On Fri, 26 Oct 2012 21:37:45 -0400
Roc Admin wrote:
> Can someone tell me what "16:" means as part of the hashed password
> functions? [...]
>
> It's just really bugging me and I couldn't figure it out. :) Thanks.
>
> I'm speaking in reference to section 5.1 of the control spec.
> https://gitwe
Thanks for pointing that out. Am I reading that correctly that the
hashedcontrolpassword value in the config file can also be in base64?
On Sat, Oct 27, 2012 at 7:04 AM, Julian Yon wrote:
> On Fri, 26 Oct 2012 21:37:45 -0400
> Roc Admin wrote:
>
>> Can someone tell me what "16:" means as part of
From
https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/dir-spec.txt
I wanted to learn what consensus methods are. Below the desired
information i read:
"Before generating a consensus, an authority must decide which consensus
method to use. To do this, it looks for the highest version num
Whoops; my phone used the wrong from address. Let me try that again.
I tried to say:
> On Oct 27, 2012 11:50 AM, "Sebastian G. " <
bastik@googlemail.com> wrote:
> []
>
> >
> > Let's say more than 2/3 support "14" and one supports "13". The last one
> > wouldn't use "14" becaus
Are there any privacy friendly RSS readers for Linux?
No proxy bypass bugs, dns leaks or no other scary stuff like cookies.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 27.10.2012 20:21, adrelanos wrote:
> Are there any privacy friendly RSS readers for Linux?
rss2imap?
--
Moritz Bartl
https://www.torservers.net/
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/lis
Hi guys, I have a quick question regarding the following blog entry:
https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-2
the last part states that Bit-torrent traffic can be trivially identified
to originate at the user's ip.
As an exit node operator, I get those annoying inf
On Sat, 27 Oct 2012 18:43:56 -0400
george torwell wrote:
> As an exit node operator, I get those annoying infringement notices,
> and up until now I've just replied with a polite 'nothing I can do'.
> Does this change anything? Can I be forced to help with identifying
> such a user? Is it their f
INAL
This is an interesting question.
george torwell:
> Hi guys, I have a quick question regarding the following blog entry:
> https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-2
>
> the last part states that Bit-torrent traffic can be trivially identified
> to originate at
On Sat, Oct 27, 2012 at 06:43:56PM -0400, bpmcont...@gmail.com wrote 0.7K bytes
in 15 lines about:
: Any lawyers in the audience?
See https://www.torproject.org/eff/tor-legal-faq.html.en for the advice
from the EFF lawyers.
--
Andrew
http://tpo.is/contact
pgp 0x6B4D6475
thanks everyone!
Julian Yon: perhaps they can force me to log the ip of every bit torrent
user and hand it over?
not the relay it was coming from, the original ip that used bit torrent.
adrelanos: maybe that could get me in trouble for not doing enough to help
the rights holder?
andrew: thanks,
11 matches
Mail list logo