I am trying to route all traffic from one specific user on one machine on
my LAN through Tor, but I am having difficulties. There is probably
something I have neglected to configure.
What is special with my setup is that I run Tor on one of my servers
(debian). I would like to keep doing this. I a
On Fri, Mar 4, 2011 at 11:09 PM, wrote:
> Is it even possible? Since everyone is your entry node's IP, if you block it,
> no one will be able to connect to your service.
>
> Some people DoS hidden services to moderate you, making them unreadable.
DoS on the "external" internet seems to be 99% ov
On Wed, Mar 9, 2011 at 2:56 PM, wrote:
> Seems that there are already kind of a convention in the way it is
> written :
>
> - Lines starting with '## ' are descriptions of a block of items
> - Lines starting with '#' are commented items.
> - Items are in the form of 'Item value'
> - Items sometim
On Mon, Mar 21, 2011 at 4:32 AM, Ali-Reza Anghaie wrote:
> I find it curious that ~credibility~ of tor is being called into
> question by some. The source is readily available, the libraries it
> compiles against are readily available, the change logs, code control
> records, etc. are all readily
On Mon, Mar 21, 2011 at 1:59 PM, Joe Btfsplk wrote:
> I've never known Sam to get involved in, or fund something - especially like
> this - * w/o wanting something in return.* Ever. WHETHER or not they make
> known, to anyone, what they want or intend to do. It's been shown for over
> 50 - 60
On Tue, Apr 12, 2011 at 1:33 AM, Mike Perry wrote:
> (blah blah)
> The reason I am discussing this in so much detail here is because I
> believe there is a chance that there are users out there who rely on
> the toggle model and/or their OS Firefox build, and may be confused or
> enraged by the ne
On Wed, Jun 1, 2011 at 1:46 PM, wrote:
> On Wed, Jun 01, 2011 at 05:31:41AM +, krak...@googlemail.com wrote 1.9K
> bytes in 45 lines about:
> : A few weeks ago, there was one that tried to give me a .bin file
> : whenever I tried to visit a non-SSL website, but I haven't had a
> : problem li
On Sat, Aug 20, 2011 at 4:53 PM, Aditya Sharma wrote:
> My university has blocked many sites that i think ought not to be blocked..
> This made me install the tor
> At first it worked and would easily open the blocked sites but then after 2
> days the tor would not connect to its server as if
They will know that you are using Tor, but not what you are doing with Tor.
Check this nice overview: https://www.eff.org/pages/tor-and-https
You can click the buttons and see what everyone knows about you.
On Thu, Jul 24, 2014 at 7:24 PM, Marcos Eugenio Kehl
wrote:
>
>
>
> Hello experts!
> TAI
And since it's not possible to do this right without any leaks due to
software bugs, planted flaws and insiders, the only thing it will lead
to is to make it impossible for the users to verify the decisions
leading up to which servers are bad. The NSA will still get your
precious warnings.
On Thu,
Why do you think they belong to different groups? It's absolutely not
obvious if the colorization is removed. All of your "groups" have a
preceding slope indicating that something started before your limits,
and they seem to be normal variations of a general down slope that
started in 2013.
On Fri
On Wed, Aug 13, 2014 at 12:06 PM, wrote:
> If it's possible for the owner of a hidden service (whether the FBI or a
> regular person) to install malware which grabs visitors' IPs, then what is
> stopping any hidden service owner from doing this?
Nothing is stopping a hidden service owner from d
On Wed, Aug 13, 2014 at 11:56 PM, Aymeric Vitte wrote:
>> As
>> someone who argues against using javascript in any context, I can only
>> say "told you so", but that doesn't really help anyone. :)
>
> No and you are wrong
>From
>https://lists.torproject.org/pipermail/tor-announce/2013-August/
On Fri, Aug 15, 2014 at 5:07 AM, Ben Healey wrote:
> Below is they address changed into numbers.
> Letters changed into numbers starting with a-1 through z-26.
> The numbers are the numbers 1.2.3..
>
> I then added all them together.
>
> Then divided the totals by 2.
>
> Results:
> -
> 8 2
> We have placed MKRAND - A Digital Random Bit Generator, on GitHub, and it
> would be helpful to receive some feedback regarding its potential use in
> the TOR project.
What benefit would it give? What would it replace? This seems to me to
solve a problem that has already solved, but in an obfusc
> After using Tor for some years I realized that third-parties can determine
> what sites I visit when watching my internet activity.
What do you mean by third-parties?
> When I visit hidden services how can they know what site it is or know what
> site I visit that's not on Tor?
Why do you
On Mon, Aug 25, 2014 at 8:22 PM,
wrote:
> I did a new upload to a popular JPG hosting service. Here they are:
> http://i.imgur.com/QAKp7k1.jpg (Zemana log)
> http://i.imgur.com/nJkCQJp.jpg (Zemana version)
> http://i.imgur.com/06ZW0IK.jpg
> http://i.imgur.com/XsbpQ4X.jpg
> http://i.imgur.
On Fri, Aug 29, 2014 at 3:44 PM, Sebastian Mäki
wrote:
> Someone had been downloading a torrent "This Ain't Game Of Thrones
> XXX" via TOR or my wireless network. The law firm Hedman Partners, who
> represent Hustler in Finland seemed to have made the assumption that
> it's ok hustle some money fr
A few years ago, ICANN started to accept suggestions for new top-level
domain names. A friend recently posted a .onion link to me, and it made me
realize that there might be a big problem if a company or organization
other than Tor actually registered .onion and made it work in any browser.
1) Has
On Mon, May 19, 2014 at 7:06 AM, grarpamp wrote:
> Users leaking dns / failing to redirect dns into tor is not a tor problem.
>
I think that's a rather arrogant point of view. If it was not a Tor
problem, .onion would not be needed in the first place. Tor developers do
seem to work hard on makin
On Mon, Jun 9, 2014 at 9:18 PM, Antonio Z wrote:
> I understand that it is not necessary, but I believe that making your
> own ad blocking software would bring more people to tor. It does not
> even have to come with the bundle. It could just be an optional add on
> called, Tor Ad blocker.
>
> Ina
I have been sorting through my mailbox the last few days and stumbled
upon an email from 2012, from this mailing list. A worried user got a
false negative from check.torproject.org because an exit relay sent
exit traffic out on an IP that's different from what was advertised.
However, this made me
Unfortunately he doesn't seem to want to take this further, so the
ruling will stand. It's his choice, but it could be a very bad
deterrent to other potential exit node operators in Austria.
On Wed, Jul 2, 2014 at 10:54 PM, Moritz Bartl wrote:
> On 07/02/2014 12:42 AM, ba...@clovermail.net wrote:
On Thu, Jul 3, 2014 at 5:53 AM, Moritz Bartl wrote:
> On 07/02/2014 11:00 PM, Anders Andersson wrote:
>> Unfortunately he doesn't seem to want to take this further, so the
>> ruling will stand. It's his choice, but it could be a very bad
>> deterrent to other p
On Tue, Jul 8, 2014 at 2:32 AM, Joe Btfsplk wrote:
> On 7/7/2014 6:04 PM, I wrote:
>> As for freedom of speech Australia has none legislated and does have
>> severe laws against sedition.
>> What other developed country can match that for discouraging speech?
>
> Well, 'Stralia is a penal colony,
Wait.. what..
He's suing Tor because it's possible to reach a clearnet website
through Tor2web? Talk about publicity stunt.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Wed, Aug 19, 2015 at 8:43 PM, Alec Muffett wrote:
>
> Hi, I'm Alec, and I am co-author of the Onion RFC draft with Jacob Appelbaum.
>
> Reports of the bogging-down have been greatly exaggerated, and I wish people
> would stop repeating them.
>
> The status of the Onion RFC draft is viewable at
On Mon, Aug 24, 2015 at 10:08 AM, Apple Apple
wrote:
> The problem is most users and developers (including the likes of Linus) do
> not care at all about security but will hit the roof in rage if the system
> is 0.1% slower or this buggy 30 year old Unix application does not work
> anymore.
>
> Is
I couldn't find what they mean with "the Netherlands is home to the
largest number of non-malicious and malicious nodes combined" in
Figure 1 on page 8. What differentiate a "malicious node" from a
"non-malicious node"?
Otherwise it wasn't that bad, but the last paragraph is quite offensive:
"In
On Thu, Aug 27, 2015 at 8:08 AM, CJ wrote:
>
> People using Tor for "bad things" just don't realize how they fuck up
> the whole thing. Not even mentioning "weird contents", just the script
> kiddies running metasploit/other through Tor.
If the realize or not is irrelevant. They don't care about
On Sun, Jan 3, 2016 at 5:52 PM, Nurmi, Juha wrote:
> I released refactored new version of Ahmia search engine :)
>
> It's not finished yet but the main parts are working. Be patient, it's far
> from perfect. It has some performance issues etc.
Seems to work well, except for the annoying "Unfortun
On Tue, Jan 5, 2016 at 8:50 AM, Chris & Julie Forever
wrote:
> Well, if they've had the kind of luck that i've had with the tor nework:;
> then they've made "quiting the tor net", their New Years " resolution". As
> I have.
Is it addictive? Why can't you just quit using it?
--
tor-talk mailing l
On Fri, Jan 15, 2016 at 9:11 PM, juan wrote:
> something considered a 'crime' by the criminal mafia knonw as
> 'government' - and yet the identity of those people isn't
> compromised.
I'm sorry, but it's difficult to take you seriously. If you actually
want anyone to take
On Fri, Jan 29, 2016 at 4:57 PM, Niels Elgaard Larsen wrote:
> I come from a meeting in the Danish ministry of Justice this afternoon,
Why? :)
> 3. How many Danish Tor nodes in a circuit would you be comfortable with?
I can assure you that a lot of countries will have worse data logging
place,
On Sun, Feb 21, 2016 at 7:17 PM, Scfith Rise up wrote:
> I can point you in a direction that I took to accomplish this without having
> to resort to a third party VPN. I am running my own VPN from a VPS and added
> it to my proxychains file. Here is the github for proxychains-ng that I
> highly
On Sun, Feb 21, 2016 at 9:30 PM, Scfith Rise up wrote:
> Mr. Andersson is assuming a lot. There are definitely tried and true methods
> to make purchases online and setup identities for these types of things. At
> the end of the day, yes the VPS provider is the weakest link. But you can use
> o
On 25 April 2017 at 13:12, Lolint wrote:
> I've been making those tests on your website multiple times with the TBB but
> most of the
> time I get a unique fingerprint even when re-doing the test at different
> times with the same
> browser.
This is something worth pointing out. How does the cu
Since my ISP implements carrier-grade NAT[1] (with an opt-out system)
I read a little about it and found something called the "Port Control
Protocol"[2] (PCP). Unless I am mistaken, and *if* my ISP implements
it, it seems that it could enable me to run a Tor relay on one of the
shared IP numbers.
On Wed, Jul 5, 2017 at 1:35 PM, Leonid Evdokimov wrote:
> On Tue, Jun 27, 2017 at 02:37:02PM +0300, Leonid Evdokimov wrote:
> > there is ~120 days gap after 3rd draft approval before Tor being
> outlawed.
>
> Small update. I consider that statement it technically wrong now :)
>
> Russian Federal
On Thu, Nov 9, 2017 at 11:23 PM, George wrote:
> Franps:
>> https://www.networkworld.com/article/3236064/servers/minix-the-most-popular-os-in-the-world-thanks-to-intel.amp.html
>>
>> You might not know it, but inside your Intel system, you have an
>> operating system running in addition to your m
I recently went through the mailing list archive to catch up on events
in the Tor world, and one thing that worried me a lot was the June 20
police raid on Zwiebelfreunde[1].
According to the blog entry, the initial request for returning the
equipment was denied. Are there any further updates to t
On Mon, Nov 12, 2018 at 1:09 PM Maria Xynou
wrote:
> As of 1st July 2018, Uganda has introduced a new OTT (Over The Top) tax
> - commonly referred to as the Social Media Tax - which requires people
> in Uganda to pay taxes to the government in order to access several
> online social media platfo
On Wed, Apr 3, 2019 at 10:47 AM grarpamp wrote:
> Anyhow...
>
> The last actual use case warning or disclaimer on torproject.org
> was removed by or on October 10 2010. Some historical bisects..
>
> Site v1
> first, domain 1998-01-29
> http://web.archive.org/web/19981212031609/http://www.onion-rou
Having had little luck with my question posted on
tor.stackexchange.com[1] I will try here, perhaps there are more
"eyes" on the mailing list.
Under "Criteria for rejecting bad relays" on the Network Health Team's
wiki[2] there is a list of things that makes a relay be "malicious".
Everything ther
44 matches
Mail list logo