On Sat, Sep 15, 2007 at 08:49:17AM +0200, Stephen wrote:
> In some instances maybe so, in other instances not so hard to know:
>
> http://cryptome.org/nsa-ip-update8.htm
Anyone knows what the false positives rate in the list is?
I've long considered putting the address ranges in the firewall
den
Am Samstag, 15. September 2007 09:30 schrieb Eugen Leitl:
> On Sat, Sep 15, 2007 at 08:49:17AM +0200, Stephen wrote:
> > In some instances maybe so, in other instances not so hard to
> > know:
> >
> > http://cryptome.org/nsa-ip-update8.htm
>
I find it quite conerning that these are spread all over
On Wed, 2007-09-12 at 10:31 +0200, TOR-Admin (gpfTOR1) wrote:
> supporting spammers
> > when setting up my node for 465,993,995?
> >
>
> The SSL-encrypted SMTP-ports are using SMTP-Auth (mostly). The
> support of spammer is very low (in my opinion).
>
> By the way, I have the same problems like y
Just one contra:
"Supporting $some_crime" always means that you knew about that certain
case they're suing you about. Since you can only know about something
if you start sniffing - which is strictly forbidden - you can't
possibly know about a direct certain crime.
Unless you were it yourself, usi
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
> The best option is to run a squid server on localhost with a block by
> country filter. Then, route your tor client through it.
> Comrade Ringo Kamens
I understand the part about running squid on localhost and routing web
brouser through i
coderman wrote on 14.09.2007 06:39:
> On 9/13/07, scar <[EMAIL PROTECTED]> wrote:
>> ...
>> so, if we are using a website that uses HTTPS, but, in firefox, for
>> example, in the cookies list under that website it shows "Send
>> for: any type of connection", then the session is vulnerable?
>
> vul
On Sat, Sep 15, 2007 at 08:27:36AM +0800, Li-Hui Zhou wrote:
> There's a lot of errors when linking
Thanks! Fixed in r11445.
yrs,
--
Nick Mathewson
pgpNnVearY4dj.pgp
Description: PGP signature
This was in my message log today and I did not specify
a server or an exit node (if that is what "using exit"
refers to). Hell, I just re-installed this Windows XP
SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
Vidalia v0.0.14). I haven't even opened the torrc or
torrc.orig.1 before I no
Fyi, what you are asking for is exactly what we are working towards with
http://pickaproxy.com - allowing you to pick or exclude exit nodes by
Country - where Tor is setup on our server as a client to your workstation.
We are calling this "geospoofing".
. . .
Wesley
-Original Message-
Fr
On Saturday 15 September 2007 20:20:32 jeffery statin wrote:
> This was in my message log today and I did not specify
> a server or an exit node (if that is what "using exit"
> refers to). Hell, I just re-installed this Windows XP
> SP2 and just installed the Tor bundle (Tor v.0.1.2.17,
> Vidalia
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
> www.pickaproxy.com
So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In other words users do not
have any protection from your server.
If you have not been approached b
Hi all,
I made some dubious comments recently about ongoing investigations
against me. Today I got a letter from the lawyer of the state telling
me that I'm not longer a suspect.
Hereby I break my silence:
http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
Thanks for all the people wh
> http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
That is very interesting stuff.
Alex, perhaps you or somebody could put up a web page, in German, that
explains in simple terms what Tor is about, aimed at explaining to the
average German police officer what tor is about. This migh
On 9/16/07, Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:
> > http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
> Alex, perhaps you or somebody could put up a web page, in German, that
> explains in simple terms what Tor is about, aimed at explaining to the
> average German police offic
On Sat, 15 Sep 2007 17:47:11 -0400 misc <[EMAIL PROTECTED]> wrote:
>On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
>
>> www.pickaproxy.com
>
>So your server can see all the traffic in cleartext before it enters Tor
>network AND where the traffic is coming from. In other words users
On Sun, 16 Sep 2007 00:32:27 +0200 "Alexander W. Janssen"
<[EMAIL PROTECTED]> wrote:
>On 9/16/07, Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:
>> > http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
>> Alex, perhaps you or somebody could put up a web page, in German, that
>> expla
On 9/16/07, Scott Bennett <[EMAIL PROTECTED]> wrote:
> >Actually what'd be more useful would be something like a tag in the
> >whois-database... But the average copper would probably either ignore
> >or not understand it :-(
> >
> Um...and that would be more useful how? I thought the suggesti
Now that I can break my silence it's time for some action.
A question to all Tor-operators:
I'd like to do a survey about all incidents which happened to
operators. Stuff like:
* arrested
* confiscated equippment
* nastygram
* surveillance
* ...
What would be possible other questions/point in th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Scott Bennett wrote:
> On Sun, 16 Sep 2007 00:32:27 +0200 "Alexander W. Janssen"
> <[EMAIL PROTECTED]> wrote:
>
>> On 9/16/07, Juliusz Chroboczek <[EMAIL PROTECTED]> wrote:
http://itnomad.wordpress.com/2007/09/16/tor-madness-reloaded/
>>> Al
On 9/16/07, Ryan Wagner <[EMAIL PROTECTED]> wrote:
> There's still the possibility that a server op is using their Tor node
> as a scapegoat and really is doing bad things (I don't mean to imply
> that's the case here). Even if the police know that their suspect is
> running a Tor node, what Tor is
Is there any way that people can donate to help cover your legal fees?
I'll commit to one US dollar. If half the people who read this message
did that, it would at least take a small chunk out of that mountain of
legal fees you're facing. Also, have you talked to the CCC (ccc.de)
about this? They m
On 9/16/07, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> Is there any way that people can donate to help cover your legal fees?
> I'll commit to one US dollar. If half the people who read this message
> did that, it would at least take a small chunk out of that mountain of
> legal fees you're facing.
If you set up a paypal account I would be willing to donate on a
case-by-case basis (in this case, it would be to help with your legal
fees). I think even if you don't need help with legal fees by
receiving donations from all across the world it sends the message to
German authorities that harassin
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
>
> Why would they waste their time? They will have already gotten copies
> of what they want as it traveled in the clear between its origin and the web
> server. Remember the news articles a while back about all those snoop bo
On 9/16/07, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> If you set up a paypal account I would be willing to donate on a
> case-by-case basis (in this case, it would be to help with your legal
> fees). I think even if you don't need help with legal fees by
> receiving donations from all across the wo
Hi Alex,
I am really sorry about what has happened to you.
I think there is a need to incorporate. If there is for example an
incorporated society which runs some tor-nodes, police is going to
confiscate the servers (which is okay), but not going to search houses
from members of the incorporated
My main criticism of pickaproxy is... why? Why do that when you can
program a tor controller to do exactly the same thing with a offline
database?
Comrade Ringo Kamens
On 9/15/07, misc <[EMAIL PROTECTED]> wrote:
> On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
>
> >
> > Why wo
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
> The best option is to run a squid server on localhost with a block by
> country filter. Then, route your tor client through it.
> Comrade Ringo Kamens
>
I researched it more and everybody is saying squid goes between the browser
and tor:
If the most Tor users are really into human rights, free speech,
reporters and the like, then there *are* organizations which vastly more
power than such a 'little' Tor-operator-fund can provide, thought..
But where are they, when it's getting hot on Tor?
Why all the load is up to the operators?
W
I think there is support and all we need to do to obtain it is tell
people *how* they can support you. Whether that is writing letters to
German officials, protesting at German consulates, sending donations,
or just getting this stuff in the press. I suggest you submit your
story to indymedia.de as
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
On 9/15/07, misc <[EMAIL PROTECTED]> wrote:
> On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
>
> > The best option is to run
On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:
> I don't think you get the problem here. Squid wouldn't be able to
> affect the choice of exit nodes. It would just be able to filter entry
> nodes.
> Comrade Ringo Kamens
I know how to filter entry nodes. I can do it with Protowall or anot
If Tor is never allowed to connect to certain nodes, and therefore "doesn't
know" about them, can they still be used as exit nodes?
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go "well.. the IP in ques
I would really like to hear some good news from currently investigated
Tor ops, about their success contacting CCC or EFF EU...
Btw: Are there no official CCCers or EFFers reading here and open for a
comment?
Greets
Am Samstag, den 15.09.2007, 21:38 -0400 schrieb Ringo Kamens:
[...]
> that's
On 9/15/07, Alexander W. Janssen <[EMAIL PROTECTED]> wrote:
>
> On 9/16/07, Ryan Wagner <[EMAIL PROTECTED]> wrote:
> > There's still the possibility that a server op is using their Tor node
> > as a scapegoat and really is doing bad things (I don't mean to imply
> > that's the case here). Even if t
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
>
> AFAIK tor connects to an entry guard which then connects to the exit
> node for you. This way, they can't take the logs from the exit node
> and go "well.. the IP in question connected to you 20 seconds before
> the alleged connection was
On Sat, 15 Sep 2007 21:39:17 -0400 "Ringo Kamens" <[EMAIL PROTECTED]>
wrote:
>I don't think you get the problem here. Squid wouldn't be able to
>affect the choice of exit nodes. It would just be able to filter entry
>nodes.
>Comrade Ringo Kamens
This is getting to be really irritatingly
On Sat, 15 Sep 2007 23:30:58 -0400 misc <[EMAIL PROTECTED]> wrote
>On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
>>
>> AFAIK tor connects to an entry guard which then connects to the exit
>> node for you. This way, they can't take the logs from the exit node
>> and go "well.. the
>On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
>
> www.pickaproxy.com
>
> So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In
> other words users do not have any protection from your server.
>
> If you have not been a
On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:
> Please read the tor documentation. If you think you've already done
> that, please go back and read it again.
That brings back the pain of reading it the first time :)
I must admit I gave up after first few pages. I found i
Am Sonntag, 16. September 2007 02:19 schrieb Alexander W. Janssen:
> On 9/16/07, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> > If you set up a paypal account I would be willing to donate on a
> > case-by-case basis (in this case, it would be to help with your
> > legal fees). I think even if you don'
On Sun, 16 Sep 2007 00:54:43 -0400 misc <[EMAIL PROTECTED]> wrote:
>On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:
>
>> Please read the tor documentation. If you think you've already done
>> that, please go back and read it again.
>
>That brings back the pain of reading
On 07:41:12 2007-09-16 Martin Senftleben <[EMAIL PROTECTED]> wrote:
> Am Sonntag, 16. September 2007 02:19 schrieb Alexander W. Janssen:
> > On 9/16/07, Ringo Kamens <[EMAIL PROTECTED]> wrote:
> > > If you set up a paypal account I would be willing to donate on a
> > > case-by-case basis (in this c
43 matches
Mail list logo