[tor-talk] What's this error message and should a Tor user be concerned?
The following error message appeared in the Message Log; Oct 01 10:09:01.783 [Warning] Requested exit point '$SOME REALLY HUGE NUMBER' is excluded or would refuse request. Closing. Oct 01 10:09:02.356 [Warning] Making tunnel to dirserver failed. Should I be concerned about it? What does it mean? . -- http://www.fastmail.fm - One of many happy users: http://www.fastmail.fm/docs/quotes.html ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] WSJ- Google- Sonic Mr. Applebaum
Here's how Google is a compliant slave. You still use Gmail?! http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html#ixzz1aMoq8l2i -- http://www.fastmail.fm - The professional email service ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Google and Gmail
I've noticed a lot of people that are concerned about privacy and security are using Gmail accounts. Do you really trust Google not to read your email and tell THE MAN what you've been saying? -- http://www.fastmail.fm - Access all of your messages and folders wherever you are ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor banned in Pakistan.
On Saturday, September 10, 2011 9:55 PM, and...@torproject.org wrote: On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K bytes in 16 lines about: : Forgive my ignorance but why would there be any need to inspect : packets for tunnels? Would the authorities not just ask every ISP : to monitor the IPs to which their clients are connecting and if they : are Tor nodes then the client must be reported. AIUI all the ISP : can see is that a connection is made to the first Tor node. Because encryption is illegal, not ip addresses and port combinations. At the most basic level, they could just block tcp 443 and probably stop the most customers with that alone. If the ISPs really care, then deep packet inspection is the next probability to detect and block anything the dpi device claims is encrypted traffic. Bridges aren't public tor relays. So comparing a list of public tor relays and trying to catch bridge users will not work., tor-talk@lists.torproject.org -- Andrew Does that mean even though Pakistan has banned encrypted traffic that Tor can still work because users are connecting by way of bridges? pgp key: 0x74ED336B ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- http://www.fastmail.fm - Does exactly what it says on the tin ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Mac?
-- andr...@fastmail.fm On Friday, September 09, 2011 11:08 AM, Julian Yon jul...@yon.org.uk wrote: On 09/09/11 03:02, Andre Risling wrote: - Why would someone want to change (spoof) their MAC address? If you're an activist who travels the country and uses free WiFi to access the internet, you might not want to make it any easier for law enforcement to track your movements. Julian I've forgotten already if someone answered thisbut with the free WiFi connections do they typically get your MAC address? I've noticed in Ubuntu that when the computer is booted up and before I connect to the web the computer needs the keyring password. No matter whether I try to change my mac address that stupid keyring thing won't let me do anything until it gets the answer it wants. So the password is entered and the computer connects the web (actually just to the router to get the wireless signal) and then I change the MAC address. If I were trying to hide my mac address, no matter where I am, I have to assume my real mac address would go out over the web or to the router before I could change my address. Is that correct? ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk Email had 1 attachment: + signature.asc 1k (application/pgp-signature) -- http://www.fastmail.fm - Faster than the air-speed velocity of an unladen european swallow ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Mac?
I've some questions about MAC address and changing it - Why would someone want to change (spoof) their MAC address? - Is a computers MAC address sent out whenever you connect to the web? -If it is, how often is it sent out? - Who stores the MAC address of the computer you're using? The ISP? An Webmail service? -Does the Tor network capture and store Mac addresses? Thanks for any help. -- http://www.fastmail.fm - Faster than the air-speed velocity of an unladen european swallow ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Mac?
-- andr...@fastmail.fm On Thursday, September 08, 2011 7:32 PM, Seth David Schoen sch...@eff.org wrote: Andre Risling writes: I've some questions about MAC address and changing it - Why would someone want to change (spoof) their MAC address? The MAC address usually identifies a particular physical computer to a local area network. If someone doesn't want their physical computer to be recognized by a network, they might want to change the address. The most common reasons for this in practice are probably * Some networks let people use the network for free, but only for a limited period of time, or only on one occasion; this is enforced using MAC addresses, so changing MAC addresses lets people get around the restriction and continue using the network. For example, an airport or university wifi network might let a guest use the network for 30 minutes without paying or registering. * Some networks might ban someone they consider abusive or unwelcome using the MAC address (for example, an open wifi network where someone has used it in a way that the operator considered abusive or excessive). In that case, the person who was banned might change their MAC address to get around the ban. * ISPs might record or log MAC addresses, which could be used for commercial or law enforcement purposes, so someone who doesn't want to end up in such logs might use a false or random MAC address. In some places, law enforcement might pressure or require the ISPs to keep these logs as a way of trying to catch people accused of breaking the law, or as a way of providing corroborating evidence after-the-fact when a suspect is caught. * Although it's not known to happen on a large scale, other people on a LAN with you could detect and log your MAC address to monitor when your computer is physically present on the LAN (perhaps to learn or make a profile of when you're present at a certain place that you're known to visit periodically?), so changing your MAC address would let you avoid this kind of monitoring. * Some ISPs use a clumsy policy where the subscriber's observed MAC address is not allowed to change frequently (sometimes because of somewhat obsolete ISP billing systems that used the MAC address to identify the subscriber, or sometimes because of old ISP policies meant to discourage people from using more than one computer with a single account). In this case, people may change the MAC address of one computer (or a wifi router) to match the address of a different computer (which is called cloning). This could also be used by someone who has paid for a certain amount of Internet access on a paid wifi network (say, in an airport or hotel) let a friend take over using the access when the first person is all done. - Is a computers MAC address sent out whenever you connect to the web? -If it is, how often is it sent out? It's sent out to the local router but not out over the Internet, so web servers, for example, can't observe it. You have to be on the same LAN in order to observe it. - Who stores the MAC address of the computer you're using? The ISP? An Webmail service? Whoever operates the local router can store it (e.g., if you're on a friend's wifi, the friend could store it; if you're on a commercial wifi network, the commercial wifi operator could store it; if you're directly plugged into a cable modem owned by an ISP, the ISP could program the cable modem to store it; ...). An exception is that some software could deliberately choose to transmit the MAC address for its own reasons, like enforcing anti-copying restrictions or because of a weird choice to use the MAC address to identify individual computers for some other reason. There's nothing about how the Internet works that _requires_ any software to do this, and it's probably not common. -Does the Tor network capture and store Mac addresses? Nope, never. -- Seth Schoen sch...@eff.org Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 454 Shotwell Street, San Francisco, CA 94110 +1 415 436 9333 x107 ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk Excellent! Thank you for the thorough answers. -- http://www.fastmail.fm - The way an email service should be ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk