order to
proceed. Is there an error in the instructions for windows or am I
doing something wrong?
Jon
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
an error " unable to
> find QtCore4.dll " ( which shows in the directory ) after I have
> clicked on Vidalia. I never get the GUI for vidalia in order to
> proceed. Is there an error in the instructions for windows or am I
> doing so
lose to 1G.
My guess is you may have some other programs running in the background
or other programs you may be using that is causing the ram to rise and
using up your resources.
Jon
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Wed, Apr 4, 2012 at 4:51 PM, Maxim Kammerer wrote:
> On Wed, Apr 4, 2012 at 18:26, Andreas Krey wrote:
>> Normal people in developed countries who use tor to
>>
>> a) provide the background noise for the users that need protection,
>>
>> b) use it as a way around lack of WLAN security or oth
On Tue, Sep 18, 2012 at 8:44 AM, Raviji wrote:
> Dear list,
>
> I wonder if I can setup a box which provides complete traffic enforcement
> through tor.
> The tails project has encouraged me to work in that direction. With the
> tails documentations and with
> some online guide like
>
> https://c
an/listinfo/tor-talk>
>
I tried thru Tor and also was unable to connect. I got a 404 error message.
However I was able to connect with out Tor.
Interesting?
Jon
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
x27;s about time to keep the posts on topic, related to Tor issues
and get off the sex issues. If your that gung ho on sex, start your own
forum and mailing list.
The past several posts relating to sex, child exploration, sex, etc imo,
does not belong on this mailing list.
Jon
___
as noted in other posts, it all depends on the jurisdiction you are in
and how much of what you really want to do. Or how much you want to push
the limits of your location ie: country
Jon
___
tor-talk mailing list
tor-talk@lists.torproject.org
https
orrect, that might be very true in Germany , possible in Austria and
other Europe jurisdictions. However, I do not believe it is that way in
the United States and I am sure there are other jurisdictions that most
likely are not that way. Just imo
Jon
__
On Thu, Nov 29, 2012 at 4:11 PM, grarpamp wrote:
> >> Running an exit node from home DSL or Cable is bad idea. One must look
> >> for a Tor friendly ISP and have balls made of steel!
>
> ... ISP[/hoster] and[/or] have ...
>
> > However, I do not believe it is that way in
> > the United States
>
>
I started the Tor alpha yesterday, and now have numerous instances of "
" Bug/Attack: unexpected sendme cell from client. Closing circ."
Anything to be concened about
Jon
___
tor-talk mailing list
tor-talk@lists.torpr
> http://www.pctipp.ch/downloads/dl/35905.asp
>
>
I am not sure where you got that date of 1/24/12 for the release of Tor
0.2.3.25 at:
TorVersion Tor 0.2.3.25 (git-17c24b3118224d65)
LastWritten 2012-01-24 09:17:26
however, Roger released Tor 0.2.3.25 on 11/19/12 and posted it on 11/
g
and keep those of us interested up to date.
Again thanks for all the hard work and looking forward to further issues.
Jon
On Sat, Jul 6, 2013 at 4:03 AM, Sebastian G. <
bastik@googlemail.com> wrote:
> 03.07.201
rmatting. I suspect also if you are using something
else different, the format is probably different from the torrc file
format. In either case, you can go into the file and make the
corrections manually, and they should then stay.
At least it did for me when it had the wrong format. I just chang
On Tue, Apr 5, 2011 at 7:52 AM, Gijs Peskens wrote:
< snip >
> I would however add a disclaimer that I don't want it to be used for
> childporn/snuff-stuff (or other things of extreme questionable morals) and
> that I count on the honesty of the users to stay within these bounds.
>
< snip >
>
>
On Wed, Jun 1, 2011 at 11:54 AM, kamyar fils wrote:
> ..seems the site is down,another reference?
>
> On Tue, May 31, 2011 at 11:41 AM, Robert Ransom
> wrote:
>>
>> On Tue, 31 May 2011 09:46:07 +0330
>> kamyar fils wrote:
>>
>> > Does anybody know what kind of Encryption TOR uses for encrypting
On Thu, Jun 9, 2011 at 9:41 AM, David Carlson wrote:
> Hi,
>
> I just tried to access a few IRC channels on a couple of different IRC
> servers (gnone.org, gimp.org, and their associates)and they all are
> giving me this same message:
>
> *** Banned: Open proxy or TOR (auto-detected tor-irc.dnsbl.
On Thu, Jun 9, 2011 at 11:33 AM, David Carlson wrote:
> On 6/9/2011 10:11 AM, Jon wrote:
>> On Thu, Jun 9, 2011 at 9:41 AM, David Carlson
>> wrote:
>>> Hi,
>>>
>>> I just tried to access a few IRC channels on a couple of different IRC
>>> ser
On Mon, Sep 26, 2011 at 5:36 PM, William Wrightman <
williamwright...@yahoo.com> wrote:
>
>
> --- On *Mon, 9/26/11, Olaf Selke * wrote:
>
>
> From: Olaf Selke
> Subject: [tor-talk] blutmagie exits shut down
> To: tor-talk@lists.torproject.org
> Date: Monday, September 26, 2011, 2:25 PM
>
> My fel
My question would be this... does comcast allow their customers on
residential accounts to run servers? I know with some of the cable
accounts on some of the other cable networks, servers are not allowed.
Yes, they will disconnect your service if it is against their TOS.
IMO: For a lot of people,
Oct 28 07:51:21.106 [Notice] Tor v0.2.3.6-alpha
(git-47dff61061f4bfc2). This is experimental software. Do not rely on
it for strong anonymity. (Running on Windows 7 Service Pack 1
[workstation])
Duplicate call to connection_mark_for_close at command.c:1077 (first
at command.c:1011)
__
On Fri, Oct 28, 2011 at 3:23 PM, Roger Dingledine wrote:
> On Fri, Oct 28, 2011 at 03:09:38PM -0500, Jon wrote:
>> Oct 28 07:51:21.106 [Notice] Tor v0.2.3.6-alpha
>> (git-47dff61061f4bfc2). This is experimental software. Do not rely on
>> it for strong anonymity. (Running
On Sun, Nov 6, 2011 at 7:57 PM, Moritz Bartl wrote:
> Hi,
>
> Thanks to a new deal at www.axigy.com (Thanks! They're great!), we now
> have a shiny dedicated Gbit/s exit with a Sandy Bridge CPU (Quad Xeon
> E3-1230). Details on the setup steps I performed to enable AES-NI are
> documented at
> htt
ide the necessary fixes."
>
Just for general info. I had been using Win 2000 for a bridge server.
When I went to update with the Videlia package, It would not execute
telling me that something to the effect it wasn't being updated
because of out of date and only the Expert package would work ( or
something like that, it has been several week now ).
I installed the Expert package and it was was working fine for bridge
usage. However I did get rid of W2K and went to another Win OS.
For me, it was still working approx 6 weeks ago on W2K.
Jon
So I tried to see
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
a dedicated Tor relay
is not cheap. So kudo's to those that are able to run their dedicated
relays from home on their own expense. Adding that it is not said
enough, if it were not for the individual relays from home, I don't
believe that there would be as many relay nodes as we have now.
Thank
On Mon, Jan 9, 2012 at 8:50 AM, Mine Yahah wrote:
> Tor is blocked in IRAN ,HOW help us.
> ___
>
My last bridge info showed users from Iran getting on Tor.
When did you notice that Iran had blocked Tor ag
On Wed, Jan 11, 2012 at 5:49 PM, skep wrote:
> Hi,
>
> I've put up some graphical world maps of the tor user to internet
> population per country ratio. Tor user statistics are from
> https://metrics.torproject.org/users.html and the internet pop. per
> country data from the world factbook site (l
On Wed, Jan 11, 2012 at 5:49 PM, skep wrote:
> Hi,
>
> I've put up some graphical world maps of the tor user to internet
> population per country ratio. Tor user statistics are from
> https://metrics.torproject.org/users.html and the internet pop. per
> country data from the world factbook site (l
I am wondering with the increase of number of new relays and exit nodes how
this might be affecting the other ( exisiting ) relays and exits?
I have noticed over the past several months that the amount my exit relay
was being used has drastically dropped as the new relays and new exits have
come o
ng me it in
> English even though the browser preferences are for English. Is that
> not getting passed through or is Google that broken?
>
> Regards,
> /Lars
>
>
I just tried in english and no no issues accessing it
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.
Are the Atlas site down for upgrades or repairs? Any idea how long they
will be down?
Tnks,
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-contact-lists-washington-post-reports/
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Another article from the Washington Post may be interested in.
*http://tinyurl.com/lcdas97
*
*
*
*Jon
*
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
ee the breadth of sites
that are either outright blocking tor, plus those which put up some
captcha/human check (and what methods are being used).
-Jon
> --
> "Totally trivial. Famous last words."
> From: Linus Torvalds
> Date: Fri, 22 Jan 2010 07:29:21 -0800
--
j...@openi
%.
Also the TLS write overhead on the non-exit relay is showing 8% - 13%. The
exit relay was showing 6% - 8%.
Is this normal? The only thing that has changed is going from exit relay
to a non exit relay.
Thanks,
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change
>
>
I can access it directly, no problems...
I can not access it thru TBB. I got same message " Access to Website
Blocked"
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
Thanks for posting the stats, Olaf. To me they are very interesting
Jon
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torpro
On Thu, 2013-11-28 at 15:53 -0500, Moritz Bartl wrote:
> On 11/28/2013 06:24 PM, secure...@hushmail.me wrote:
> >> https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs lists
> >> quite a few ISP:s in various countries and a short note on what
[snip]
>
> For a non-exit relay, I would not b
Guardian Project did a ton of experimenting with this in late 2012:
https://guardianproject.info/2012/12/10/voice-over-tor/
On Wed, 2014-02-12 at 13:09 -0500, Dedalo Galdos wrote:
> Just made some searching about this issues, I found two interesting links:
>
> http://community.skype.com/t5/Windo
ination of technologies chosen?
Cheers,
Jon
On Wednesday, May 21, 2014 04:34 AM, Lunar wrote:
> Hi!
>
> A while ago, the EFF published the “Tor and HTTPS” visualization
> at: <https://www.eff.org/pages/tor-and-https/>. It has always been
> a good tool to explain what Tor can and cannot
What's happened to Torbutton? I no longer find it in the Firefox
add-ons.
Jon Cosby
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Fri, 27 Apr 2012 10:28:34 -0700, Lee Fisher
wrote:
On 4/27/12 8:03 AM, Jon Cosby wrote:
What's happened to Torbutton? I no longer find it in the Firefox
add-ons.
https://www.torproject.org/torbutton/ says:
"Now that the Tor Browser Bundle includes a patched version of
Fi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'm probably the odd-one-out, but given the concise content, it'd be
awesome to (also) see this over in the blog, but I'm an RSS junkie
like that.
Jon
On Saturday, July 06, 2013 12:44 PM, and...@torproject.is wrote:
> On Sat, Jul
On 7 November 2014 05:39, Juan wrote:
> On Thu, 6 Nov 2014 15:51:15 -0500
> "Jim Smith" wrote:
>
>> Usually you won't go through the trouble of using Tor unless your
>> privacy is being attacked. Once you start using Tor it's easier to
>> justify surveillance because of Tor's reputation. Now afte
On 7 November 2014 20:13, Juan wrote:
> On Fri, 7 Nov 2014 13:04:38 +0200
> Jon Tullett wrote:
>
>> On 7 November 2014 05:39, Juan wrote:
>> > So why would people be tracked in the first place? Are
>> > you saying that the US
On 10 December 2014 at 01:22, wrote:
> Anything that google touches or promotes is very suspicious.
Anything that any corporation touches is suspicious by the same
measures, if you want to be sufficiently paranoid about it. You think
there's no Chinese spyware in Huawei phones, or that Apple is
On 11 December 2014 at 09:02, Yuri wrote:
> On 12/10/2014 22:54, Jon Tullett wrote:
>>
>> Yes. Get a forked device, like an Amazon Kindle Fire - such vendors
>> replace much of the Google software, often including the default app
>> store, with their own. But if you
On 20 March 2015 at 05:45, Rishab Nithyanand wrote:
> Hey all,
>
> I just thought I'd share and get feedback about some recent work from our
> team at Stony Brook University.
Interesting, thanks!
I do question one of the early assumptions, though: "Many games also
include the notion of private g
Hi Rishab
On 26 March 2015 at 14:37, Rishab Nithyanand wrote:
>
> Please correct me if I'm misunderstanding you. I think you don't buy some
> subset of the following implicit (I believe to be reasonable) assumptions
> that we make:
No, you're entirely correct about that :)
> (1) There is no c
On 27 March 2015 at 09:30, Mirimir wrote:
> On 03/27/2015 01:13 AM, Jon Tullett wrote:
>
>
>
>> And again, I don't think the paper is useless or uninteresting - I'm
>> not completely down on it :) I just don't think it's as effective as
>&
On 27 Mar 2015 15:05, "Rishab Nithyanand" wrote:
>
> Hey Jon.
>
> I think you do raise some very good points and this is a good debate to
> have.
I agree. And that, I think, is the point I'm trying to make - the fact that
these points are debatable suggests they sho
5/15/2015 20:47:18 PM.620 [NOTICE] Opening Socks listener on 127.0.0.1:9150
5/15/2015 20:47:18 PM.620 [NOTICE] Renaming old configuration file to
"C:\Users\Jon\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc.orig.2"
5/15/2015 20:47:19 PM.229 [NOTICE] Bootstrapped 5%: Con
5/15/2015 20:47:18 PM.620 [NOTICE] Opening Socks listener on 127.0.0.1:9150
5/15/2015 20:47:18 PM.620 [NOTICE] Renaming old configuration file to
"C:\Users\Jon\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc.orig.2"
5/15/2015 20:47:19 PM.229 [NOTICE] Bootstrapped 5%: Con
Hi all
This was interesting - not sure if I've missed discussion of it here,
but I didn't find anything with a quick search.
https://chloe.re/2015/06/20/a-month-with-badonions/
Tl:dr; the author set up a very basic honeypot to detect potentially
abusive guard and exit nodes, and found some. (Que
a resource for in-person gatherings:
http://www.cryptoparty.in/parties/upcoming
Finally, https://securityinabox.org/ is a great resource (IMHO) that
provides very clear guidance, tool suggestions, and instructions on
many aspects of being secure and private.
Jon
On Monday, July 15, 2013 02:46 AM,
y browser, so the actual version may not matter much.
I'd also be very interested to know whether there are any available
stats regarding the % of Tor users who use TBB versus Whonix versus
Tails etc, and whether that changes now, but I understand that even
high-level stats like that could car
On 6 August 2013 16:31, Lunar wrote:
> Hi Jon,
>
> A few of your assumptions look incorrect. Here's some of my
> understandings.
Thanks Lunar, appreciate the input. You raise good points.
>
> Jon Tullett:
>> My understanding is that NoScript shipped disabled in t
On 7 August 2013 09:46, Roger Dingledine wrote:
> On Wed, Aug 07, 2013 at 09:28:17AM +0200, Jon Tullett wrote:
>> is there scope for better communicating to a user
>> (such as in the Tor browser homepage) that JS is enabled to improve
>> their browsing experience and enhanc
On Aug 12, 2013 6:16 PM, "Roger Dingledine" wrote:
>
> Hi folks,
>
> I rewrote our two FAQ entries on JavaScript-in-TBB, and merged them
> into one:
>
> https://www.torproject.org/docs/faq#TBBJavaScriptEnabled
>
I think it reads very well. Only change I would suggest would be to change
'cookie' t
Greetings! Can VoIP calls, eg., with (2014) majack (magic jack or mj plu$),
obi, ooma?, others or alternative be secure? It'd be wonderful to provide
clear and secure phoning (say, on android, iOS, unix, BB?, windows, chrome
and/or apple's os-s), especially at no cost or below rates of current
prov
find out your input to save
my reinventing the wheel! Could you also write, second in importance as
possibly, I think, it's only for someone who is in jail, what just pay
phone is about? Ciao!
Poppa Jon
On Mar 24, 2014 9:41 AM, "Nathan Freitas" wrote:
> @Poppa Jon - ant questions about &q
On 29 June 2014 20:30, Mark McCarron wrote:
> Mick,
>
> Congratulations, so you found someone with a similar name what are the odds
> of that.
Probably fairly good odds, I guess - it can't be that unusual a name.
But just so we're clear: are you definitely not the same Mark McCarron
who designed
On 29 June 2014 21:45, Michael Wolf wrote:
>
> How do Snowden and the NSA slides titled "Tor Stinks" fit into your
> little conspiracy theory?
Conspiracy theory aside, I'm curious about these. I mean, p12: "How
does TOR handle DNS requests?...still investigating".
That seems remarkably clueless
Looks interesting. Has anyone reviewed it?
http://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf
http://anongalactic.com/new-attack-on-tor-can-deanonymize-hidden-services-with-surprising-accuracy/
-J
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other se
On 3 August 2015 at 08:52, Roger Dingledine wrote:
> On Mon, Aug 03, 2015 at 08:50:54AM +0200, Jon Tullett wrote:
>> Looks interesting. Has anyone reviewed it?
>>
>> http://people.csail.mit.edu/devadas/pubs/circuit_finger.pdf
>> http://anongalactic.com/new-attack-on
On 14 July 2016 at 01:51, Nick Levinson wrote:
> The FBI reportedly cracked Tor's security to crack a child porn case with
> over 100 arrests of Tor users.
I think what you'll find in such cases is that the FBI generally crack
the servers hosting the illicit material, not Tor itself.
In other w
On 14 July 2016 at 08:37, Mirimir wrote:
> On 07/14/2016 12:23 AM, Jon Tullett wrote:
>> Having pwned the server, a malware component is then injected to
>> visiting computers. Ie: when the criminal visits the infected
>> site, his PC is infected (over that encrypted, secur
On 14 July 2016 at 12:52, wrote:
> On 14.07.16 09:23, Jon Tullett wrote:
>>
>> On 14 July 2016 at 01:51, Nick Levinson wrote:
>>>
>>> The FBI reportedly cracked Tor's security to crack a child porn case with
>>> over 100 arrests of Tor users.
>&
On 14 July 2016 at 21:17, Joe Btfsplk wrote:
> On 7/14/2016 1:23 AM, Jon Tullett wrote:
>>
>>
>> I think what you'll find in such cases is that the FBI generally crack
>> the servers hosting the illicit material, not Tor itself.
>>
> 1. Wasn't th
On 15 July 2016 at 00:07, krishna e bera wrote:
>> Should add that users with NoScript enabled would not have been
>> vulnerable - I get the "noscript decreases privacy" argument, but I'd
>> still kinda like it to be on by default to protect users. Maybe with a
>> big red "Turn on Javascript becau
On 15 July 2016 at 01:23, Joe Btfsplk wrote:
> On 7/14/2016 2:34 PM, Jon Tullett wrote:
>>>
>>> 2. Aren't statements (from anyone) like, "... generally crack the
>>> servers
>>> hosting the illicit material, not Tor itself," sort of a ma
On 15 July 2016 at 05:36, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/14/2016 01:34 PM, Jon Tullett wrote:
>> If a law enforcement agency cracked Tor, it would be a very
>> significant development indeed. The same agency using browser
>
On 14 July 2016 at 10:41, Mirimir wrote:
> There is an aspect of visiting hostile onion sites that's especially
> problematic: forcing direct clearnet connections that reveal users'
> ISP-assigned IP addresses. It's irresponsible to continue recommending
> only vulnerable setups, especially Tor b
On 16 July 2016 at 01:46, Joe Btfsplk wrote:
> On 7/15/2016 12:34 AM, Jon Tullett wrote:
>>
>> On 15 July 2016 at 01:23, Joe Btfsplk wrote:
>>>
>>> You're not really suggesting that users under hostile dictatorships or
>>> ones
>>> trying
On 17 July 2016 at 05:11, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/16/2016 08:21 PM, Jonathan Wilkes wrote:
>>> I'm hardly asking for perfection. Just a little heads up for the
>>> sheep.
>> You're unwilling to even describe non-technical users as human
>> beings,
On 18 July 2016 at 14:57, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/18/2016 06:11 AM, Jon Tullett wrote:
>
>> Haroon Meer, who I greatly respect in the security space, describes
>> UX complexity in terms of his mum. As in, "coul
On 18 July 2016 at 16:17, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/18/2016 07:33 AM, Jon Tullett wrote:
>> On 18 July 2016 at 14:57, Mirimir wrote:
>>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
>>>
>>&
On 18 July 2016 at 18:15, Spencer wrote:
> Hi,
>
>>
>> Jon Tullett:
>> you just asked a user to conduct a risk analysis.
>>
>
> Who else should do it, someone less contextualized to their context?
Context matters. Mirimir was asking for what amounts to a very
On 19 July 2016 at 08:31, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/18/2016 07:08 PM, Jon Tullett wrote:
>> On 18 July 2016 at 16:17, Mirimir wrote:
>>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
>>> A few years ago, I wro
On 19 July 2016 at 12:01, Mirimir wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 07/19/2016 03:50 AM, Jon Tullett wrote:
>> On 19 July 2016 at 08:31, Mirimir wrote:
>>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA1
>>>
>>> On 07/18
On 12 August 2016 at 14:18, wrote:
> Question: why does Spamhaus in particular target exit nodes?
Knowing Spamhaus, I'd guess that they don't target exit nodes per se,
but rather that Tor has been used by spammers which has resulted in
the block listings. Getting them delisted will be exception
On 15 August 2016 at 11:29, shirish शिरीष wrote:
> Hi all,
>
> Most sites more or less use https:// by default nowadays. However, it
> has been suggested by quite a few people that you do not use the same
> usernames when using tor.
>
> While for new sites it certainly makes sense, for sites which
ecially not the
big public operators like Gmail, Yahoo, and Hotmail. But there's
nothing stopping a community of mail server operators setting up a
network of email hosts using older standards. Well, apart from the
inevitable spam and other abuse they'll have to deal with...
-J
On 26 August 2016 at 06:53, eliaz wrote:
> kl:
>> On 8/21/2016 3:59:42 PM, laurelai bailey (laurelaist...@gmail.com) wrote:
>>> But when tor.exe got integrated into the Tor browser, windows users (at
>>> least me) have not been able to set up relays.
>>
>> From what I understand it is better if To
On 25 September 2016 at 20:14, Alec Muffett wrote:
> An organisation's response to scraping seems typically the product of:
>
> 1) the technical resources at its disposal
> 2) its ability to distinguish scraping from non-scraping traffic
> 3) the benefit to the organisation of sieving-out and han
On 7 October 2016 at 13:21, Mirimir wrote:
> Reddit, in contrast, is a total free-for-all
It really varies. Some subreddits are VERY heavily moderated, some are
completely open, most are somewhere in between. Your experience of
reddit is probably quite personal and likely to be different from any
On 7 October 2016 at 19:59, Mirimir wrote:
> On 10/07/2016 05:50 AM, Jon Tullett wrote:
>> I find tracking that historical change to be useful because it reminds
>> me that our expectations in the future will be different too. Our
>> notions of privacy and security, for
On 18 October 2016 at 03:18, Mirimir wrote:
> On 10/17/2016 06:50 PM, I wrote:
>>
>>>
>>> Running Tor on Windows makes little sense,
>>
>> Didn't Roger ask for more operating system diversity and mention Windows?
>
> Maybe he did. Cite?
>
> But nevertheless, in my opinion, Windows is too snoopy.
On 20 October 2016 at 20:24, Jason Long wrote:
> Hello.
> Tor developed for android but why not BlackBerry? BlackBerry devices based on
> security and why tor not developed for them?
>
Have you tried running the Tor Android apps on BlackBerry? Doesn't BB
support many Android apps via emulation?
On 30 October 2016 at 10:57, wrote:
> Take a look what is happening these days, please. A toaster was hacked within
> one hour since connected to the internet:
>
> https://www.theatlantic.com/technology/archive/2016/10/we-built-a-fake-web-toaster-and-it-was-hacked-in-an-hour/505571/
Not that I
On 22 November 2016 at 10:55, Ben Tasker wrote:
> The problem with blocking the camera in software is that it can then be
> unblocked in software (and still potentially without your permission).
And not just
cameras...https://www.wired.com/2016/11/great-now-even-headphones-can-spy/
Software con
On 24 November 2016 at 09:51, Dave Warren wrote:
> On Wed, Nov 23, 2016, at 22:41, Jon Tullett wrote:
>> On 22 November 2016 at 10:55, Ben Tasker wrote:
>> > The problem with blocking the camera in software is that it can then be
>> > unblocked in software (and sti
On 26 November 2016 at 12:08, Jason Long wrote:
> Hello.
> I found a version of Tor in "http://torbrowser.sourceforge.net/";, But what is
> the different between it and official TorBrowser? Is it a trust version?
Apart from just looking dodgy as heck, it appears to have been last
updated in 2013
On 30 November 2016 at 12:20, Jason Long wrote:
> It just a question.
...
> > Hello.
> > If you browse a Cpanel via Tor for deface
> > a website then can
> > provider or Website
> > admin find your real IP with some
> > tricks? Any experiences?
OK: yes.
Step back a little. Rephrase it as "
On 28 February 2017 at 06:07, scar wrote:
> I believe we should encourage
> sinkhole/honeypot operators to just block/ignore Tor exit IPs that connect
> to their traps. what do you all think?
Wouldn't that risk giving away the fact that it's a honeypot?
-J
--
tor-talk mailing list - tor-talk@l
On 7 March 2017 at 00:56, scar wrote:
> Jon Tullett wrote on 03/03/2017 10:47 AM:
>>
>> On 28 February 2017 at 06:07, scar wrote:
>>>
>>> I believe we should encourage
>>> sinkhole/honeypot operators to just block/ignore Tor exit IPs that
>>>
On 22 April 2017 at 00:35, Alec Muffett wrote:
> So it turns out that Shodan - a kind of multi-protocol Google-alike search
> engine for metadata and protocol headers - has indexed a bunch of Onion
> sites which were configured to leak their (onion) hostnames into protocol
> headers.
Interesting.
On 24 April 2017 at 10:33, Alec Muffett wrote:
> On 24 April 2017 at 09:03, Jon Tullett wrote:
>
>>
>> Interesting. What can you do with that? Can you tie them to specific
>> hidden services?
>>
>
> Sometimes. See sample results in my Twitter thread:
>
&
Very interesting, not just from the Tor connection issues. I get the
impression the Tor devs are already in the loop on the specific issues
raised.
http://www.hackerfactor.com/blog/index.php?/archives/762-Attacked-Over-Tor.html
-J
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsub
On 4 August 2017 at 02:05, Paul Syverson wrote:
> On Thu, Aug 03, 2017 at 04:38:49PM -0700, Jacki M wrote:
>> Comments on Paul Syverson Proposed attack?
>> Paul Syverson - Oft Target: Tor adversary models that don't miss the mark
>> https://www.youtube.com/watch?v=dGXncihWzfw
>>
> More seriously.
1 - 100 of 115 matches
Mail list logo