Hello,
I recently updated to I just 0.2.3.24-rc, and when i view my server in
arm, I see the following notice types on my tor processes:
*desc: 888 / 992 (89%)
04:44:31 [ARM_WARN] Tor's file descriptor usage is at 89%. If you run
out Tor will be
unable to continue functioning.
*It doe
The writer seems to have a Chinese name, and our virus scans (including
Norton) show no results, but his does.
Has no one considered that this might mean he's actually gotten a
poisoned binary?
Assuming he's operating in China or somewhere similar (and I know this
is a big assumption), this wou
I think some of the hysteria over this is overdone.
> - What can be done to stop botnets abusing Tor for concealing its
> infrastructure?
For unpublished nodes, nothing that I'm aware of. Hidden services are
called that for a reason, and it's necessarily a dual-use technology.
You can't weaken
Pretty sure this is due to people leaving comment spam via tor. I know
one of my exits was implicated in a comment spam campaign, and I noticed
that IP was banned from a number of blog sites because of it.
If you know which exit node you were using at the time, you can write to
the admin contact
Seems like there's a bit of confusion regarding what a bad exit node can
and can't do here.
For many sites, you can trivially strip the SSL connection request as
the exit node, downgrading it to vulnerable plaintext just by using
ssl-strip. There'd be no cert warning, but smart users will notice
s (since he owns your machine... he can see your tx/rx data
before you've encrypted it to the server and after you've decrypted it
from the server).
As a fringe benefit, this now works for him regardless of whether or not
you're connected to Tor, because he owns your machine basicall