Re: understanding problem, hidden services
I'd like to second Bernd's question (see his OP, I won't quote it all here). This is a hazy area in my understanding of Tor, yet a clear understanding is important. Someone, kindly answer? -- Theodore Bagwell torus...@imap.cc On Sat, 22 Jan 2011 13:57 +0100, Bernd Kreuss prof7...@googlemail.com wrote: Hi, SNIP How does it really work? -- http://www.fastmail.fm - Does exactly what it says on the tin *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Dmytrij's anonymous VPS
I would be interested. But how anonymous are bitcoins? With traditional money, only the government gets to watch you spend it. With BitCoin, now the entire community gets to watch! On Mon, 06 Dec 2010 22:01 +0100, Moritz Bartl mor...@torservers.net wrote: From http://www.bitcoin.org/smf/index.php?topic=1905.0 - quote - Hello bitcoiners, I'm investigating if here is a demand for anonymous VPS (virtual private servers) service. I have multicore beast server lying around, many years experiences with linux administration and also experiences with Tor hidden services. I was thinking about anonymous VPS many years before. There were attemps to do on Tor network, but payments were always problem. There were some free hostings, but quality was always poor. I found bitcoins recently and now feel I have all pieces to do VPS hosting powerful and thanks to bitcoins - really anonymous. My idea is simple - provide no question service. I don't know my customers is and customers don't know who I am. This is huge advantage in contrast to Vekja because nobody know where the server is located and how to shut down it. I provide 1 or more CPU cores, few hundreds MB RAM and few onion addresses routed to VPS ports. Customer will send me few bitcoins every week. Simple. Only one pitfail is here. Because of strong anonymity, all inbound and outbound traffic is routed to Tor network. No direct connection to Internet. Never. It makes system management slower, but anonymity is the main concern. Users can access server using Tor network or directly from Internet using great service http://tor2web.com/ (hidden services are indexed by Google). Price. My offer is 1 core @ 3GHz and 512MB RAM, SLA 99% (minus glitches on Tor network) for 30 bitcoins per week. But I'm open to discussion here for first users. I need at least 3 users to pay housing. Please comment here or send me anonymous message to https://privacybox.de/dmytrij.msg I swear to send 20% of bitcoins to providers of torservers.net and tor2web.com. First one because they are Tor relay providers accepting bitcoins and second one cause their service is needed for my anonymous VPS. They do not accept bitcoins yet, but I expect it is temporary Smiley. Cheers, Dmytrij *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ -- http://www.fastmail.fm - One of many happy users: http://www.fastmail.fm/docs/quotes.html *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Active Attacks - Already in Progress?
On Sun, 28 Nov 2010 17:54 -0800, Mike Perry mikepe...@fscked.org wrote: Rather than cripple the network by forcing more clients to use slower nodes more often, we have opted to try to document the process of running a high capacity Tor exit node: http://archives.seul.org/tor/relays/Aug-2010/msg00034.html In my research (posted earlier to this list), I did not find an issue with exit relays. The relays which were reliably chosen as part of my circuit were often the first or second relay in my circuit - not the exit relay. Please help us to create the network we *wish* we had. I'm running a relay of my own, no worries. -- http://www.fastmail.fm - Accessible with your email software or over the web *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
Re: Active Attacks - Already in Progress?
I don't take issue with these particular nodes, nor the method in which they are multiplied. What concerns me is that any single entity (person/organization) is capable of convincing my Tor client to use it in the majority of circuits I build. The clusters I pointed out before have been vouched for by the community, and that's fine, let's assume they're not evil. But the fact remains that nobody - good or evil - should be capable of making themselves a party in my circuit with such reliability. -- Theodore Bagwell torus...@imap.cc On Thu, 25 Nov 2010 14:46 +0100, Olaf Selke olaf.se...@blutmagie.de wrote: On 25.11.2010 08:17, Damian Johnson wrote: The reason the operators of the largest tor relays (Blutmagie, TorServers, and Amunet) operate multiple instance is because this is the best way in practice for utilizing large connections. yep, all four blutmagie nodes are running on a single quad core cpu. The Tor application doesn't scale very well with the number of cores. Thus starting multiple instances on a single piece of hardware is the cheapest option to make use of a gigabit uplink. Olaf *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/ -- http://www.fastmail.fm - Email service worth paying for. Try it for free *** To unsubscribe, send an e-mail to majord...@torproject.org with unsubscribe or-talkin the body. http://archives.seul.org/or/talk/