Google seems to only give me some broken captcha these days. Scroogle is no
more.
Are there any working Google scraper alternatives or some alterantive actually
usable Tor-friendly search engine out there?
--
() ascii ribbon campaign - against html e-mail
/\ www.asciiribbon.org - against
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 06/22/2012 08:48 AM, m...@tormail.org wrote:
> Lively blog[1], a free blogging service, offers a special
> configuration[2] for Tor users. It's the first free blogging
> service on the open web I've discovered which encourages Tor users
> to join an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> Is there other advice I can give to web developers and sysadmins
> who run websites for activists to make them easier for Tor users to
> use securely?
Tell them to setup https and make absolutely sure that it works.
-BEGIN PGP SIGNATURE-
Ver
> The only added vulnerability were the Tor virtual hidden service
> port, which were running vs. not running. No additional non-Tor
> software.
It sounds like you are about to build something very cool. Do it.
Everyone can have a hidden service running, no problem.
A hidden service which points
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> If you have a Linux machine with an IPv6 address, and you're using
> the iptables technique described on that page, then you're going to
> leak. "iptables" only applies to IPv4 traffic. You need to put in
> an explicit rule using "ip6tables" to block
> A bad-relays mailing list would IMO take a degree of care to do
> right, considering that email gets gathered at the packet level by
> intelligence agencies who are expected to be initiating attacks.
> Sensitive stuff would belong as GPG or PGP emails or similar. Juicy
> details regarding bad-
> Hm? ContactInfo is just a string. You can set it however you like.
>
> Here's the stanza in the torrc file:
>
> ## Administrative contact information for this relay or bridge. This
> line ## can be used to contact you if your relay or bridge is
> misconfigured or ## something else goes wrong. N
> The simplest way would be to add a VE service on a TOR relay
> publishing a browser. You would not only be asking TOR relay
> providers to donate some bandwidth but also some processing power.
So I run the relay with a VE and now I get to see what everyone using
that VE is doing? I am not sure t
> I use a service that provides both a clearnet address and an onion
> address. I only access this service through Tor and I usually do it
> via the clearnet address. Are there any benefits to accessing such a
> service via its onion address?
Tor location hidden services have end-to-end encryption
> Most users have seen sites refuse to allow connections from a
> specific Tor IPa. Sometimes they state the reason as being the
> specific IPa on a blacklist.
> Often, if you force a new exit relay in TBB, then you can connect to
> the site.
>
> So what happens to all the Tor network addresses t
> Yet you neglect to both
> - fully qualify and describe those abusive requests here
> - state how many of the exact same thing you see from clearnet in a
> day
>
> Without such, the above report is unfortunately unqualified anti-tor
> FUD.
Of course I see no reason to indicate my involvement wit
> I really don't understand why you are particularly so upset with
> PinkMeth. People's information is being exploited all over, with and
> without tor. What about facebook, or gmail, or yahoo selling your
> information to advertisers? There can be very intimate info, textual
> or graphical, there.
> These captchas recently started appearing (more often) on all kinds
> of sites. By far the most common name that pops up associated with
> this security is "Cloudfare," but also some others.
> Aside from being forced to allow scripts in NoScript from Cloudfare
> for the captcha to work (or whic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> What about bridges?
There is no big public list of bridges. They would have to look very
closely at you and your internet connection to find out that you are
running a bridge and if they are doing that then you have bigger
problems anyway.
Running
I get these CloudFlare errors so often now that I have decided to use
this thread as a log of every Cloudflare-broken site and action (if
any) I take as a result of it.
realisten.se broken, site contacted
signature.asc
Description: PGP signature
--
tor-talk mailing list - tor-talk@lists.torpro
I assume many of you are aware of the "Cloudflare problem" and them
in practice blocking Tor-users. It is possible to get to these pages by
fighting a captcha for 10 minutes but that is so troublesome that
searching for the URL on Ixquick and clicking "proxy" is faster.
I would like to be able to
> Sure, I understand what you mean. I'm assuming a situation that
> doesn't involve legal issues. This would be illegal surveillance,
> using average resources with your ISP supporting it for some reason.
> I think Tor would be able to handle this type surveillance if used
> correctly.
>
> I would
> Revocable anonymity.
> http://cryptome.org/2014/10/another-tor.pdf
I almost can not believe someone would write a paper describing a way
to change Tor in a way which makes it totally insecure.
Amadou Moctar Kane of KSecurity in India is free to make his own broken
anonymity network and see how
> http://cryptome.org/2014/10/another-tor.pdf
The idea here is to make a "anonymity" network where it is possible to
reveal any users IP if the majority of the relays in the network agree
that this particular person should have their anonymity "revoked".
You get to be "anonymous" until/unless "th
http://arxiv.org/pdf/1410.6079v1.pdf
"Abstract
—Bitcoin is a decentralized P2P digital currency in which coins are
generated by a distributed set of miners and transaction are
broadcasted via a peer-to-peer network. While Bitcoin provides some
level of anonymity (or rather pseudonymity) by encoura
> How it affect innocent bitcoin users with tainted bitcoins? Bitcoins
> come back to user' wallets?
Do not worry about "tained coins" or likely-US-government-agent Mike
Hearn (who I, just for the record, view as a total doucebag).
All Bitcoins are equal or BTC is a worthless currency. Imagine go
> By using Facebook as a hidden service at least it is clearly a matter
> of what I choose to tell Facebook and I don't have to worry about
> someone else spying on the traffic. I agree that in the end that
> boils down to if you trust Facebook or not :)
My main problem with Facebook is that it i
> Why so much negative emotions? :) Dogecoin one of three most famous
> cryptocurrency. Or are you against cryptocurrency in general?
Take a much closer look. This is NOT Dogecoin. This is a completely
different altcoin which uses the name. So join my TorAnonymity network
for great privacy. Tor i
https://www.reddit.com/r/DarkNetMarkets/comments/2lhin9/onymous_mega_thread_upvote_for_visibility/
SR2, Hydra, and Cloud 9 and a few others are currently displaying
notices that they are seized by the FBI in co-operation with similar
terrorist organizations in the fascist union (EU). Pandora and s
> seems to be more shitty opsec than anything else:
>
> https://twitter.com/agl__/status/530404829441449985 : FBI found the
> Silk Road 2.0 server via unspecified means. The admin used his real
> email and IP address to manage it. https://pdf.yt/d/RpyX9_xmapTkhmkb
Because that completely explains
mroq qorm wrote:
> sure, parallel construction is a problem, also in the SR 1.0 case, but
> let's not get ahead of ourselves and call tor into question again
The location hidden services are just ONE of the features Tor provides.
The Tor developers themselves ADMIT that this specific feature i
"The BBC understands that the raid represented both a technological
breakthrough - with police using new techniques to track down the
physical location of dark net servers - as well as seeing an
unprecedented level of international co-operation among law enforcement
agencies."
http://www.bbc.co.uk
> http://www.bbc.com/news/technology-29950946
>
> Does anyone know if this was user or operator error, or
> vulnerabilities in application used that the FBI know about and are
> actively exploiting? Basically does anyone how they managed to take
> so many 'hidden' services?
>
> I can't believe th
https://ixquick.com/do/search
"The Ixquick service does not presently work when used through
proxy/anonymization services such as Tor.
To use Ixquick, please temporarily disable this service. For added
privacy you can always use the encrypted version of Ixquick at
https://ixquick.com/ -- this pro
> That is possible, but I'm not sure I'm fully following.
> Suppose that some "off line" dealer has his phone tapped, and then he
> starts selling through a market like silk road. What of it?
> Why would that lead in any way to finding out who the hidden
> service's owner/admin is
> i'm going to laugh if the "technological breakthrough" is a DoS
> slowing Tor enough you restart it. then they watch to see who (serving
> up the appropriate amount of more traffic out than in) just restarted
> Tor.
> all signs point to modified slowloris with a limited set of suspects.
We can n
> Another way to test is for someone to use perfect opsec (wifi, tor,
> bitcoin, etc), and actually run a number of illegal sites and see what
> happens. Then consider some sites may be allowed to live even if
> actionable, or simply won't be taken down if there are no real world
> links to act on.
> from a few weeks the site spacemarc.it is no longer accessible via
> TOR. My hosting does not apply any filter nor I do it from code.
>
> I do not get any error from my web server (forbidden, timeout and so
> on...) but the Tor Browser (v4.0.1) simply tries to connect for
> several seconds but t
> "Early use of "Xmas" includes Bernard Ward's /History of St. Edmund's
> college, Old Hall/"
>
> adopt an anti-Christ Jews' traditional reference to Christmas? no,
> bad idea.
First of all: You write like a fag and your shits all retarded[1]
Secondly: I prefer just to see Tor-related informati
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> not just you .. the 404 is 403 :
> You don't have permission to access
> "http://www.foxnews.com/404error/"; on this server.
>
> sarc
>
> They probably figured their target audience is lucky their trailer
> park permits DVB dishes, and that anyone
> https://blockchainbdgpzk.onion/wallet has been down since yesterday.
>
> It just says "quota exceeded".
>
> Very annoying especially since you cannot use the non .onion site if
> you are using Tor!
That is actually good news[1] because you should not be using websites
to store your BTC and the
> One other thing they try to protect from is people writing reviews
> for their own businesses. If someone logs into Yelp as the business
> owner and as a reviewer from the same IP, they would make such review
> "not recommended" (previously they made it "hidden" and protected
> with captcha). And
> I have been at a close friend's house recently and his provider is
> CenturyLink (at home I use TimeWarner Cable). I tried to download
> Tor Tails (over BitTorrent) and the Internet literally dropped so I
> closed BitTorrrent, afterwards I launched the Tor Browser Bundle and
> then my computer
> Hi, my name is Jamie, I am from Britain. We need your help TOR,
> recently David Cameron proposed a law (passed) which forces our ISP
> to filter websites containing material which his cabinet deems
> "unsuitable". This includes porn, violence, bulimia and anorexia
That is just the beginning. Ex
same info with slides:
http://rt.com/usa/nsa-target-tor-network-739/
signature.asc
Description: PGP signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> The only solution would be recommending people to run exit nodes from
> home.
>
> Actually I wonder why tor users seem to be convinced it's a bad idea.
> I used to think this IS the point of Tor. If you run exit node from
Yes.
Finding out that websites do not work is great.
Finding out that
> What can we do, as a collective social entity, to put an end to
> this madness? It is not as if we, as Tor users, present any more
> of a load upon their help/fraud/abuse desks than the wider open
> internet as a whole, even when if perhaps adjusted for market share
> of source IP's. So what can
Dogecoin. It's such currency.
> I am currently negociating to publish an article, the first of a few.
> It is about someone with political power in some Easter Europe
> country. The magazine does not want a creative common article as they
> do not want other publications to copy it. Meaning I have
I've got a few like this on https sites today:
"blockchain.info uses an invalid security certificate. The certificate
is not trusted because it is self-signed. The certificate is only valid
for localhost.localdomain"
It looks ze Tor network is under SSL MITM attacks by commie nazi today?
signat
> Ordinary people do not know this word "code" (especially open
> source). They believe that the piper calls the tune. And in fact it
> is very difficult to argue with such a statement without falling into
> the technical details ("code is open")
"code is open" means NOTHING, so sorry - just look
> IBM also develops surveilance hardware for oppressive regimes, no
> surprise they are against free speech and democracy.
> https://www.eff.org/deeplinks/2015/02/eff-files-amicus-brief-case-seeks-hold-ibm-responsible-facilitating-apartheid
IBMs history of providing hardware and support to various
> I realize that a good portion of those nodes are located on judicially
> hard places, but I also wonder if in some jurisdictions it would be
> possible to prosecute the owners of these nodes.
You will have a really hard time taking legal action in a whole lot of
cases, specially those who involv
> Do you know why relay users have increased rapidly? What do you think?
>
> The increase mostly came from Iran and Russia.
> 700K of the increase happend in Iran.
> https://metrics.torproject.org/userstats-relay-country.html?start=2019-03-04&end=2019-06-02&country=ir&events=points
Are those actu
> On 19/05/2019 00:38, jiggytwi...@danwin1210.me wrote:
> It is likely true that many sites that block Tor do so due to the
> detection of a single abuse event. When you have ~2 million
"A single abuse event" isn't it. At all. I've been running Tor nodes
for decades and I support it for various re
49 matches
Mail list logo