Re: PrivacyNow

2010-03-23 Thread Georg Sluyterman
downie - wrote, On 2010-03-23 20:27:
 Hi,
 would the owner of exit PrivacyNow (reportedly in Denmark) please turn off 
 blacklisting of sites in their OpenDNS account?

Or even better, use the resolvers from:

http://censurfridns.dk/

-- 
Regards
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: tor-ramdisk testing needed.

2010-01-03 Thread Georg Sluyterman
basile wrote, On 2010-01-03 16:22:
 Hi everyone,
 
 Last time I released tor-ramdisk, Georg Sluyterman requested that I add
 the option of allowing the user to manually set a DNS server when
 acquiring an IP address via DHCP.   I added that feature with the next
 release which will be based on tor-0.2.1.21 (bumped from .20).  The
 image is being tested now before release.  Anyone want to test the new
 feature? *nudges Georg*
 
 Prerelease images:
 http://opensource.dyc.edu/pub/tor-ramdisk/archives/images.testing/
 
 Bug reports: http://opensource.dyc.edu/flyspray/
 

Great. Thanks for implementing the feature!

My exit-node is running right now, and everything seems to work.

I am using one of the publicly available DNS-resolvers at
http://censurfridns.dk/

(i don't like OpenDNS since they also filter and give false answers.).

-- 
Venlig hilsen
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Danish TPB DNS Blocks

2009-11-25 Thread Georg Sluyterman
Flamsmark wrote, On 2009-11-25 04:33:
 A number of Danish ISPs have blocked thepiratebay.org, by redirecting the
 DNS entry for that domain to a page stating that the site is blocked. This
 sometimes results in Danish exits giving this inappropriate result for that
 domain. Should the IP addresses of those ISPs be automatically given the
 badexit flag, since they don't do DNS in a correct and neutral way?
 

Have you tried e-mailing the ones giving the problem (if they have any
contact-info)?

I must admit that i did not think of this when i set up my danish
exit-node. I have changed it to OpenDNS now.
I hate censorship. Stupid stupid IFPI et al.

-- 
Venlig hilsen
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?

2009-11-25 Thread Georg Sluyterman
Georg Sluyterman wrote, On 2009-11-25 18:29:
---cut
 I have changed it to OpenDNS now.
---cut---

Or maybe not.. It seems that i can not get an IP via DHCP and manually
change the DNS-resolver address, because (as far as i can see) shell
support is removed in recent Tor-ramdisk releases. What do i do then?

-- 
Regards
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?

2009-11-25 Thread Georg Sluyterman
Flamsmark wrote, On 2009-11-25 20:52:
 Perhaps you'll just have to wait for the developer to fix the problem?

I will send a feature request :-)

-- 
Venlig hilsen
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Reduce hops when privacy level allows to save Tor network bandwidth

2009-11-17 Thread Georg Sluyterman
Erilenz wrote, On 2009-11-17 14:57:
 The following occured to me. Tor is designed to protect users from
 traffic analysis by very technical adversaries. There are many use
 cases where that level of protection isn't required. In those cases,
 if there was a config option to reduce the number of hops in a circuit
 to 2 (or possibly even 1), then users would be able to get themselves a
 more responsive circuit, whilst saving the Tor network overall
 bandwidth.
 
 In a three hop circuit, when x contacts y, the Tor network ends up
 having to transfer 4X the data:
 
 x -(1) Entry -(2) Middle -(3) Exit -(4) y
 
 In a 2 hop circuit it only has to transfer 75% of that:
 
 x -(1) Entry -(2) Exit -(3) y
 

If you send a 1 kByte packet through a Tor node (lets forget the
overhead for now), the Tor node has to download the packet and upload it
to the next node (or endpoint) which equals 2 kByte traffic on the
internetconnection for the specific Tor node.

If you send a 1 kByte packet through Tor (again forget about overhead)
the traffic used in the network will be ~6 kByte (packetsize * 2 *
number_of_hops).

If you send through two hops instead of three, you will genereate 4
kByte traffic instead of 6 kByte. Thats 67% not 75%. You are forgetting
that between nodes, the packet has to be uploaded _and_ downloaded again
(both things cost bandwidth).

With regards to reducing the number of hops i agree with Andrew about
using something else than Tor.

-- 
Regards
Georg Sluyterman
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


New swedish survailance law.

2008-06-19 Thread Georg Sluyterman

FYI

Sweden has introduced a new law. A copy of all traffic crossing the 
borders of Sweden has to be delivered to an intelligence agency called FRA.
This affects nodes in Sweden, but also countries like Finland (80% of 
Finland's international traffic goes through Sweden.).


The law is set to take affect 2009-01-01.

http://www.thelocal.se/12534.html

--
Regards Georg Sluyterman
Denmark


Re: German Tor-Exitnode mailinglist ([EMAIL PROTECTED])

2008-03-08 Thread Georg Sluyterman
Dieter Zinke wrote:
 Well, germany and tor.
 
 I know that there are a lot of tor servers and i know
 they are fast and frequently used. But i would never
 ever use a german exit node. NEVER!
---snip---

Would you use exit-servers from Denmark? We also have data retention,
although not the exact same law as in Germany (but implemented from the
same EU-directive).

You should lobby the EU politicians in the parliament - there is a lack
of interest groups explaining the problems to them (i was just down
there for some weeks ago with a danish interest group. The politicians
told us that groups like us are very rare, and that they only get input
from big companies etc. with economic interests). So get up from the
chair and lobby, course nobody else is doing it! :-)

-- 
Regards
Georg Sluyterman


Re: TOR and non-contineous internet connections

2007-12-30 Thread Georg Sluyterman
Alexander W. Janssen wrote:
---snip---
 (...) although I wouldn't advice you run a Tor-node at
 home if you want to be an Exit-Node.
 

Why?

-- 
Regards Georg


Re: 20090101... - Dänemark

2007-11-18 Thread Georg Sluyterman
Eugen Leitl wrote:
 Data retention law has just been passed in Germany. Here's the list
 of who voted how 
 
   
 http://www.bundestag.de/parlament/plenargeschehen/abstimmung/20071109_teleueberwach.pdf
 
 This will be contested as unconstitutional, but in cases it
 will become law all Tor operators are required by law to start 
 logging 20090101. Similiar applies to the entire EU, but the
 dates and details might differ.
 

The details indeed does differ :-)

In Denmark, the implementation of the EU-directive (which is called
'logningsbekendtgørelsen')  is not bad news for Tor-operators.

If you have a Tor-server in Denmark, you don't have to log *anything*!
I have this in writing (from something called IT- og Telestyrelsen), if
anybody is interested.

Regarding to the danish 'version' of Vorratsdatenspeicherung
('logningsbekendtgørelsen'), you only have to log data, that you /know/.
That means, if you eg. have an open access point, then normally you do
not know which physical persons have a specific IP-address, and
therefore you do not have to log that.
If you are non-commercial (eg. Tor-operaters normally are), then you do
not have to log *anything*. That means a private open access point does
not have to be register anything.

So if you want to host a Tor-server somewhere in Denmark, feel free to
contact me by e-mail if i can be at any help.

-- 
Regards
Georg Sluyterman