Hello guys,
I just installed Tor-Arm on debian; of which I have used many times before
and love the project. (http://www.atagar.com/arm/).
I cannot recall what the key is to access the menu interface. Can anyone
tell me?
Thanks
Matt
___
tor-talk maili
Hi Damian,
Yes I thought this was the case. I downloaded the Python source version on
the Arm website and installed it on my system, as is normally the case.
The package in apt debian-back ports must be an old version because it does
not contain the menu key. (apt-get install tor-arm)
Matt
On
Dererk,
That is wonderful, Glad I could help and love the fast response!, Wow :)
Matt
On Sunday, April 22, 2012, Dererk wrote:
> On 22/04/12 09:25, Matthew Kaufman wrote:
> > Hi Damian,
> >
> > Yes I thought this was the case. I downloaded the Python source version
>
I have been worried about MITM in general on exit relays. Can someone
explain this process a bit more?
What about ettercap packet injections running inside an exit relay with
etterfilter?
On Tue, May 1, 2012 at 7:20 PM, tagnaq wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi,
I am pretty sure this is not relevant,
But can someone tell me what the HttpProxy does in torrc? Will this
forward outgoing traffic through a proxy server if it is defined for an
exit relay on others traffic?
Matt
On Sunday, May 6, 2012, Veggie Monster wrote:
> > and there is also a proposal w
Why can't there be some manner of anonymity such as remote VNCing to a
remote computer (say a web server desktop on Gnome running on an Amazon AWS
cloud)...
This way your true identity is an Amazon AWS cloud IP and say you are ssh
tunneled or connected via tor to it --- and running Firefox remotel
Andrew,
"It's easy for lots of applications to bypass the proxy settings in the
browser, the operating system, and in some cases, the network."
Very well put -- especially the last 6 words!
On Thursday, May 10, 2012, Andrew Lewman wrote:
> On Wed, 9 May 2012 17:56:34 -0600
> Elena Johnson > wro
Hi Joe,
Great questions. I was also wondering how these claims on the New Identity
button works in this case.
If it is the case, which it may be, this seems to or would seem to exceed
my expectations just as it may yours.
On Monday, May 14, 2012, Joe Btfsplk wrote:
> On 5/14/2012 1:56 PM, Mi
Hello,
I just heard that the University of Pittsburgh's bomb threats had been sent
in via Mixmaster. I had never heard of this project until tonight and it
instantly lead me to think of Tor.
I had tried using Mixmaster myself but it rejects mail due to an unknown
source address (eg root@localhos
Yeah, There honestly seemed to be too few and far too static remail relay
servers to be highly anonymous; what if you go through only 3 and hack the
out box, to the previous, to the first, back to the original sender?
Matt
On Thursday, May 17, 2012, wrote:
> Tell me if I am wrong, but I think it
Helli,
What is the HttpProxy configuration directive for in torrc?
What if I am an exit relay and I have:
HttpProxy 127.0.0.1:3128
(a Squid proxy running locally) -- Do outgoing connections process through
Squid then?
___
tor-talk mailing list
tor-tal
Hello,
Thanks for these config settings, Does it also leak if I use:
torify wget http://example.com
?
Is this what torify does?
On Saturday, May 26, 2012, wrote:
> Hi,
>
> Original Message
> From: helpfuln...@safe-mail.net
> Apparently from: tor-talk-boun...@lists.torproject
I'm pretty sure that is not his real IP address, lol ?
On Monday, May 28, 2012, SiNA Rabbani wrote:
> inf0@anarchy:~$ telnet 123.123.123.123 443
> Trying 123.123.123.123...
>
>
> Is port 443 open to the world from your router?
> I can't reach your 443 port from outside.
>
> --SiNA
>
> On 05/28/20
Lol
On Wednesday, June 6, 2012, KςĦαm ellaisy wrote:
>
> I have seen that web before but i want scripts like this in a webpage that
> gives exactly what i need to put the scripts together. look at this. I
> promise there are no virus.
>protected boolean authenticated = false;
>protected b
Great questions. And does hosting a hidden service exposé the machine to
penetration attacks?
Matt
On Thursday, June 7, 2012, wrote:
> Would it stress the network too much, if everyone had a HiddenServicePort
> enabled? (For example, TBB or Tails were in the position to enable it for
> loads of
FYi,
I was running a tor exit node on VPSLand.com and they suspended that
account indefinitely without question.
On Wednesday, July 4, 2012, Name Withheld wrote:
>
> Thanks to everyone for their responses.
>
> 1) Just in case, does any have any recommendations for an unmetered,
> bulletproo
ha ha ha
On Oct 8, 2013, at 8:10 PM, coderman wrote:
>
> McAfee is doing lots of drugs. all other details yet to be confirmed...
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-ta
Wow,
Congrats Runa :)
On Sun, Feb 2, 2014 at 3:48 PM, Runa A. Sandvik wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hi everyone,
>
> Tomorrow is my first day as a staff technologist at the Center for
> Democracy and Technology in Washington, D.C. I will continue to
> contribute
I love it!!
On Fri, May 2, 2014 at 11:07 AM, Frederic Jacobs
wrote:
> Hi all,
>
> A friend of mine, designed a Tor logo for fun as a replacement of the
> current logo.
>
> Here’s what it looks like in the dock of a Mac:
> https://twitter.com/fredericjacobs/status/462239895055261696
>
> And h
LOL
On Fri, May 2, 2014 at 1:03 PM, Артур Истомин wrote:
> On Fri, May 02, 2014 at 05:07:04PM +0200, Frederic Jacobs wrote:
> > Hi all,
> >
> > A friend of mine, designed a Tor logo for fun as a replacement of the
> current logo.
> >
> > Here’s what it looks like in the dock of a Mac:
> https:/
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
On Thu, Jul 3, 2014 at 2:05 PM, grarpamp wrote:
> You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
> Alexander Volynkin / Michael McCord
>
> [...]
> L
Finally. Was waiting for BND to light up. And PS, they already have
'killer ISPs' and a million bucks won't help much in that area.
On Sep 14, 2017 1:02 PM, "Markus Reichelt" wrote:
> * InterN0T wrote:
>
> > The real question is, what are they going to spend that million on?
>
> Some fine cig
This is what I've been wondering as well :) (and with Bitcoin)
On Sat, May 26, 2018 at 12:39 AM, Kevin Burress
wrote:
> Hi,
>
> I was just wondering since the NSA has quantum computers that can break
> ECDSA (As they have stated they could break bitcoin in an interview, and
> telecomix unlocked
23 matches
Mail list logo