Not sure how they can know if those are actual users or collection / posting
bots using the Tor login to make it easier to hide their activities / not get
blocked.
On Apr 23, 2016, at 1:32 PM, Jonathan Wilkes wrote:
>> It's like building a steel pipeline of Coca-Cola to a drought stricken
> c
I've tested for research purposes running both proxychains and openvpn setups
using 2-3 VPSs with private ip addresses from bolt vm for really cheap per
month. Worked really well as an alternative to using Tor.
Question, If you run your own relays couldn't you just force your host to
connect
Sources? Links? Otherwise why conjecture & possibilities?
> On Jul 13, 2016, at 7:51 PM, Nick Levinson wrote:
>
> The FBI reportedly cracked Tor's security to crack a child porn case with
> over 100 arrests of Tor users. I don't know how the FBI did it, and that's a
> good type of case for whi
I'm surprised more people don't run their own mail. Using something like
mailinabox (https://github.com/mail-in-a-box/mailinabox) wonder how hard it
would be to fork it and create a version that is configured to use Tor / not
leak DNS / etcetera.
> On Jul 19, 2016, at 7:25 AM, MegaBrutal wrot
I'm running a few meek Google bridges using appspot if anyone needs to poke out
through Google if everything else is blocked on the network you are on. Feel
free to message me for the connection info. I was wondering if there is a
better method, like having a list of emails of those who have bri
I'm getting around 6500 per day give or take a few and about 70-100 new per day
(most of which are short lived or mirrors of others or new addresses for
previous services).
--
FINGERPRINT:
97CD 1B42 2333 54EF 75C2 731C C71C BC5C 57D3 A771
On Aug 24, 2016, at 7:50 PM, Sarah