[tor-talk] hidden service

2013-07-20 Thread Pokokohua
I am running a hidden service website that uses user sessions made up from individual visitors server variables. Unfortunately $_SERVER[ 'REMOTE_ADDR' ] is reporting all visitors IPs as 127.0.0.1. Is there any way of either detecting the last node IP address/apparent ip, to use in making up a visit

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
>* mirimir:*> That depends. If it's drawing on random clueless Windows users, >as most> botnets do, I don't see why it wouldn't show up in honeypots. If >it's> not showing up, it might be a feature rollout. Or it might not really >be> a physical botnet, but rather something very cleaver that loo

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
09:42 PM, Pokokohua wrote: > > See the "[tor-talk] Many more Tor users in the past week?" thread. > > It's an existing botnet that's being converted to Tor for C&C. > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other sett

Re: [tor-talk] Exit node stats collection?

2013-09-05 Thread Pokokohua
Oh that makes so much more sense now ;) thanks for that. On Fri, Sep 6, 2013 at 12:26 PM, mirimir wrote: > On 09/05/2013 11:42 PM, Pokokohua wrote: > > > Still hard for me to imagine such a large scale infection of what I > assume > > is home user computers without anyon

[tor-talk] PrivateCore Demonstrates Industry’s First PRISM-Proof Tor Server in Public Cloud

2013-10-27 Thread Pokokohua
Saw this ad/news item on another list -- PrivateCore Demonstrates Industry’s First PRISM-Proof Tor Server in Public Cloud PrivateCore, the private computing company, today demonstrated the first cloud Tor server protected from NSA PRISM-like pro