[tor-talk] What's this error message and should a Tor user be concerned?

2011-11-04 Thread Andre Risling
The following error message appeared in the Message Log;

Oct 01 10:09:01.783 [Warning] Requested exit point '$SOME REALLY HUGE
NUMBER' is excluded or would refuse request. Closing.
Oct  01 10:09:02.356 [Warning] Making tunnel to dirserver failed.


Should I be concerned about it?  What does it mean?
.

-- 
http://www.fastmail.fm - One of many happy users:
  http://www.fastmail.fm/docs/quotes.html

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] WSJ- Google- Sonic Mr. Applebaum

2011-10-10 Thread Andre Risling
Here's how Google is a compliant slave.  

You still use Gmail?!

http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html#ixzz1aMoq8l2i

-- 
http://www.fastmail.fm - The professional email service

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Google and Gmail

2011-09-10 Thread Andre Risling
I've noticed a lot of people that are concerned about privacy and
security are using Gmail accounts.  

Do you really trust Google not to read your email and tell THE MAN what
you've been saying?


-- 
http://www.fastmail.fm - Access all of your messages and folders
  wherever you are

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor banned in Pakistan.

2011-09-10 Thread Andre Risling

On Saturday, September 10, 2011 9:55 PM, and...@torproject.org wrote:
 On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K
 bytes in 16 lines about:
 : Forgive my ignorance but why would there be any need to inspect
 : packets for tunnels?  Would the authorities not just ask every ISP
 : to monitor the IPs to which their clients are connecting and if they
 : are Tor nodes then the client must be reported.  AIUI all the ISP
 : can see is that a connection is made to the first Tor node.
 
 Because encryption is illegal, not ip addresses and port combinations.
 At the most basic level, they could just block tcp 443 and probably
 stop the most customers with that alone. If the ISPs really care, then
 deep packet inspection is the next probability to detect and block
 anything the dpi device claims is encrypted traffic.
 
 Bridges aren't public tor relays. So comparing a list of public tor
 relays and trying to catch bridge users will not work., 
 tor-talk@lists.torproject.org
 
 -- 
 Andrew

Does that mean even though Pakistan has banned encrypted traffic that
Tor can still work because users are connecting by way of bridges?



 pgp key: 0x74ED336B
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 

-- 
http://www.fastmail.fm - Does exactly what it says on the tin

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mac?

2011-09-09 Thread Andre Risling

-- 
  
  andr...@fastmail.fm


On Friday, September 09, 2011 11:08 AM, Julian Yon jul...@yon.org.uk
wrote:
 On 09/09/11 03:02, Andre Risling wrote:
  - Why would someone want to change (spoof) their MAC address?
 
 If you're an activist who travels the country and uses free WiFi to
 access the internet, you might not want to make it any easier for law
 enforcement to track your movements.
 
 
 Julian

I've forgotten already if someone answered thisbut with the 
free WiFi connections do they typically get your MAC address?

I've noticed in Ubuntu that when the computer is booted up and before I
connect to the web the computer needs the keyring password.  No matter
whether I try to change my  mac address that stupid keyring thing won't
let me do anything until it gets the answer it wants.  So the password
is entered and the computer connects the web (actually just to the
router to get the wireless signal) and then I change the MAC address.  
If I were trying to hide my mac address, no matter where I am, I have to
assume my real mac address would go out over the web or to the router
before I could change my address.

Is that correct?



 
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
 Email had 1 attachment:
 + signature.asc
   1k (application/pgp-signature)

-- 
http://www.fastmail.fm - Faster than the air-speed velocity of an
  unladen european swallow

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Mac?

2011-09-08 Thread Andre Risling
I've some questions about MAC address and changing it

- Why would someone want to change (spoof) their MAC address?

- Is a computers MAC address sent out whenever you connect to the web?

   -If it is, how often is it sent out?

- Who stores the MAC address of the computer you're using?  The ISP?  An
Webmail service?

-Does the Tor network capture and store Mac addresses?

Thanks for any help.  

-- 
http://www.fastmail.fm - Faster than the air-speed velocity of an
  unladen european swallow

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Mac?

2011-09-08 Thread Andre Risling

-- 
  
  andr...@fastmail.fm


On Thursday, September 08, 2011 7:32 PM, Seth David Schoen
sch...@eff.org wrote:
 Andre Risling writes:
 
  I've some questions about MAC address and changing it
  
  - Why would someone want to change (spoof) their MAC address?
 
 The MAC address usually identifies a particular physical computer
 to a local area network.  If someone doesn't want their physical
 computer to be recognized by a network, they might want to change
 the address.
 
 The most common reasons for this in practice are probably
 
 * Some networks let people use the network for free, but only for
   a limited period of time, or only on one occasion; this is
   enforced using MAC addresses, so changing MAC addresses lets
   people get around the restriction and continue using the
   network.  For example, an airport or university wifi network
   might let a guest use the network for 30 minutes without
   paying or registering.
 
 * Some networks might ban someone they consider abusive or
   unwelcome using the MAC address (for example, an open wifi
   network where someone has used it in a way that the operator
   considered abusive or excessive).  In that case, the person
   who was banned might change their MAC address to get around
   the ban.
 
 * ISPs might record or log MAC addresses, which could be used for
   commercial or law enforcement purposes, so someone who doesn't
   want to end up in such logs might use a false or random MAC
   address.  In some places, law enforcement might pressure or
   require the ISPs to keep these logs as a way of trying to catch
   people accused of breaking the law, or as a way of providing
   corroborating evidence after-the-fact when a suspect is caught.
 
 * Although it's not known to happen on a large scale, other people
   on a LAN with you could detect and log your MAC address to
   monitor when your computer is physically present on the LAN
   (perhaps to learn or make a profile of when you're present at
   a certain place that you're known to visit periodically?), so
   changing your MAC address would let you avoid this kind of
   monitoring.
 
 * Some ISPs use a clumsy policy where the subscriber's observed
   MAC address is not allowed to change frequently (sometimes
   because of somewhat obsolete ISP billing systems that used the
   MAC address to identify the subscriber, or sometimes because
   of old ISP policies meant to discourage people from using more
   than one computer with a single account).  In this case,
   people may change the MAC address of one computer (or a wifi
   router) to match the address of a different computer (which
   is called cloning).  This could also be used by someone
   who has paid for a certain amount of Internet access on a paid
   wifi network (say, in an airport or hotel) let a friend take
   over using the access when the first person is all done.
 
  - Is a computers MAC address sent out whenever you connect to the web?
  
 -If it is, how often is it sent out?
 
 It's sent out to the local router but not out over the Internet,
 so web servers, for example, can't observe it.  You have to be on
 the same LAN in order to observe it.
 
  - Who stores the MAC address of the computer you're using?  The ISP?  An
  Webmail service?
 
 Whoever operates the local router can store it (e.g., if you're on a
 friend's wifi, the friend could store it; if you're on a commercial
 wifi network, the commercial wifi operator could store it; if you're
 directly plugged into a cable modem owned by an ISP, the ISP could
 program the cable modem to store it; ...).
 
 An exception is that some software could deliberately choose to
 transmit the MAC address for its own reasons, like enforcing
 anti-copying restrictions or because of a weird choice to use the
 MAC address to identify individual computers for some other reason.
 There's nothing about how the Internet works that _requires_ any
 software to do this, and it's probably not common.
 
  -Does the Tor network capture and store Mac addresses?
 
 Nope, never.
 
 -- 
 Seth Schoen  sch...@eff.org
 Senior Staff Technologist   https://www.eff.org/
 Electronic Frontier Foundation  https://www.eff.org/join
 454 Shotwell Street, San Francisco, CA  94110   +1 415 436 9333 x107
 ___
 tor-talk mailing list
 tor-talk@lists.torproject.org
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
Excellent!  Thank you for the thorough answers.

-- 
http://www.fastmail.fm - The way an email service should be

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk