Re: understanding problem, hidden services

2011-01-24 Thread Theodore Bagwell
I'd like to second Bernd's question (see his OP, I won't quote it all
here). This is a hazy area in my understanding of Tor, yet a clear
understanding is important. Someone, kindly answer?
-- 
  Theodore Bagwell
  torus...@imap.cc


On Sat, 22 Jan 2011 13:57 +0100, Bernd Kreuss
prof7...@googlemail.com wrote:
 Hi,
 SNIP
 How does it really work?

-- 
http://www.fastmail.fm - Does exactly what it says on the tin

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Dmytrij's anonymous VPS

2010-12-06 Thread Theodore Bagwell
I would be interested.

But how anonymous are bitcoins? With traditional money, only the
government gets to watch you spend it. With BitCoin, now the entire
community gets to watch!

On Mon, 06 Dec 2010 22:01 +0100, Moritz Bartl mor...@torservers.net
wrote:
 
 From
 http://www.bitcoin.org/smf/index.php?topic=1905.0
 
 - quote -
 Hello bitcoiners,
 
 I'm investigating if here is a demand for anonymous VPS (virtual
 private servers) service. I have multicore beast server lying around,
 many years experiences with linux administration and also experiences
 with Tor hidden services.
 
 I was thinking about anonymous VPS many years before. There were
 attemps to do on Tor network, but payments were always problem. There
 were some free hostings, but quality was always poor. I found bitcoins
 recently and now feel I have all pieces to do VPS hosting powerful and
 thanks to bitcoins - really anonymous.
 
 My idea is simple - provide no question service. I don't know my
 customers is and customers don't know who I am. This is huge advantage
 in contrast to Vekja because nobody know where the server is located
  and
 how to shut down it. I provide 1 or more CPU cores, few hundreds MB RAM
 and few onion addresses routed to VPS ports. Customer
 will send me few bitcoins every week. Simple.
 
 Only one pitfail is here. Because of strong anonymity, all inbound and
 outbound traffic is routed to Tor network. No direct connection to
 Internet. Never. It makes system management slower, but anonymity is
 the main concern.
 
 Users can access server using Tor network or directly from Internet
 using great service http://tor2web.com/ (hidden services are indexed by
   Google).
 
 Price. My offer is 1 core @ 3GHz and 512MB RAM, SLA 99% (minus glitches
 on
 Tor network) for 30 bitcoins per week. But I'm open to discussion here
 for first users. I need at least 3 users to pay housing. Please comment
 here or send me anonymous message to https://privacybox.de/dmytrij.msg
 
 I swear to send 20% of bitcoins to providers of torservers.net and
 tor2web.com. First one because they are Tor relay providers accepting
 bitcoins and second one cause their service is needed for my
 anonymous VPS. They do not accept bitcoins yet, but I expect it is
 temporary Smiley.
 
   Cheers,
 Dmytrij
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 

-- 
http://www.fastmail.fm - One of many happy users:
  http://www.fastmail.fm/docs/quotes.html

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Active Attacks - Already in Progress?

2010-11-29 Thread Theodore Bagwell
On Sun, 28 Nov 2010 17:54 -0800, Mike Perry mikepe...@fscked.org
wrote:
 Rather than cripple the network by forcing more clients to use slower
 nodes more often, we have opted to try to document the process of
 running a high capacity Tor exit node:
 http://archives.seul.org/tor/relays/Aug-2010/msg00034.html

In my research (posted earlier to this list), I did not find an issue
with exit relays. The relays which were reliably chosen as part of my
circuit were often the first or second relay in my circuit - not the
exit relay.

 Please help us to create the network we *wish* we had.

I'm running a relay of my own, no worries.

-- 
http://www.fastmail.fm - Accessible with your email software
  or over the web

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/


Re: Active Attacks - Already in Progress?

2010-11-28 Thread Theodore Bagwell
I don't take issue with these particular nodes, nor the method in which
they are multiplied.

What concerns me is that any single entity (person/organization) is
capable of convincing my Tor client to use it in the majority of
circuits I build. The clusters I pointed out before have been vouched
for by the community, and that's fine, let's assume they're not evil.
But the fact remains that nobody - good or evil - should be capable of
making themselves a party in my circuit with such reliability.
-- 
  Theodore Bagwell
  torus...@imap.cc


On Thu, 25 Nov 2010 14:46 +0100, Olaf Selke olaf.se...@blutmagie.de
wrote:
 On 25.11.2010 08:17, Damian Johnson wrote:
  The reason the operators of the largest tor relays (Blutmagie,
  TorServers, and Amunet) operate multiple instance is because this is
  the best way in practice for utilizing large connections. 
 
 yep, all four blutmagie nodes are running on a single quad core cpu. The
 Tor application doesn't scale very well with the number of cores. Thus
 starting multiple instances on a single piece of hardware is the
 cheapest option to make use of a gigabit uplink.
 
 Olaf
 ***
 To unsubscribe, send an e-mail to majord...@torproject.org with
 unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
 

-- 
http://www.fastmail.fm - Email service worth paying for. Try it for free

***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/