> [snip]
> The trouble here is that if we make family declarations one-sided, then
> I can tell everybody that I'm in blutmagie's family (and X's family and
> Y's family and Z's family and ...), and suddenly I'm influencing the
> path selection of other clients in a way I shouldn't be able to.
>
>
> (I don't know who is the ISP for HK PolyU), when I try to connect with Tor.
> via bridge 74.207.232.33:443, I have found its TCP handshaking works fine,
> but SSL handshaking is blocked (A packet for SSL client Hello is sent to
> 74.207.232.33, but the bridge never gives me reponse):
It would re
eject *:*
ContactInfo xiando $somecontactinfo
OutboundBindAddress $someip
then I would get an error saying that 20 KB is the minimum. Shouldn't it be
possible to limit a bridge to less? if 10 KB is plenty, which is the tor
videos story, then 16 KB should be enough? co
Tor story when configured to do nothing but "BridgeRelay 1" is:
"[warn] SocksPort, TransPort, NatdPort, DNSPort, and ORPort are all undefined,
and there aren't any hidden services configured. Tor will still run, but
probably won't do anything."
warning!! warning!! you're only acting as a bridg
> Thanks for the information. I run denyhosts, and receive ridiculous
> numbers of these connections to my servers as well. I ran a quick
> script to grab what denyhosts had blocked, and determined how many of
> those connections were from Tor exit nodes. Quite a large number!
Off topic, I had
> > Can a bridge offer hidden services?
> AFAIK, any Tor client can setup an hidden service, not just a router.
Any Tor setup can run hidden services, including servers, bridges and clients.
See https://www.torproject.org/docs/tor-hidden-service.html.en for information
about setting these u
> is it - in analogy to exit policies - possible to block certain (or
> all) hidden services of using my node as directory or introduction
> point and to disable rendezvous point functionality for my node? (I
> understand that I cannot block being a rendezvous point for specific
> hidden services.)
> I know this has been discussed before, but I thought I'd bring it up
> again. The following rules are in the default exit policy and I can't
> see any reason why they would be:
>
> reject *:465
> reject *:587
Are you absolutely positivily sure that you can not misconfigure e-mail MTAs
who use s
Hello,
> i am the operator of a tor server located in austria:
>
> today my isp forwarded a copyright compliance from the 'Entertainment
> Software Association' (ESA). the claim is attached below. the ESA refers
> to the 'Berne Convention and other international treaties covering
> intellectual pro
> Ok, so that problem solves the gmail problem but pretty much every spam
> filter at least takes in the SORBS etc. databases as a factor. Thanks
> though, I'll do that.
SORBS was mentioned in Tor-talk July 2005 at WTH as downloadable from
http://torrentchannel.com/Technology/Tor_presentations_at
> but maybe you just have to change your name, after they recognize
> the TOR-Exit and the first contract is about to extend ;)
This is a very bad idea. Be perfectly honest with your ISP if you operate a
Tor exit node. The best thing you can do is to be honest up-front and explain
what Tor is an
> Hi, I’m new to TOR. I’ve been using it for some weeks for
> online privacy. I’ve installed TOR and Privoxy from the latest
> Windows Vidalia Bundle and configured my Internet Explorer 7 manually.
I strongly advice you to switch to a free software operating system such as
GNU/Linux if you use To
> > Can we start a tor-legal-matters and/or tor-misc-chatter lists to
> > resolve this problem?
> Tor is the technology side, but it has a political and legal side too,
> which should be allowed to talk about, how far it likes to go. Okay,
> maybe in another or-list, but generally there is to provi
> But I strongly suggest to discuss more and warn about using the
> 600+ router from China.
Why?
Tor is only for okey that what goes out of the exit is viewed by BigBrother &
encrypted traffic.
Exit nodes in China isn't different from GCHQ logging all communications
within the British Empire.
> A question to all Tor-operators:
> I'd like to do a survey about all incidents which happened to
> operators. Stuff like:
>
> * arrested
> * confiscated equippment
> * nastygram
> * surveillance
> * ...
>
> What would be possible other questions/point in the survey?
I was put under surveillance
lacklists they should/shouldn't use.
Let SORBS blacklist whatever they want. Just document it and tell people about
it and when enough people know and nobody uses it then it doesn't matter if
they and their 5 users are blacklisting the whole internet.
--xiando(tm).
> Is it a problem to offer the same content on a public and a hidden
> (Tor) http service? (I.e., does it leak enough information for
> useful attacks).
I have no idea why you would want this, but I do it just to make sure people
have the address for the hidden http service so they can start usin
> No, its just SORBS, thay havnt got a clue. Avoid with long bargepole
Quote, mr. Dingeldine at "What The Hack", July 2005:
"If you're still using SORBS then I feel sorry for you". I did a (Scr|G)oogle
seach for SORBS just now
http://www.scroogle.org/cgi-bin/nbbw.cgi?Gw=sorbs
and it turns
> I read an article from LH this morning about the OpenDNS service.
>
> http://tinyurl.com/24y2cn
> http://www.opendns.com/
>
> Can I use this with Tor? Will that void any anonymity provided by Tor?
> Forgive me if this is a stupid question.
I call SCAM. Yes. SCAM, I tell you. This isn't really To
> Do you think it's a privacy problem to run 3 to 5 servers? All servers
> would be non-exit servers because of the current habit of the German
> police to collect all exit servers. Of course, I will set the family entry.
Please do run as many servers as you can afford. There is absolutely no
pri
> I just opened Tork and there in the server list was a server named
> NSAFortMeade. Is this for real, or is the NSA running a Tor Server?
> If it's for real, it's going to spook a lot of people away from Tor,
> at least those who are inclined to use Tor for political reasons.
In bullet summary,
> This article appears on the BBC's website today & can be repsonded to
> (possibly with some good counter-arguments in favour of online
> anonymity/freedom of speech) via the link below & NOT HERE on this mailing
> list as the subject is off-topic.
>
> "Call for blogging code of conduct"
>
> The s
, and the west in general. Very good reason to use Tor
right there.
More Slightly Off-Topic:
FRA is visiting websites with information about Tor. And they are not using
Tor to do it (Yes, I realize the Xiando Total Surveillance Office is evil.
But you guys are using Tor, aren't you?)
(Please
> Looking at the volunteer page at tor.eff.org, I spotted this:
> We need an official central site to answer "Is this IP address a Tor
> server?" questions. This should provide several interfaces, including a web
> interface and a DNSBL-style interface. It can provide the most up-to-date
> answers
> I would just like to say that we should report that alolita.com because it
> is connected to bunch of PEDOPHILES!!!
>
> Is must be banned from Tor netowork and it should also be reported to
> authorities.
Hey, wait a minute. You're talking about Censorship. Don't you realize that?
Or do you wan
> If this is true, the answer to the strange DNS query is likely that
> NextGenTel is using a filter service developed by the Norwegian Police
> on their DNS queries to stop this type of traffic. I think that being
> registered here is a verification for that the address already is
> reported to (a
$ dig +trace alolita.com
alolita.com.3600IN A 69.5.162.133
dig @217.13.4.21 alolita.com
alolita.com.1800IN A 80.202.4.7
217.13.4.21 is a DNS server which belongs to Norwegian ISP NextGenTel.
** EVEN MORE ALARMING: **
$ dig @18.244.0.188 tor
> Concerning an ISP controlling both entry and exit nodes: when Tor
> clients build paths, they avoid choosing two nodes on the same /16
> subnet (see path-spec.txt). So, it does not seem that this is likely to
> happen.
This is false. These are actually both at the same ISP (Same datacenter, sa
Subject: EZZI.net Abuse Warning
Date: Tuesday 23 januar 2007 22:39
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
[EMAIL PROTECTED]
Regarding Server Main IP: 66.199.236.130
We got a notice from the Undernet IRC Network about a number of servers on
our network making suspicious connections to the
> I think this is a valid point. I ran an exit-node for a short while at home
> without thinking too much about it. The huge amount of traffic I was
> attracting (even within minutes of booting up) made me shut it off for the
> sake of personal convenience, but I don't think I will ever go back -
> This reads to me that you are implying that if you are not annoying,
> abusing or threatening, you have no need to hide your identity.
Your friend says something your government does not like, they drag him away,
you never see him again, nobody ever heard from him again, he's just gone.
Perhap
This text is copied from [Zyprexa-discuss] tor link does not work at:
http://lists.acm.jhu.edu/pipermail/zyprexa-discuss/2006-December/24.html
"Someone said that they thought the tor download link on the wiki was
working...
... it is not as of now... it goes no where.
So it's apparently c
I get this every time I send something to or-talk now:
"Topic: Moderating your message
From: SYMPA <[EMAIL PROTECTED]>
Your message for list wikileaks has been forwarded to editor(s)"
I mailed nothing to list wikileaks. My involvement with "list wikileaks" is
not indicated. I suspect or-talk
Podcast.
"Description: Last week Steve and Leo discussed the social implications and
the social power of Internet Anonymity. This week they discuss the technology
of Freenet and TOR (Onion Router) networks, and Steve describes the detailed
technical operation of both systems. "
http://www.grc
> > Det. Wheeler : Let's start by tracing the server they used to upload the
> > videos
> >
> > Ira: I tried that but… It was routed through special proxies, er…Tor
> > server.
> >
> > Capt. Ross: In English Ira.
> >
> > Ira: It's a way of posting anonymously online.
> >
> > Capt. Ross: Why would a
> I've noticed a fair number of list members use GnuPG or PGP and I got
> tired of manually trying to find a keyserver that had the poster's
> public key. I know they are supposed exchange keys, but this seems very
> hit or miss. So I wrote the little script below. It includes several
(..)
> I ho
ings. Also, file-transfer - and everything else - should work in client
mode too!
If I pay for 5 co-located servers running Tor-servers and run i client mode
because I've got slow ADSL at home or am at the library or at a friends house
then I still want to be able to use the full potential of Tor and do
everything I could do if I were running a server.
--xiando(tm).
pgpK7xb2dym1B.pgp
Description: PGP signature
> is it just me or has the hidden-wiki disappeared?
Perhaps it was down when you checked or something else went wrong, regardless,
it's there (and worked for me) now.
> I noticed that, by connecting to some https domains from some exitnodes, I
> receive a warning of a false certificate. Closing the circuit and using
> another one (so another exit node) makes the things back to normal.
>
> I could identify only one exitnode, have still doubts for 2 others
>
> bac
t to silence you, which is why I
eventually fled that country (I'm not saying you should leave your country,
leaving your friends, family, everybody, everything is .. quite sad, but ..
sometimes it is the only alternative to government torture and harassment)
--xiando(tm)
911 insid
tNode and a short list of fast
servers gives you lousy security properties. But you can if you want to.
--xiando(tm)
911 inside job. (Democrats + Republicans) == CFR
http://killtown.911review.org/ http://st911.org/
ing else
has installed a trojan, or Torpark left behind a trojan. It it doesn't then
it's Torpark itself which includes a trojan or is wrongly identified as a
trojan.
good luck.
--xiando(tm)
911 inside job. (Democrats + Republicans) == CFR
http://killtown.911review.org/ http://st911.org/
m and make evil
blocking-scripts. Having some Tor-hater download 2.2MB every hour is probably
sad and depressing.
> If there is any interest, I can package up the code and DB creation
> script and distribute it. Or, feel free to use the site where it
> is. Let me know.
Sexy. Put a link whe
able
and make a .bat file (instead of torpark.exe) which does the same?
start "Tor" /DTor /MIN tor.exe -f torrc.ini
start "Polipo" /DPolipo /MIN polipo-20060920.exe -c polipo.ini
"FirefoxPortable\FirefoxPortable.exe"
Just my random ramblings.
xiando
-- http://killtown.911review.org/
hblah.exit vhost, just sitename.com,
but it works for google & yahoo & most services who are so big & profitable
that they only run one site pr server/server cluster.
xiando
- 9/11 inside job, check the evidence at http://www.scholarsfor911truth.org/
45 matches
Mail list logo