In my opinion, more often then not DMCA takedown requests center around
file-sharing and also more often then not the takedown requests actually
have validity to them.
There are certainly instances where takedown requests are incorrect but
the frequency of them isn't high (again, my opinion).
My
Hi Peter,
When you say blocked are you saying that faculty, staff, and students
are not allowed to run exit nodes in the TOR network? Or rather that the
above are not allowed to use TOR clients to connect into the TOR
network?
Cheers,
Harry
On Thu, 2010-02-11 at 13:15 -0600, Peter Farver wrote:
Hi Roger,
Thanks for the detailed explanation. It's always interesting to hear
about how other go into the "verification route" when a compromise happens.
Do you know the nature of the compromise? Was it against Tor itself or
one of the other services running on the Directory Authorities?
J
When you guys have finished the assessment will you be releasing details
of how the compromise happened?
Cheers,
Harry
On Wed, 2010-01-20 at 16:43 -0500, Roger Dingledine wrote:
> You should upgrade to Tor 0.2.1.22 or 0.2.2.7-alpha:
> https://www.torproject.org/download.html.en
>
> In early Janu
Thanks Roger,
I should have been taking better care of this box but have been super busy.
My bridge is back up and running :-)
Cheers,
Harry
Roger Dingledine wrote:
On Wed, Jan 20, 2010 at 03:11:01PM -0500, Harry Hoffman wrote:
So, at some point in time the apt url I was using for tor
Hi,
So, at some point in time the apt url I was using for tor ceased to exist:
http://mirror.noreply.org/pub/tor/dists/experimental-0.2.1.x-intrepid/main/binary-i386/Packages.gz
Did experimental become unstable?
Cheers,
Harry
isn't email (i.e. tcp/25) blocked by default as a exit policy?
Programmer In Training wrote:
As part of my attempts to write an article about using GPG and Tor with
Outlook I set up a test email account. O says it connects just fine and
sends/receives a test message, but when I attempt to send m
wrote:
Could someone post the contact addresses for cashing in?
And perhaps some proof that they do (or do not) pay?
On Tue, Jun 23, 2009 at 03:55:57PM +0200, Timo Schoeler wrote:
thus Tom Hek spake:
On Jun 23, 2009, at 15:01 PM, Harry Hoffman wrote:
At $0.20USD/MB I was able to supplement my
oh, sure this has been known for a long time. In fact, the CIA will even
pay you (much like google adsense) per MB that you allow them to
intercept upon exit.
At $0.20USD/MB I was able to supplement my regular income. Soon I'll be
able to quit my regular job. It's like all of those emails say,
Hi Brent,
At the very least the src ip (although this would be another tor
server), src port, dst ip, dst port, protocol (tcp), timestamp.
If the traffic is unencrypted (i.e. you browse to www.google.com) then
you can also add application protocol (i.e. HTTP) and payload (i.e. GET
/ HTTP/1.1
Just came across this:
http://hosted.ap.org/dynamic/stories/T/TEC_PUNISHING_PROXIES?SITE=ILEDW&SECTION=HOME&TEMPLATE=DEFAULT
Cheers,
Harry
Not to turn this into a legal thread (compulsary IANAL warning) but I
don't see how running a tor exit node makes anyone a common carrier.
I would be very interested to see any legal precedence for this.
If anything most exit nodes reside in network space that has it's own
set of acceptable use p
Interesting, it works with Open Office on Linux revealing the true ip
addr.
There's a option in OO to use a proxy, it was set to system at the time
and I tried just using foxyproxy.
But yeah, like someone else mentioned, using iptables to redirect all
attempts so that you don't have to worry abou
It's interesting because the Wiretap Act requires consent before
intercepting the traffic.
This is usually done via AUPs or other policy. I wonder what it means
for people who don't have the opportunity to agree or disagree with
these policies because they don't know about them.
On Thu, 2008-07-
Hi,
Just curious to get some expert opinions from the tor maintainers about
how to deal with the new DNS vulnerabilities being discussed[1].
Is anyone testing whether or not the DNS servers available via exit
nodes are patched?
Cheers,
Harry
[1] http://isc.sans.org/diary.html?storyid=4765
Why do you think it would be embarrassing? I'm fairly certain that some
exit nodes have been setup as "research" projects.
On Thu, 2008-06-05 at 21:49 -0700, Wesley Kenzie wrote:
>
> Or BostonUCompSci? It would be kind of embarrassing to Boston
> University wouldn't it, if they were found to
Hmm,
Point taken. I guess I hadn't realized that that many windows users are
running tor clients.
At work we are considering "quizzing" users for certain facts regarding
network operations. Nothing major, just a, "hey, you need to understand
the risks of running p2p software".
Perhaps something
Hopefully the people using Tor would be "clued in" enough to check their
certs.
Arrakistor wrote:
> Amazing(ly bad). Perhaps we need some sort of monster programs
> stalking through the system to check for things like this.
>
> What I would like to know is how long the router on the node has b
Don't render html or load remote images in client software, otherwise
you are just asking for trouble :-D
--
Harry Hoffman
Integrated Portable Solutions, LLC
877.846.5927 ext 1000
http://www.ip-solutions.net/
Freemor wrote:
> Hi all,
>
>came across this little Gem while re
19 matches
Mail list logo