOPF (The Onion Protocol Fuzzer) is Ruby-based, maybe it can help.
https://svn.torproject.org/svn/topf/trunk/
___
to
On 08/24/2012 03:03 PM, Robert Ransom wrote:
On 8/23/12, Aaron Paden wrote:
This is a simple issue, but important. The script should check to see if
Tor/Vidalia is already running and just open the browser. As it is, if I
close the browser, come back some time later, and click the Tor icon, it
On 8/24/12, Aaron Paden wrote:
> Sorry about that. I would have searched the tracker, but I didn't see
> it. I was thinking for a second there that you didn't have one.
> Sometimes I fail at using the Internet.
It took me several minutes of reading the list of tickets in that
‘component’ to find
On 8/24/12, Lee Fisher wrote:
> TOPF (The Onion Protocol Fuzzer) is Ruby-based, maybe it can help.
> https://svn.torproject.org/svn/topf/trunk/
I see no SOCKS client code here.
Also, this guy refuses to search for a SOCKS client library
himself/herself/itself, so why would you expect him/her/i
Robert Ransom:
> On 8/24/12, Aaron Paden wrote:
>
>> Sorry about that. I would have searched the tracker, but I didn't see
>> it. I was thinking for a second there that you didn't have one.
>> Sometimes I fail at using the Internet.
>
> It took me several minutes of reading the list of tickets i
Thus spake Ted Smith (te...@riseup.net):
> On Mon, 2012-08-20 at 10:33 +0300, Maxim Kammerer wrote:
> > Hello gentlemen,
>
> > [1] http://pastebin.com/hgtXMSyx
>
> I ran this script on the current consensus. The full results (the
> nodes-sniff-summary file) are below my signature. How did you co
On 8/24/12, adrelanos wrote:
> Robert Ransom:
>> On 8/24/12, Aaron Paden wrote:
>>> So I'm not an expert in shell or anything. I know there are a lot of
>>> gotchas. It seems like it should be possible, though. Is there something
>>> wrong with using pgrep or something?
>>
>> Several things:
>>
On Sat, Aug 25, 2012 at 1:12 AM, Mike Perry wrote:
> The Raccoon has made a believer out of me, but there are some limits to
> both of his/her proofs.. The full proofs can still be found here:
> http://web.archive.org/web/20100416150300/http://archives.seul.org/or/dev/Sep-2008/msg00016.html
Wrt.
On 08/24/2012 06:00 PM, Robert Ransom wrote:
No. If the Tor Browser is packaged properly for a Linux distribution,
it will be configured to use a system-wide Tor instance, and it won't
use any of the startup crap that TBB includes.
Ok. I was thinking of Tor Browser and the bundle as the same t
24 matches
Mail list logo