René Ladan:
> Op 21 feb. 2016 1:39 a.m. schreef "Roger Dingledine" :
>>
>> On Sat, Feb 20, 2016 at 02:28:37AM -0600, CANNON NATHANIEL CIOTA wrote:
>>> With the large sudden spike in hidden services addresses, any way to
>>> view what the newly registered .onion addresses are or at least a
>>> lis
Hi,
Patrick Schleizer wrote (09 Feb 2016 23:42:22 GMT) :
> intrigeri:
>> [can you please decide what mailing-list this discussion should happen
>> on, and then we can stop cross-posting over 4 mailing-list?]
This still holds.
>> I'm not sure I understand the problem you mean to raise, though.
>>
Some websites like Craigslist and Fiverr refuse to accept Tor
connections. They may either explicitly state this (Craigslist) or not
let you create a new account with Tor (Fiverr).
Is there a way around this? For example, one can do: home IP ---> VPN IP
---> Tor node ---> Tor Node ---> Tor exi
I can point you in a direction that I took to accomplish this without having to
resort to a third party VPN. I am running my own VPN from a VPS and added it to
my proxychains file. Here is the github for proxychains-ng that I highly
recommend. This setup accomplishes what you ask, a list of ip a
> IP, then Tor, then VPN?
You can use VPN over tor, which offers more IP stack utility for apps
than tcp tor.
For this you will also likely want to bug OpenVPN people to add a
SOCKS5 socksport to their openvpn client so you can do narrow /
parallel app usage among tor / clearnet / vpn more easily
Just remember that with this approach you have location privacy and
circumvention, but lose anonymity and make it much easier to both tie your
traffic to your identity *and* have a bit higher risk of data retention on the
VPS side.
~Griffin
-- Sent from my phone. Please excuse typos and
e̳͖̲̮n
On Sun, Feb 21, 2016 at 7:17 PM, Scfith Rise up wrote:
> I can point you in a direction that I took to accomplish this without having
> to resort to a third party VPN. I am running my own VPN from a VPS and added
> it to my proxychains file. Here is the github for proxychains-ng that I
> highly
> So basically they see that someone signs up using the VPS that you've paid
for using your real name and account?
Providers do exist that don't ask for details and accept payment via
Bitcoin - so it's not impossible to do in such a way that simply
threatening the provider won't be sufficient.
Pe
Mr. Andersson is assuming a lot. There are definitely tried and true methods to
make purchases online and setup identities for these types of things. At the
end of the day, yes the VPS provider is the weakest link. But you can use one
that has no logs, carries a warrant canary, etc. and you can
On Sat, Feb 20, 2016 at 06:18:12AM -0700, Mirimir wrote:
> Or maybe Harry71 isn't detecting them. I recall that grarpamp was
> finding onion sites. Maybe he'll comment.
His seems to be down at the moment, oniondb, monitor and a
few others are up... just spidering on the back, index middle, search
Sign a message to me...
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
> > Another service is http://tor.luakt.net , which managed to find my
> > otherwise unpublished (dummy) onion site after 1 to 2 weeks. It does
> listen
> > on port 80 though.
>
> LuaKT very likely runs a modified version of tor with additional logging
> [1]. Until recently, the code was hosted o
On 2/22/16, Green Dream wrote:
>...
> Interesting. Any idea what they're able to enumerate with the modified
> version of Tor?
they're able to enumerate the onions which land on their node(s) per
O(1) mapping in HSDir participants. e.g. "get lucky"
> Can the Tor network be hardened from this c
13 matches
Mail list logo