Hi tagnaq, from what I was aware of it's in there...
https://trac.torproject.org/projects/tor/ticket/3391
That said, I'm not quite sure where it's located.
On Mon, Feb 20, 2012 at 3:13 PM, tagnaq wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi,
>
> I used to install packages fr
> I just thought I would notify the list that leaseweb is not a safe place to
> host a Tor exit node.
Hi. Please add this to...
https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
Reports like this are what it's there for.
___
tor-talk mailing
> I am interested in overtaking the project TorVM.
I'm not sure what you mean by 'taking over' the project. Besides
having a copy of the source archived in svn we aren't associated with
it.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://
> Bytes sent/received stats as captured in the tor log are not
> persistent across service restarts - every time Tor exits, the it
> starts counting from zero.
>
> What's the best way to keep aggregate Tor bandwidth usage statistics
> for my relay?
The following is a simple script for using TorCtl
> Are there any working Google scraper alternatives
https://startpage.com/
> ... or some alterantive actually
> usable Tor-friendly search engine out there?
https://duckduckgo.com/
https://ixquick.com/
___
tor-talk mailing list
tor-talk@lists.torprojec
> Would you use Tor supplied by these people?
Personally no. But if you're using a whole image that you don't trust
then a trojaned tor should be the least of your worries.
> How would you ever know for certain?
https://www.torproject.org/docs/verifying-signatures.html.en
But that said even if
> Nope, all of them do
Incorrect. With Duckduckgo JS is optional. This wasn't always the
case, and they changed it to make people like us happy.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo
Hi Rajat. I'm not following - Orbot is a project but it doesn't have
any ideas listed in the section below it. This is because the
project's maintainers (Guardian) probably won't be taking part in GSoC
this year. -Damian
On Wed, Mar 21, 2012 at 10:32 AM, Rajat Jain wrote:
> Hi there,
> I have bee
> Are you sure that the projects's maintainers won't be participating this
> year ??
I'm not positive, that is why I'm cc-ing the project maintainer
(Nathan). But he has given indications that they won't be taking part.
___
tor-talk mailing list
tor-talk
> This year wlan slovenija is again participating in Google Summer of
> Code
This isn't especially relevant to tor, but what *is* relevant is that
we're participating in GSoC too. ;)
https://blog.torproject.org/blog/tor-google-summer-code-2012
Interested
> Starting the Anonymous Relay Monitor (arm) which I run as a front-end to
> keep check on things, it complains with
> the following: Unrecognized authentication type: SAFECOOKIE.. And yes I do
> have CookieAuthentication as a setting in my torrc, so what else needs to
> be done..?
'Safe cookie' i
Sorry about this, it's actually my bad. Code that I wrote for torctl
and copied into arm raised an IOError when it encountered an
unrecognized authentication method. According to Robert you should
have both SafeCookie *and* normal Cookie authentication but the former
is making arm choke.
Fixed thi
> SafeCookie is making Tor choke with or without the normal Cookie
> authentication setting..
Evidently telling tor to use cookie auth makes it accept both normal
and safe cookie auth, triggering this issue.
> Fantastic.. However though, how do I get it to work again.. I used to have a
> pkg inst
> Hello guys,
>
> I just installed Tor-Arm on debian; of which I have used many times before
> and love the project. (http://www.atagar.com/arm/).
>
> I cannot recall what the key is to access the menu interface. Can anyone
> tell me?
Hi Matt. The menu key is 'm', it's mentioned below the header
> My question is how do I get around this running just Tor with ARM on a
> terminal only server..
Hi Eric. Arm should only be prompting you for a password if tor is
requiring it to authenticate. Couple questions...
* Do you have a 'HashedControlPassword' in your torrc? If so then
that's why. If n
Hi all. A new release of arm [1] is now available which includes
numerous fixes of mounting importance [2]. In particular this corrects
several issues around arm's connection panel, terminal glitches due to
disruption of the curses module by readline [3], and incompatibility
with tor's new developm
> Try excluding {??}. That should do it for you.
I'm not entirely clear how Maxmind allocates the codes, but depending
on your goal you might want to also exclude {A1}, {A2}, and {O1}...
https://www.maxmind.com/app/iso3166
___
tor-talk mailing list
tor-t
Hi Eric. Sorry to hear that you're having troubles after the upgrade.
> => File "/usr/share/arm/cli/menu/actions.py" line 8 in
> import cli.wizzard
> => File "/usr/share/arm/cli/wizzard.py" line 9 in
> import random
Did you copy this over by hand? There's a "wizard.py" module, but no
such thing
> Is his forum still the temp defacto beta unofficial Tor forum (re #3592)? It
> has 380 members but no posts?!
Yikes, I didn't realize that people had signed up to it! There's other
forum plans in the works, though Andrew is the only person who knows
the details. I'm happy to take mine down if
> When using Microsoft Outlook Web App with a university account, with the Tor
> browser I get kicked out after a few minutes and have to log back into the
> mail account. This happens repeatedly, and am curious what is the reason.
Tor changes the circuits that you're using every ten minutes, w
> i wanted to ask if there is a mailing list and/or some notification
> schema to know when a new Bad Relay is detected and blocked:
> https://trac.torproject.org/projects/tor/wiki/doc/badRelays
Hi naif. Nope, the usual process is...
- Someone reports a bad exit on tor-assistants@.
- That email si
> If you just care about the first step then there's a tor-exitscanner@
> list
Oops, correction - didn't mean the tor-assistants@ reporting step. The
SoaT exit scanners report their results to tor-exitscanner@ so it's a
firehose that's mostly false alarms. I'm pretty sure that at present
Aaron is
> Is part of this network load also related to cached-descriptors periodic
> update?
Some. Relays by default won't fetch server descriptors but all clients
do. See the following for an effort to decrease the load...
https://gitweb.torproject.org/torspec.git/blob/HEAD:/dir-spec.txt#l1042
__
> Is there any option to make this visible the same way in ARM ?
Hi Toby. On the connection panel (page two) try pressing 'c'. If you
press 'h' to get the help you should see...
c => client locale usage summary
... hope that's what you wanted! -Damian
_
> BandwidthRate is 20 KB
That is the very minimum bandwidth rate. Circuits are picked
heuristically based on the available bandwidth so by setting it to
such a tiny value you'll be largely unused.
___
tor-talk mailing list
tor-talk@lists.torproject.org
h
> I think it must be the option, seems to be bridge specific as I cannot see
> it on my normal relay.
Yup. It only shows up if you're either a bridge or guard since those
are generally the only positions where you'll see client traffic.
> Result is: "Usage stats aren't available yet" (after 2 d u
> Who knows about Advanced Onion Router?
>
> http://sourceforge.net/projects/advtor/
http://archives.seul.org/or/talk/Oct-2010/msg00026.html
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor
> I have try to get the fingerprint ($ with 40 caracters) of the "Unamed"
> nickname , with no success,
> I think there is a way to calculate it, but i don't how to do that ?
>
> Does someone know how to do that ?
Hi Alex. I'm not entirely sure what you're trying to ask, but if
you're wondering h
Hi Jiang. See "SocksPort" on...
https://www.torproject.org/docs/tor-manual.html.en
The browser bundle sets it to 'auto' to avoid port conflicts. You can
set it to a static value in your torrc. That said, if you're still
trying to script against tor then I'd suggest not using the browser
bundle. It
If you use the cached-consensus then why not just set
'FetchUselessDescriptors 1' in your torrc?
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> Can anyone tell me what mechanisms we (or the Tor Project members)
> have in scanning for malicious exit nodes. Such as nodes that are
> manipulating DNS requests, stripping SSL, etc. I know of the SOAT
> project from Mike Perry but the last I heard there was a GSOC dev
> working on the project.
Hi Lunar. Glad that you're finding stem to be useful!
Sathyanarayanan suggested putting together a page with stem examples
(https://trac.torproject.org/8322). If you wouldn't mind check_tor
would be perfect for that. Some more inline comments would be nice,
but otherwise it's a fine script. :)
>
> 1. Specify the time interval between identity changes.
Set the MaxCircuitDirtiness option in your torrc...
MaxCircuitDirtiness NUM
Feel free to reuse a circuit that was first used at most NUM seconds
ago, but never attach a new stream to a circuit that is too old. For
hidden services, this app
Roc Admin, glad you're interested in bad relay detection!
> I'm working on an updated version of SnakesOnATor (SOAT) that was used
> to monitor the Tor network for bad exit nodes.
Does this mean that you're planning to expand the SoaT codebase? Write
a revised version? If the project is going to
Hi all. After eighteen months of work and a number of delays rivaling
that of the Big Dig I'm pleased to announce the initial release of
stem!
For those who aren't familiar with it, stem is a python controller
library for tor. With it you can write scripts and applications that
interact with your
> 1. Python (local machine) proxy to access hidden services without
> installing TOR on the machine.
>
> 2. DNS resolution via TOR, without installing TOR.
>
> 3. Maybe, a Python proxy to create hidden services without installing
> TOR. This point could be detrimental to TOR ecosystem, nevertheless
Interested in coding on Tor and getting paid for it by Google? If you
are a student, we have good news for you: We have been accepted as a
mentoring organization for Google Summer of Code 2013!
https://www.google-melange.com/gsoc/homepage/google/gsoc2013
https://www.google-melange.com/gsoc/org/goo
> That is, if I do indeed have a bizarro use case, and can't talk about it, as
> we were arguing about, I can still use the "badexit" labeled nodes as I see
> fit, yes ? Or do you drop badexits out of the directory after some amount
> of time ?
Yes, it just effects the defaults. As a client you c
y .. list archives, etc.
>
> See below:
>
>
> On Tue, 22 Feb 2011, Damian Johnson wrote:
>
>>> That is, if I do indeed have a bizarro use case, and can't talk about it,
>>> as
>>> we were arguing about, I can still use the "badexit" labeled
Hi Alexander. Thanks for running a relay!
> If yes, I wanted to ask if anybody knows a way to check every outgoing TCP
> connection for connecting to *.sinkhole.shadowserver.org and dropping it
> if needed.
I haven't seen any complaints about this with Amunet. The exit policy
doesn't accept hostn
> Would it make me a Bad Exit if I would block these hosts with iptables
> instead?
That would be up to the authority operators, but probably not. If you
have contact info set on the relay then we'd ask what's up before
setting the BadExit flag.
Blocking destinations via iptables is definitely le
Hi, the next release of arm is now available. This one was focused on
a full rewrite of the connection panel, improving its maintainability,
performance, and (best of all) features. When rendered, the panel's
baseline cpu usage is less than half of its previous incarnation,
along with providing far
Are you basing this off connection results (netstat, lsof, ss, etc)?
If so, you're probably being confused by directory fetches which are
done over 1-hop circuits to directory mirrors. If you'd like to dig in
further then I'd suggest giving arm a shot [1][2] - this will attempt
to correlate the con
Thanks, fixed in the trunk. -Damian
On Thu, Apr 7, 2011 at 6:19 AM, tagnaq wrote:
> arm version 1.4.2.2 (released April 6, 2011)
>
> typo in the manpage:
> -v, --verion
> provides version information
>
>
> ___
> tor-talk mailing list
> tor-
Not safely:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#WillTorbuttonbeavailableforotherbrowsers
On Sun, Apr 17, 2011 at 5:06 PM, wrote:
> Thanks for the info. Does it only work with Firefox? Can I use it with
> Internet Explorer?
>
> Thanks in advance.
>
> Or
> That's the reason for which it would be really nice to see tor2web
> concept directly implemented in Tor, in order to support the diffusion
> of anonymous publishing capabilities.
You still haven't answered intrigeri's question - in what way are you
suggesting that tor2web is "implemented in Tor
> Hi, it seems that there is no packages available for Natty yet..
>From Natty on Tor should be available from the main Ubuntu repositories:
https://bugs.launchpad.net/ubuntu/+source/tor/+bug/689188
___
tor-talk mailing list
tor-talk@lists.torproject.org
> Does this mean all clients are using the same list?
No. There's a set of relays with the 'guard' flag and your client
picks three at random from this pool.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin
Ack! Sorry, mistype - yes, it is the same _pool_ but you make a random
selection so not everyone uses the same guards. -Damian
(sorry about the extra email, shouldn't have taken a moment longer
before hitting send)
___
tor-talk mailing list
tor-talk@list
Never heard of them. If it can talk to the control port to send a
NEWNYM signal then yes. But in the unpleasantly likely event that this
is for SEO or the like, please keep in mind that usually a new
identity != new IP and circuit creation places a high burden on the
network.
-Damian
On Tue, May
> I am not sure I know how to go about that nor do I know what a NEWNYM signal
> is.
It's a local socket, which you'd connect to like the following with python:
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((controlAddr, controlPort))
As for NEWNYM, see the following:
https://gi
This is provided via the control port so here's three options...
- In Vidalia, on the bottom of the map page, it has a section called
"Connection" with comma separated lists of relays in your circuits.
http://img.informer.com/screenshots/3/3310_2.png
- Arm shows this on the connections page. Pres
> which is the preferred mailing list?
tor-dev would be best. Mike is the author and maintainer of the
package, and I do a little work with it too. -Damian
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailm
> I'd like to give guys access to their Tor instance so they can view what
> their current used relays are at the moment (vidalia map), without
> giving them the possibility to actually issue commands that modify any
> settings.
> Looking through the manpage of Tor, I didn't spot something to do th
> Is there a trac ticket for this feature request?
Not that I'm aware of. It was mentioned in:
https://lists.torproject.org/pipermail/tor-dev/2010-April/000198.html
"> Second, Jake made a great point that at present if a malicious party
> gets ahold of the control port then the relay's quite effe
Hi all. A new release of arm (http://www.atagar.com/arm/) is now
available. This completes the codebase refactoring project that's been
a year in the works and provides numerous performance, usability, and
stability improvements...
* Relay Setup Wizard
Setting up a relay can be tricky for new user
> Alas, There is no Windows version. Any plans for one in the future?
https://trac.torproject.org/projects/tor/wiki/doc/arm#Windows
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> What's it take to convince Vidalia to talk to a Tor that the Vidalia didn't
> start
To start with does the tor instance open a control port?
> My interest here is in monitoring the bandwidth use by Tor. I run Tor as a
> service on headless Ubuntu Debian Linux.
For bandwidth monitoring on he
Lets start with: what OS and do you have root on this box? If it's, for
instance, a debian based distro then that makes the setup a lot nicer.
On Wed, Aug 17, 2011 at 9:57 AM, William Wrightman <
williamwright...@yahoo.com> wrote:
> I have a couple of questions about setting up a Tor relay. I've
H
> or perhaps the best way to run it is via cron.
>
> --- On *Wed, 8/17/11, Damian Johnson * wrote:
>
>
> From: Damian Johnson
> Subject: Re: [tor-talk] Setting up a Tor relay on the hosting server.
> To: tor-talk@lists.torproject.org
> Date: Wednesday, August 17, 2011, 11:23
> The other problem with the setup is passwords can only be letters or numbers,
> no special characters.
Is there a limit on the password length? If not then the recent xkcd
comes to mind...
http://xkcd.com/936/
___
tor-talk mailing list
tor-talk@lists.
Nope. The geoip db distributed with tor only narrows down by country so
you'll need to feed the exit ips into one that's more precise. There's also
a small chance that a relay's ip differs from where you'll egress so you'd
need to check for that too if it's important. -Damian
On Wed, Sep 14, 2011
Hi all. A new release of arm (http://www.atagar.com/arm/) is now
available. Besides the normal batch of bug fixes and minor features
this includes an interactive interpretor for raw control port
access...
http://www.atagar.com/arm/images/screenshot_interpretor_full.png
http://www.atagar.com/arm/rel
Done and good luck. :)
-1 for the gpg hassling. Worst case scenario is an evil Moritz
impostor puts out a fair bit of effort to harvest some email
addresses. Oh nos!
If he wanted to sign his messages then fine, but this is hardly critical.
___
tor-talk
> how can Tor be configured to avoid using "Italy"?
In your torrc use the following options:
ExcludeExitNodes {it}
StrictNodes 1
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi Fabio. What you're describing is a sybil attack. An attacker
definitely *wouldn't* get a majority of the exit traffic for those
destinations - clients weigh relay selection by heuristics reported by
the bandwidth authorities. Those authorities take a long time to warm
up to new relays, so it wou
Hi Stephan. This is the first that I've heard of connection panel
issues related to upgrading. Here's some things to check...
- When connection resolution fails several times arm falls back to
another connection resolver, logging a notice as it does so. Do you
have any connection related log messag
> For what it's worth, I don't think this is actually related to the arm
> upgrade, I would guess that Stephan may have also recently updated to
> Tor 0.2.3.9; when I upgraded a node to 0.2.3.9 I also found that the
> connections panel behavior changed
Hmm, I wouldn't expect that. I'll try running
> I am not interested in reopening the debate, but now that some time has
> passed, I *would* like to find out if this policy was ever codified and
> enacted ?
Yes, though neither of the relays that were flagged for that reason
are still around.
https://trac.torproject.org/projects/tor/wiki/doc/ba
Thanks all for the report. Reproed the issue and it's caused by a new
feature tor introduced...
https://trac.torproject.org/projects/tor/ticket/3313
https://gitweb.torproject.org/tor.git/commitdiff/f79a75f59731eab85c019c41827c0c0e89d90498
... uggg.
You can work around this by setting "DisableDebu
> The resolver dump is working for proc, netstat and lsof (root and
> debian-tor). I had to run the script with LANG=C, or it would not work in my
> German locale. But running arm with LANG=C does not change the problem.
Hi Stephan. In your case this definitely sounds unrelated to the tor
change
> Just for your information:
> I have running TOR on debian 6 and ubuntu 8.04. Only on ubuntu 8.04 the
> connection list is empty.
Thanks, Stephan and I have been talking off-list and it sounds like
there's a few gotchas braking the connection resolution besides the
tor change...
- proc contents o
I'm not too eager to jump into this discussion but just a thought:
what about making this opt-in via Tor Weather? Relay operators already
subscribe for status notification emails there, so port scan results
could be another type of notice. -Damian
___
tor
> I think the best approach is to send off an email with the new proposal to
> all node operators.
Please do not send a mass-email to all relay operators, especially
while you're still in a planning phase. This seems pretty obvious, but
I wanted to make sure that it was clear - relay operators sha
Hi all. As per ticket 4788 [1] we'll soon be removing relays that are
out of date and no longer safe to run, which includes anything older
than version 0.2.1.30. When I last checked this included 257 relays
[2] and I've already notified the 107 of those that had contact
information available.
If y
> What iptables rules have to be used to forward everything through Tor?
I've never tried it but I'm pretty sure this is what you're looking for...
https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy
___
tor-talk mailing list
tor-talk@list
The wiki articles vary widely in terms of the TLC they get. I have a
few that I watch out for (arm [1], stem [2], and bad relays [3]) and
the good/bad isps gets a lot of activity [4]. The rest have mostly
collected dust since they were written.
> There is no quality policy.
Correct. If you care a
> Tor people, is there some kind of "automagic family"
> for EC2 nodes?
Not at present. However, Tor Cloud is only bridge instances so a
family wouldn't matter (they're only used for the first hop).
___
tor-talk mailing list
tor-talk@lists.torproject.org
Hi Bron. What in particular are you trying to do?
On Wed, Jul 9, 2014 at 7:01 PM, Bron Taylor wrote:
> Dear All,
>
> I am running a Tor client on my system and deveploping a software
> with Stem library. I found that Tor didn't download a whole list of
> consensus to local, but a cac
it claimed.
> Therefore, I am looking forward to the way to get the whole list
> containing all of the exit nodes for my program to have more chance
> for choosing the most suitable exit node. Thank you.
>
> --
> BR, BT
>
> On Fri, Jul 11, 2014, at 12:38 PM, Damia
>Thanks for your kindly explanation. I have tried method c. you
>mentioned, and found that the returned exit node list with specified
>exit policy is not as the same as the result i obtained by quering
>"https://check.torproject.org/cgi-bin/TorBulkExitList.py";. The
>mismatch of
Hi grarpamp. Actually we do have a rudimentary Sybil checker and it
*did* pick up on those relays back in January...
https://lists.torproject.org/pipermail/tor-consensus-health/2014-January/003954.html
We had some internal discussions about them but the thread lost
momentum before they were flagg
>> I believe that the mere fact that a relay was blocked (via BadExit
>> or reject) can be published.
>
> Will dir auth ops make the list of rejected relays including its
> reason for removal available to the public for transparency?
We did this for a time...
https://trac.torproject.org/projects/
> I think this is a really important point.
>
> I'm usually on the side of transparency, and screw whether publishing
> our methods and discussions impacts effectiveness.
>
> But in this particular case I'm stuck, because the arms race is so
> lopsidedly against us.
>
> We can scan for whether exit
>> Does anyone want to argue against making who we flag and why
>> public?
>
> Would be great to also hear about
>
> "Does anyone want to argue against making who we reject
> (AuthDirReject) and why public?"
> (if the above question doesn't include that already)
It does. Rejection is just another
Hi Sebastian. Generally I don't worry about a transient error like
this since it could be due to, say, tor26 restarting for maintenance
or to upgrade. If we consistently get notices then I notify the
respective directory authority.
Cheers! -Damian
On Sat, Aug 16, 2014 at 1:56 PM, Sebastian G.
> Attention Damian Johnson ;)
>
> How about "Consensus fetched from ..." or "Consensus downloaded from..."?
>
> (If that requires discussion I happily open a ticket)
>
> I don't see any benefit (at first glance) to change (and most likely
>
I suppose another updated 'tor ecosystem' presentation could be an
option (*). Question I've learned to ask for presentations is: what is
your goal? What are you hoping to get out of this? Recruit volunteers?
Dispel some myth? Entertain?
Cheers! -Damian
* For those who aren't familiar with it, th
> This is to the side of your main point (with which I am largely in
> agreement), and I mean this in the most serious and respectful way
> possible: can you point to statistics, metrics, data that support this
> point?
>
> I suspect the opposite is true, but I very much want to know the real
> fac
https://trac.torproject.org/projects/tor/ticket/13905
On Fri, Dec 5, 2014 at 9:36 PM, Ch'Gans wrote:
> Hi there,
>
> Is it just me or atlas and globe are both down?
> They all give me a backend error message.
>
>
> Chris
>
> --
> QtCreator/qmakeparser.cpp:42
> // Parser ///
> #def
> Dear all,
>
> Many of you by now are probably aware than I run a large exit node
> cluster for the Tor network and run a collection of mirrors (also ones
> available over hidden services)...
Thanks Thomas for the head's up! I'll forward this to the dirauths so
we can get these relays dropped fro
> I could look this up via the trac, but I suspect someone on the list
> "just knows" the answer.
Hi Virgil. Is there something in particular you're wondering? Spec
changes can be perused on...
https://gitweb.torproject.org/torspec.git/log/
The dir-spec is on version 3, so the transition from v2
> Hey,
>
> This looks like a pretty good start so far! I'm looking forward to seeing
> further development on this. For what it's worth, I think there were some
> other people vaguely hacking on Tor ControlPort libraries in Go; perhaps they
> will speak up and you all can work together. :)
>
> Th
Yup, longclaw is down. Its operator has been notified...
https://lists.torproject.org/pipermail/tor-consensus-health/2015-January/005500.html
On Thu, Jan 15, 2015 at 12:42 PM, l.m wrote:
> After missing signature it's now not listed in current consensus. Did
> I miss some event?
>
> -- leeroy
>
And please get involved early! We particularly love it when folks get
involved before GSoC to help out and show how awesome they are. ;)
On Fri, Jan 16, 2015 at 4:54 AM, Nick Mathewson wrote:
> On Thu, Jan 15, 2015 at 11:46 PM, Akhil Koul wrote:
>> Hello
>>
>> I am a third year undergrad Comput
Hi Anonymous Kyoto. I'm having a tough time following this thread but
it's an understandable point of confusion, the bandwidth stats are
indeed odd. For Stem's part it just uses the same terminology as the
directory specification...
https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n380
Do you want to make Tor even better, and get paid in the process? If you are a
student, we have good news for you: the Tor Project is pleased to announce our
first Summer of Privacy!
https://trac.torproject.org/projects/tor/wiki/org/TorSoP
Thanks to Google, over the last eight years Tor has men
On Wed, Aug 7, 2013 at 6:09 PM, LEE wrote:
> I found that there is a blacklist in Tor system
>
> I guess blacklist is like prison of onion routers. in other world, if
> Tor system detect some onion router runs
>
> abnormally, Tor system put that router in blacklist and never use again.
>
> Is this
> Hi,
>
> here:
> https://lists.torproject.org/pipermail/tor-consensus-health/2013-September/003506.html
>
> DocTor doesn't say entries.
Thanks Sebastian, fixed...
https://lists.torproject.org/pipermail/tor-commits/2013-September/061598.html
> (did not know where to put this)
A trac ticket or i
Hi all. After seven months of work I'm pleased to announce Stem's 1.1.0 release!
For those who aren't familiar with it, Stem is a Python library for
interacting with Tor. With it you can script against your relay,
descriptor data, or even write applications similar to arm and
Vidalia.
https://ste
1 - 100 of 119 matches
Mail list logo