[tor-talk] Tor relay data usage

2012-04-11 Thread Anthony Papillion

So i set up a Tor relay a few hours ago (around 3:30, it's 10:15 now) and, so 
far, it's used about 700mb of traffic (about 350 up and down).Is this normal or 
do I need to tweak something?
Anthony   
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor relay data usage

2012-04-12 Thread Anthony Papillion

> Date: Thu, 12 Apr 2012 08:25:04 +0200
> From: tichodr...@posteo.de
> To: tor-talk@lists.torproject.org
> Subject: Re: [tor-talk] Tor relay data usage
> 
> Hi,
> 
> Am 12.04.2012 05:16, schrieb Anthony Papillion:
> > So i set up a Tor relay a few hours ago (around 3:30, it's 10:15 now)
> > and, so far, it's used about 700mb of traffic (about 350 up and
> > down).Is this normal or do I need to tweak something?
> 
> Do you want more or less traffic? What are your current setting of the 
> various BandwidthRate options?

Well, right now, I'd like it to use less. Mostly because I'm on an AT&T DSL 
line and capped at 100gb of traffic before they charge me more. Right now, Tor 
looks like it's on track to use ~1gb a day which is only ~30gb a month but I'm 
not sure I want it to use that much all the time.
My bandwidth is set to >1.5 so I assume I just need to bring that down and I'll 
be good to go, right?
Anthony   
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Question about exits

2012-05-26 Thread Anthony Papillion
This is going to be an amazingly silly question and I will admit ahead  
of time that I've not fully reviewed the source code to find the  
answer but I'm going to ask anyway.


If I run a Tor exit node and use Tor myself, is there any chance that  
my own traffic might exit my own node?  Of course, if this were to  
happen, I'd still have plausible deniability since I'd be running an  
exit node but it would still be too close for comfort!


Thanks,
Anthony

--
Sent from my mobile device
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] OT: TorMail Question

2012-06-08 Thread Anthony Papillion

Does anyone know of a good/recommended way to contact the admins of TorMail?
Thanks1Anthony
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Hiding the server

2012-07-11 Thread Anthony Papillion
I know that Tor does a good job at protecting users from discovery but  
what about the server? Is it as hard to find as the clients? I'm  
thinking no. Also, is there a good a goo aT to protect the server from  
location discovery?


Thanks,
Anthony

--
Sent from my mobile device
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] simple example in ruby

2012-08-10 Thread Anthony Papillion
> From: gruby...@tormail.org
> 
> Please send me a simple example in Ruby lua or C.
> How I can read from onion adress.
> 
> connect to ypr7i2smxhcjalla.onion
> sock.write("string")
> and get ansver.
> 
> I need simple 2way communication. No comunication outside tor only inside.

Wouldn't you want to connect to the proxy first? I believe Tor just acts like a 
regular  SOCKS4 (5?) proxy. So I'd assume to connect to an onion address, you'd 
first have to get into the proxy. Of course, I could also be completely wrong.

Anthony
  
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] tor virus

2012-08-15 Thread Anthony Papillion
I like this idea. But I don't think it's something the core Tor devs should be 
working on. Too many ethical questions and too many 'gotchas' if things go 
wrong. Perhaps it's something an independent dev might want to take on but I'd 
keep it completely separate from Tor at all costs.

Anthony

> Date: Mon, 13 Aug 2012 22:36:03 +0200
> From: ethio...@gmail.com
> To: tor-talk@lists.torproject.org
> Subject: [tor-talk] tor virus
> 
> I am from Ethiopia. The problem faced by descendants in Ethiopia is many
> fold. 90 million people, a brutal repressive government by any standard, a
> single government owned ISP that has more  government spies  than actual
> telecommunication workers, a very poor and limited mobile and data
> infrastructure and sophisticated snooping (
> https://blog.torproject.org/blog/ethiopia-introduces-deep-packet-inspection)
> regime. Certainly tor could benefit many people if it could be used
> "widely". But with all the above problems how? And it just occurred to me!!
> 
> I am not a coder so I don't know if it is possible. I am not certain what
> ethical questions it could raise or if it should at all under the above
> circumstance.
> 
> Most of the PCs in the country are in government offices or given to
> government workers. And most of this PCs are the only once that has a
> relatively fast and free Internet access. Some thing that is common about
> all this PCs is that most of them are full of virus and Trojan horses (some
> say Chinese origin). Even state minsters offices. I am sure by now you are
> guessing where I am going with this.
> 
> What if there is a tor "virus" (pardon for the choice of word) that can
> infect such pc and make a relay, bridge, or what ever on the background
> undetected. Or that could be installed by some one and stay hidden and do
> it's job.
> 
> I have a feeling that if it were a smart idea some one would have thought
> of it but I could not sleep until I know how stupid an idea it is.
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
  
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Any way to get around a wide view of the network?

2012-09-19 Thread Anthony Papillion
It's widely believed that an attacker with a sufficiently wide view of the 
Internet could unmask and identify Tor users. For example, if 3195 bytes go 
into a specific entry node and 3195 bytes come out of an exit node a few 
seconds later, chances are pretty good it's you.

I'm wondering if there are any ongoing efforts to get around this issue?

Thanks,
Anthony   
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] A question about mac addresses

2012-09-22 Thread Anthony Papillion
I'm not a networking guy. Sure, I can build a small business LAN but I'm a 
software engineer and not a network guy. So please excuse me if this question 
sounds stupid.

Can a remote website know my mac address?
If so, does Tor protect me from this?

Thanks!
Anthony   
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Can I trust Tormail

2012-11-04 Thread Anthony Papillion
Assume all of your communications on any channel you don't control to  
be compromised and treat it as such. Protect your communications  
independently.


--
Sent from my mobile device

On Nov 3, 2012, at 6:07 AM, "HardKor"  wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello,

I wonder if someone knows more about the team that is behind Tormail.

I see a lot of people using this service and I would like to have an  
idea
about how much I could trust the Tormail admins to not read / expose  
my

communications.

Thank you,

HardKor

5845 16EB 0589 B89A 5E6E  98DE 74F5 F875 6D34 45F9
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=EjHM
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Question about using Thunderbird + EnigMail/GnuPG

2012-11-20 Thread Anthony Papillion
Hello Everyone,

A friend of mine recently read something (I don't know what) that made him 
think that there were some issue using Thunderbird with Tor that might 
compromise your anonymity. I told him I thought it was probably a configuration 
issue that could result in DNS leaking if not properly configured.

Is Thunderbird safe to use with Tor?

Also, what about EnigMail and GnuPG? I read something that said there could be 
some compromising issues using these with Tor as well. Is this true? What is 
the recommended workaround? Encrypt outside of email then copy/paste?

Thanks!
Anthony   
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How easy are Tor hidden services to locate?

2013-03-06 Thread Anthony Papillion
I'm involved in a project that will ultimately run a website as a  
hidden service.  Because of the content if the site (not child porn or  
gambling) we're concerned about how easy a Tor connected server is to  
find. Also, are there best practices to securely hosting a server on  
Tor?


Thank,
Anthony

--
Sent from my mobile device
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Odd behavior when running Tor from encrypted thumb drive

2013-03-29 Thread Anthony Papillion
Hello Everyone,

I've run into a little snag with the latest TBB that I'm not sure how to
work around.

I created a TrueCrypt container of about 2GB on a thumb drive. I then
downloaded TBB and stored it in this encrypted container. When I try to
launch TBB, Vidalia starts fine and it even shows that I've successfully
negotiated a connected to the network but the browser never opens.

If it matters, I'm running XUbuntu 11.10.

Any idea why that might be or how to fix it?

Thanks,
Anthony

-- 
Anthony Papillion
Advanced Data Concepts
www.adcl.us
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] NSA supercomputer

2013-04-05 Thread Anthony Papillion
On 04/05/2013 01:01 PM, Andrew F wrote:
> 
> Basically he said that with quantum computing all bets are off and every
> cipher today will likely be cracked. Quantum computing will require new
> kinds of ciphers and only those with Qcomputers will be able to decrypt the
> messages.

Not entirely correct, as I understand it. Granted, quantum computing
will shred most (all?) of the ciphers we currently use. But that's
mostly because they will be able to do massively efficient prime
factorization using something like Shor's algorithm
(https://en.wikipedia.org/wiki/Shor%27s_algorithm). If I understand
correctly, resisting such technology doesn't require creating a cipher
that takes a quantum computer to decrypt but one that is resistant to
efficient factorization.


Just my $0.02,
Anthony
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Cicpa

2013-04-17 Thread Anthony Papillion
On 04/17/2013 05:47 PM, krishna e bera wrote:
> On Wed, 17 Apr 2013 20:33:21 +
> andrewfriedman  wrote:
> 
>> CiCpa just passed the house.  Overwhelming support.  Now it goes to the 
>> Senate.
>> If this law passes, will it affect Tor?  Well we loose right to use Tor?
>>
>> I don't know if this the right place for this, if not please tell me and 
>> I will post in the appropriate spot.

I'm not sure if you're talking about the CyberSecurity bill (HR 624 or
CISPA) but, if you are, it doesn't look like it passed today. They voted
on a few amendments to it but not the main bill (unless I'm reading it
totally wrong).

http://clerk.house.gov/evs/2013/index.asp


-- 
Anthony Papillion
Advanced Data Concepts
www.adcl.us
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Cicpa

2013-04-17 Thread Anthony Papillion
On 04/17/2013 06:24 PM, Anthony Papillion wrote:
> On 04/17/2013 05:47 PM, krishna e bera wrote:
>> On Wed, 17 Apr 2013 20:33:21 +
>> andrewfriedman  wrote:
>>
>>> CiCpa just passed the house.  Overwhelming support.  Now it goes to the 
>>> Senate.
>>> If this law passes, will it affect Tor?  Well we loose right to use Tor?
>>>
>>> I don't know if this the right place for this, if not please tell me and 
>>> I will post in the appropriate spot.
> 
> I'm not sure if you're talking about the CyberSecurity bill (HR 624 or
> CISPA) but, if you are, it doesn't look like it passed today. They voted
> on a few amendments to it but not the main bill (unless I'm reading it
> totally wrong).
> 
> http://clerk.house.gov/evs/2013/index.asp

Actually, I may be mistaken. It hasn't been added to the list yet but
multiple places are reporting that it's passed the House. My apologies.


-- 
Anthony Papillion
Advanced Data Concepts
www.adcl.us
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor project creating a replacement for TrueCrypt?

2013-04-18 Thread Anthony Papillion
Hello Everyone,

Someone I  know said that he read that the project was creating a
replacement for TrueCrypt. Can anyone verify this as accurate or not? If
it is accurate, how far along is the work and where can I find more
information?

Thanks!
Anthony Papillion

-- 
Anthony Papillion
Advanced Data Concepts
www.adcl.us
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor's reputation problem with pedo, some easy steps the community could take

2013-04-29 Thread Anthony Papillion
On 04/29/2013 02:30 PM, Chris Patti wrote:
> 
> Directly pursuant to this, and to my original note: What about a simpler
> solution?
> 
> What about simply scouring all the directories, removing links to the pedo
> sites?

This would be a public relations nightmare for the project and a very
bad idea. People use Tor to *avoid* censorship. Imagine the horrible
press we'd get if the project actually *started* censoring content. Plus
you get to the issue of "where does it stop"? Once you start censoring
objectionable or illegal content, what criteria do you use to determine
which content fits?

> And by doing so, you create an environment where people, taking advantage
> of the incredibly awesome work folks have done with OnionBrowser, who
> aren't necessarily Tor savvy can get a sense for what the system can do and
> come away with a positive impression.

No. By doing so you create an environment where people don't trust Tor
any more than they do the open Internet. Some people already claim that
the Tor project is some super secret honeypot run by the US government.
Start censoring content and you'll hear that whine escalate to a howl
pretty quickly.

Anthony
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE

2013-06-17 Thread Anthony Papillion

Please forgive my top posting. Posting from a mobile device.

You seem to have been pretty active in the Tor community over the last  
decade. If the communications format is so horrible to you, why not do  
something about it?  Instead of going on a mailing list, using  
offensive language, and saying "why won't someone fix this", why don't  
*you* fix it?


Take a little time and learn how to properly and securely set up the  
software you think is needed and offer the project your services to  
host and run it.  That way, you'd have a solution to the problem and  
be officially backed by Tor.


Also, I'm surprised by your "Im done!" statement. Isn't your privacy  
worth a little more than convenient group communication. People don't  
stick with Tor because it's easy or has a great mailing list. The  
stick with it because they feel their privacy is more important than  
those things.


Just to reiterate: fix what you think is broken. Heck I'd even  
volunteer time to help you out if you needed it. Leaving isn't the  
answer: work is.


Anthony

--
Sent from my mobile device

On Jun 17, 2013, at 7:26 PM, "Cat S"  wrote:


Hi all,

This mailing-list is a stupid fucking joke, well, at least for those  
of us who aren't techies. Really, this is stupid, you're not  
allowing a lot of people to community by using this Ivory tower  
mailing-list crap.


I've been using Tor near 10 years now, and this has GOT to change.  
It's like Tor Project is stuck in the 20th Century! I know all the  
arguments about why Tor Project hasn't (and seemingly won't) offer a  
way for everyone to communicate, and they're valid but they're also  
bullshit. They're bullshit because you're all (or, at least most of  
you are) using them as an excuse to throw up your hands and start a  
stupid fucking stack exchange page . . . with all it's Fackbook  
integration and other crap users have to wade through :(


I will never donate another penny to Tor, and I've given quite a lot  
(anonymously) over the years, until a real solution is found. What  
the hell happened to the money that was supposedly ear-marked to  
write (or hack) a forum software?


"real solution" = discussion forum

I'm going to start an account at stack exchange and try my damndest  
to make my question in the top:
"Why won't the Tor Project support user-friendly form of anonymous  
communication - i.e., a discussion forum?"


Stop with the fucking madness! Just make a real solution and be done  
with it! Otherwise, decrease the lag time between when a message is  
posted on the mailing-list and when it reaches my inbox. I mean,  
what the hell?! Why does it take so effing long for an e-mail to  
reach my inbox when it's been up on the mailing-list for quite a  
while?! That's why it's so hard to use mailing-lists, there not  
instantaneous, so it's very hard to have a on-going conversion.


Mailing-lists suck Cartman's balls.

The Tor Project needs someone who ONLY cares about Tor's users, not  
about the code per se. Having the greatest Tor in the world is a  
great goal, but if you don't allow non-tech users a way to  
communicate your work's not worth a damn (as techies already now how  
to use these programs, the prole you're trying to help generally DO  
NOT - I know this because I teach many people how to use TBB).

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Routing Jitsi through Tor

2013-06-28 Thread Anthony Papillion
I've set up a XMPP server and my users are access through Jisti. I want
to allow them to connect via Tor if they want. But when I tried to help
a user set it up, it failed. We used the following information:

Proxy Type: SOCKS5
Proxy Server: localhost and 127.0.0.1
Proxy Port: 9050 and 9051

It simply sat there and did not connect. The alternate entries for Proxy
Server and Proxy Port are from two separate tries.

Is there something I'm missing here? Is Jisti able to be routed through Tor?

Thanks,
Anthony


-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
IM:  cypherpun...@jit.si

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Routing Jitsi through Tor

2013-06-29 Thread Anthony Papillion
On 06/29/2013 09:34 AM, Van Gegel wrote:
> 
> If you are using the latest TBB, try port 9150
> The better way is check SocksPort in torrc file
> But explained to how you are going to use the SMPP server and Jitsi? Do you 
> want to transmit voice over Tor or via a direct connection?

Great! Thanks, I'll try that.
As for how I'm going to do XMPP over Jitsi, yes, I'm wanting to allow my
users to route *everything* about the session over Tor if they want to.
I'm trying to offer as near complete anonymity as I can, even from me.
So the deal is that Jitsi should route everything: session signaling
information, call information, even the peer to peer connections made
for voice and video calls, over Tor.

I'm not too sure about voice and video though. Since that's done in a
p2p way, I'm thinking maybe those *can't* be routed through Tor?

Thanks,
Anthony


-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
IM:  cypherp...@patts.us

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Routing Jitsi through Tor

2013-06-29 Thread Anthony Papillion
On 06/29/2013 02:31 AM, grarpamp wrote:
>> I've set up a XMPP server and my users are access through Jisti. I want
>> to allow them to connect via Tor if they want. But when I tried to help
>> ...
>> Is there something I'm missing here? Is Jisti able to be routed through Tor?
> 
> Use socks5 127.0.0.1 9050.
> So long as what you're doing uses TCP, you should be fine.
> If you're traversing an exit, try issuing a NEWNYM.
> Try to offer encrypted service, and pin down and verify the cert of
> any service used.

Thank you for the feedback! OK so, after reading this, I think the user
just wasn't waiting long enough for the connection to complete. It's a
TCP service so that's not a problem and we had it configured for Tor
over 9050. The only thing that didn't happen was issuing a NEWNYM
command. But would that have stopped the connection from happening?

Also, a quick question about the encryption service. I'm offering
SSL/TLS connections to the service. Is that what you mean or are you
talking encrypting something else still?

Thanks,
Anthony
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Secure email with limited usable metadata

2013-06-30 Thread Anthony Papillion
I would think that simply finding a mail server that doesn't log
ANYTHING (like what StartMail is about to offer) and encrypting
everything should be enough. Of course, you'd need to trust that the
service really isn't logging anything but that could be solved by
accessing it via Tor.

So StartMail (when it opens) via Tor should do the trick.

Just a thought,
Anthony

On 06/30/2013 10:52 AM, alice-...@safe-mail.net wrote:
> everyone is tooting about pgp these. pgp encryption doesnt solve the problem 
> of tla surveillance. pgp encryption does not touch metadata (recipent, 
> sender).
> 
> how to secure mail communication?
> 
> i was thinking about pointing the mx record of the tld to a mail server that 
> is shared with other individuals. the server is configured to drop incoming 
> non-tls smtp connection from other mail server. On a per account basis, every 
> message that is not encrypted to the public pgp key of the address is 
> dropped, too. users use pop3/smtp over a hidden server to download/send 
> messages.
> 
> what do you think? the setup is easy to maintain. if inbox size is limited to 
> a few mbs any cheap vps thats like 20$ a year can be used to service hundreds 
> of thousands of accounts. a trusted umbrella organization is needed to 
> maintain the server as anonymity is increased by increasing users count. is 
> the tor project or torservers.net interested in running such a service? i 
> would literally pay money for that, so would others.
> ___
> tor-talk mailing list
> tor-talk@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> 

-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
IM:  cypherpun...@jit.si

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How intensely do you use Tor?

2013-07-04 Thread Anthony Papillion


On 07/03/2013 07:46 PM, Ted Smith wrote:
> On Wed, 2013-07-03 at 19:21 -0400, Griffin Boyce wrote:
>> I don't use Tor with Gmail, because Google blocks connections nearly 100%
>> of the time.
> 
> A Google employee posted how to avoid this -- you have to log into Gmail
> via Tor, solve whatever security puzzle they give you, then (using a
> non-Torbrowser browser) log in without Tor, disable Tor WITHOUT clearing
> cookies, and then log in via Tor.
> 
> After doing this, I haven't had trouble logging into Google services via
> Tor. 

But, after you've done all that, what's the point in actually using Tor
with Gmail?

Regards,
Anthony

-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
XMPP:  cypherp...@patts.us

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How intensely do you use Tor?

2013-07-04 Thread Anthony Papillion
On 07/03/2013 02:43 PM, anonymous coward wrote:
> How do you folks use Tor? Do you use it permanently for all your network
> connections or only from time to time for certain activities?
> 
> I think for certain things it does not make much sense to use Tor, for
> example for online banking. When I connect to my bank I am not anonymous
> anway. When I use ebay, I am not anonymous either, they have my adress,
> Paypal knows my adress. So to torify such things does not make much
> sense, doesn´t it?

I know a few people who've opted to use Tor for everything and, you're
right, it doesn't make a lot of sense in certain contexts. Personally, I
use Tor less and less these days as I've simply gotten pissed off enough
where I don't care if they know who I am or where I'm coming from. But
there are still a few times, mostly when doing research into things that
might get me a visit from the Feds, I'll use Tor. Not so much because
I'm afraid, but because I'd rather not deal with the hassle.

I also maintain an anonymous HushMail account via Tor since HushMail
generally doesn't have a huge problem with Tor connections.

Regards,
Anthony

-- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: sip:cajuntec...@iptel.org
iNum:+883510008360912
IM:  cypherp...@patts.us

www.papillion.me
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Need help configuring Hidden Service

2013-08-08 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello Everyone,

I'm trying to set up a new Hidden Service but I can't seem to get it
to work. First, I'm following the directions located here:

https://www.torproject.org/docs/tor-hidden-service.html.en

I'm using Vidalia to edit the torrc file. The original file when
opened in Vidalia looks like this:

# This file was generated by Tor; if you edit it, comments will not be
preserved

# The old torrc file was renamed to torrc.orig.1 or similar, and Tor
will ignore it

AvoidDiskWrites 1
ControlPort 9151
DataDirectory
/run/media/anthony/Storage/anthony/Software/tor-browser_en-US/Data/Tor
DirPort 9030
DirReqStatistics 0
ExitPolicy reject *:*
GeoIPFile ./Data/Tor/geoip
Log notice stdout
Nickname Unnamed
ORPort 9001
RelayBandwidthBurst 10485760
RelayBandwidthRate 5242880
SocksListenAddress 127.0.0.1
SocksPort 9150


What you see above is my entire torrc file. Now, at the end of the
file, I am appending the following two lines:

HiddenServiceDir /home/anthony/tor_hidden_service
HiddenServicePort 80 127.0.0.1:8080

I made sure that /home/anthony/tor_hidden_service existed. It does.

Now, when I try to apply my new torrc file, I get an "Error at line 1:
"" " error. When I look in the logs, I see the following two errors:

Aug 08 09:34:33.813 [Warning] HiddenServicePort with no preceding
HiddenServiceDir directive

Aug 08 09:34:33.813 [Warning] Controller gave us config lines that
didn't validate: Failed to configure rendezvous options. See logs for
details.

So, even though I'm following the docs, I can't seem to get this
working. Does anyone have any tips that might put me on the path to
Hidden Service rightousness?

Thanks!
Anthony

- -- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: 17772098...@in.callcentric.com
XMPP:cypherp...@patts.us
Website: www.cajuntechie.org


-BEGIN PGP SIGNATURE-
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=t1kT
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] SOLVED: Need help configuring Hidden Service

2013-08-08 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

It seems like the problem I experienced was with Vidalia. When I
edited the torrc file manually and put in the exact same information,
I had no problem getting the Hidden Service set up.

Hat tip to a fellow group member for the help.

Anthony

- -- 
Anthony Papillion
Phone:   1.918.533.9699
SIP: 17772098...@in.callcentric.com
XMPP:cypherp...@patts.us
Website: www.cajuntechie.org


-BEGIN PGP SIGNATURE-
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=Sfxb
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TOR bundle on hostile platforms: why?

2013-08-08 Thread Anthony Papillion
On 08/08/2013 11:23 AM, Thomas Hluechnik wrote:
> 
> Me personally would never use tor on a Windows host. Currently I am
> playing with OpenBSD because even Linux is getting too large for my
> taste because while having so much code its more easy to hide
> something inside.

Agreed. Neither would I. But there are people who, for whatever
reason, don't have a choice. Sure, it's not the most secure (or at
all) option for running Tor. But it does introduce a lot of Windows
users to Tor, makes them curious about security, and does, in many
cases, provide actual protection. It's not like Windows just
automatically sends Tor traffic to the government or Microsoft.

That said, I tend to agree with a statement that Jake makes a lot:
Windows users don't care about security. I used to balk at that as I
have  a lot of very security conscious friends who use Windows. But
then the whole PRISM stuff came out and, when they learned about it,
they did nothing. In fact, I don't know a single Windows user who left
Windows because of the revelations.

So I have to agree with Jake now: most Windows users don't actually
care about security.

> I was really happy when finding tails. This should be considered as
> the future for TOR: it doesnt matter if any DAU (german word for
> computer beginner) has its Windows computer full of backdoors and
> viruses. He just starts from USB or CD having an acceptable level
> of security.

Completely agree! TAILS should be in everyone who cares about their
Internet security's toolbag. It's dead easy to use - as easy as TBB -
but provides an amazingly higher level of security. Of course, this
might not be an option for people with older computers.

> So my mind: stop supporting Windows and even stop MacOS. Stop
> support for ANY closed source OS. In former years I played with tor
> on Sparc based hardware until I got aware that Sun is not willing
> to publish the sourcecode of its crypto libraries. This smells
> funny, isnt it?

I think this is a bad idea. It alienates Windows users and doesn't
give them ANY exposure to security software at all. If you stop
developing for Windows and MacOS, new users may never actually hear
about Tor or, if they do, they could be intimidated since Windows or
Mac is all they know. I think it's much better to continue to develop
for those platforms but strongly, consistently, and clearly, warn
users that they are still exposed and, in some cases, Tor may not do
anything for them at all, while advising them to move to a secure OS.

Users need education. Forcing them out won't help them become secure.
I deal with people like this every day. They won't move from Windows
or Mac to Linux or BSD to get more secure if you try to force them.
They will simply not use Tor.

Best,
Anthony

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Any issues using Bitmessage over Tor?

2013-08-30 Thread Anthony Papillion
A friend of mine connected his Bitmessage client to Tor and was warned
that it might be using a protocol that makes unsafe requests. Are there
any problems using Tor with Bitmessage? Is it possible since Bitmessage
is peer to peer?

Thanks,
Anthony
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Double HiddenService w/ Server Level Intercepting Request and Content Anonymization

2013-10-30 Thread Anthony Papillion
On 10/29/2013 08:48 AM, Manfred Ackermann wrote:
> Hi List.
> 
> Sorry to push this up, just wondering if this approach is such stupid that
> it's not even worth leaving a related comment to it ;-) Or is it just of no
> interest?
> 
> Any comments apriciated.

Hello Manfred,

Sounds like a fantastic idea. But I think I'm missing something that I'm
hoping you can clear me up on. How does this protect the user if the
first-in-line server is compromised? So the user connects to HS on
computer1 which is compromised. How does your system stop them from
being compromised instead of forwarded deeper into the network to computer2?

Cheers,
Anthony


-- 
Anthony Papillion
XMPP/Jabber:  cajuntec...@jit.si
OTR Fingerprint:  1515393D53BA593C19E2CD549AE59FB650F82ABC
SIP:  17772471...@callcentric.com
PGP Key:  0xDC89FF2E

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Question about running Tor + Tor Browser

2013-11-07 Thread Anthony Papillion
I'm helping a friend set up Tor on Xubuntu. He's gotten the non-TBB
package and has Tor set to run each time he logs into his computer (it's
running as a relay).  He also wants to be able to use Tor Browser to use
Tor too. Do I need to manually configure Firefox or is there a way to
get the Firefox in the TBB to run properly when Tor is being run separately?

Thanks,
Anthony

-- 
Anthony Papillion
XMPP/Jabber:  cajuntec...@jit.si
OTR Fingerprint:  1515393D53BA593C19E2CD549AE59FB650F82ABC
SIP:  17772471...@callcentric.com
PGP Key:  0xDC89FF2E

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question about running Tor + Tor Browser

2013-11-08 Thread Anthony Papillion
On 11/08/2013 03:38 AM, Lunar wrote:
> Anthony Papillion:
>> I'm helping a friend set up Tor on Xubuntu. He's gotten the non-TBB
>> package and has Tor set to run each time he logs into his computer (it's
>> running as a relay).  He also wants to be able to use Tor Browser to use
>> Tor too. Do I need to manually configure Firefox or is there a way to
>> get the Firefox in the TBB to run properly when Tor is being run separately?
> 
> The Tor Browser Bundle and a system-wide Tor should run alongside
> happily. Just unpack and use the Tor Browser Bundle as you would on
> another system.

Hmm. In his case (and in a test case I'm running) if I have Tor running
already TBB fails when Vidalia starts saying it can't bind to the
listening ports. This is expected, I'd think, since the ports are
already in use when the TBB tries to bind to them.

Am I missing something?

Anthony


-- 
Anthony Papillion
XMPP/Jabber:  cajuntec...@jit.si
OTR Fingerprint:  1515393D53BA593C19E2CD549AE59FB650F82ABC
SIP:  17772471...@callcentric.com
PGP Key:  0xDC89FF2E

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Am I running an exit node?

2013-11-10 Thread Anthony Papillion
I read when I set up Tor that the default config will run an exit node.
I think I made the changes necessary to make sure I'm only runny a relay
but I'm not sure. Would someone be so kind as to look at my attached
config and confirm that I am indeed not running exit node?

Thanks!
Anthony
## Configuration file for a typical Tor user
## Last updated 22 April 2012 for Tor 0.2.3.14-alpha.
## (may or may not work for much older or much newer versions of Tor.)
##
## Lines that begin with "## " try to explain what's going on. Lines
## that begin with just "#" are disabled commands: you can enable them
## by removing the "#" symbol.
##
## See 'man tor', or https://www.torproject.org/docs/tor-manual.html,
## for more options you can use in this file.
##
## Tor will look for this file in various places based on your platform:
## https://www.torproject.org/docs/faq#torrc

## Tor opens a socks proxy on port 9050 by default -- even if you don't
## configure one below. Set "SocksPort 0" if you plan to run Tor only
## as a relay, and not make any local application connections yourself.
#SocksPort 9050 # Default: Bind to localhost:9050 for local connections.
#SocksPort 192.168.0.1:9100 # Bind to this adddress:port too.

## Entry policies to allow/deny SOCKS requests based on IP address.
## First entry that matches wins. If no SocksPolicy is set, we accept
## all (and only) requests that reach a SocksPort. Untrusted users who
## can access your SocksPort may be able to learn about the connections
## you make.
#SocksPolicy accept 192.168.0.0/16
#SocksPolicy reject *

## Logs go to stdout at level "notice" unless redirected by something
## else, like one of the below lines. You can have as many Log lines as
## you want.
##
## We advise using "notice" in most cases, since anything more verbose
## may provide sensitive information to an attacker who obtains the logs.
##
## Send all messages of level 'notice' or higher to /var/log/tor/notices.log
#Log notice file /var/log/tor/notices.log
## Send every possible message to /var/log/tor/debug.log
#Log debug file /var/log/tor/debug.log
## Use the system log instead of Tor's logfiles
#Log notice syslog
## To send all messages to stderr:
#Log debug stderr

## Uncomment this to start the process in the background... or use
## --runasdaemon 1 on the command line. This is ignored on Windows;
## see the FAQ entry if you want Tor to run as an NT service.
RunAsDaemon 1

## The directory for keeping all the keys/etc. By default, we store
## things in $HOME/.tor on Unix, and in Application Data\tor on Windows.
#DataDirectory /var/lib/tor

## The port on which Tor will listen for local connections from Tor
## controller applications, as documented in control-spec.txt.
#ControlPort 9051
## If you enable the controlport, be sure to enable one of these
## authentication methods, to prevent attackers from accessing it.
#HashedControlPassword 
16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C
#CookieAuthentication 1

### This section is just for location-hidden services ###

## Once you have configured a hidden service, you can look at the
## contents of the file ".../hidden_service/hostname" for the address
## to tell people.
##
## HiddenServicePort x y:z says to redirect requests on port x to the
## address y:z.

#HiddenServiceDir /var/lib/tor/hidden_service/
#HiddenServicePort 80 127.0.0.1:80

#HiddenServiceDir /var/lib/tor/other_hidden_service/
#HiddenServicePort 80 127.0.0.1:80
#HiddenServicePort 22 127.0.0.1:22

 This section is just for relays #
#
## See https://www.torproject.org/docs/tor-doc-relay for details.

## Required: what port to advertise for incoming Tor connections.
#ORPort 9001
## If you want to listen on a port other than the one advertised in
## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as
## follows.  You'll need to do ipchains or other port forwarding
## yourself to make this work.
ORPort 443 #NoListen
#ORPort 127.0.0.1:9090 NoAdvertise

## The IP address or full DNS name for incoming connections to your
## relay. Leave commented out and Tor will guess.
#Address noname.example.com

## If you have multiple network interfaces, you can specify one for
## outgoing traffic to use.
# OutboundBindAddress 10.0.0.5

## A handle for your relay, so people don't have to refer to it by key.
Nickname NoNSA

## Define these to limit how much relayed traffic you will allow. Your
## own traffic is still unthrottled. Note that RelayBandwidthRate must
## be at least 20 KB.
## Note that units for these config options are bytes per second, not bits
## per second, and that prefixes are binary prefixes, i.e. 2^10, 2^20, etc.
#RelayBandwidthRate 100 KB  # Throttle traffic to 100KB/s (800Kbps)
#RelayBandwidthBurst 200 KB # But allow bursts up to 200KB/s (1600Kbps)

## Use these to restrict the maximum traffic per day, week, or month.
## Note that this threshold applies separately to sent and received bytes,
## not to 

Re: [tor-talk] Am I running an exit node?

2013-11-11 Thread Anthony Papillion

On 11/10/2013 06:46 PM, Leon Johnson wrote:
> If you don't want to run as an exit node, your torrc file is correctly
> configured. You can always check one of the TorStatus websites:
> http://torstatus.blutmagie.de/ (usually updated after an hour or so). Do a
> search for your IP or Nickname. In your case, you should *not* see an image
> of a small door.
> 
> 
> On a side note, have you considered running as a bridge?
> https://www.torproject.org/docs/faq.html.en#RelayOrBridge

Thank you for the feedback! Good to know I'm configured the right way
and not exposing myself as an exit node.

On the topic of running as a bridge, I considered that. The reason I
didn't go with it was because of my (perceived?) limitation to the time
bridges are useful. Once a blocking authority finds out your bridges
address, it's blocked and that's that. However, I'm not opposed to
running a bridge. Are they more needed or useful than inter-network relays?

Anthony
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Does Tor automatically update?

2013-12-31 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

Hello Everyone,

I'm running a Tor relay on my Linux box and did a tor --version a few
minutes ago, thinking it might be time for me to upgrade the software.
I was quite surprised to see that it reported being updated today at
8:30 or so!

Does the Tor relay software (not Tor Browser Bundle, mind you)
automatically update?

Thanks,
Anthony


-BEGIN PGP SIGNATURE-
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=pczV
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Does Tor automatically update?

2013-12-31 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 12/31/2013 09:10 AM, krishna e bera wrote:
> On 13-12-31 09:50 AM, Anthony Papillion wrote:
>> I'm running a Tor relay on my Linux box and did a tor --version a
>> few minutes ago, thinking it might be time for me to upgrade the
>> software. I was quite surprised to see that it reported being
>> updated today at 8:30 or so!
>> 
>> Does the Tor relay software (not Tor Browser Bundle, mind you) 
>> automatically update?
> 
> Not sure what "tor" you are running; tor --version on debian
> reports this when i do it:

I'm running the standalone relay software.

> Tor version 0.2.4.15-rc (git-e7b435872cce464f).
> 
> It is possible to set linux to automatically update from
> repositories. There is development on automating updates for TBB
> but not for relays as far as i know.

When I typed tor --help I saw that I was running an older version of
Tor. So I went and dug around the website and found the repo to add to
my distro. Now I'm up to date and will stay up to date. I think I was
reading that output wrong originally.

Thanks!

Anthony
-BEGIN PGP SIGNATURE-
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=nd2E
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Security of running Tor on a Linux VM on a Windows host

2015-11-12 Thread Anthony Papillion
Hello, 

A friend is hell bent on running Tor on a Linux VM hosted on Windows 8. this 
doesn't seem like the best idea to me but I thought I'd ask the experts.  What 
are the security implications of doing so? Are there any mitigations that can 
make things more secure? Any 'gotchas'? For what it's worth,  the have chosen 
to use VirtualBox over VMware. 

Thanks, 
Anthony Papillion 
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How can I help out more?

2016-01-28 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hey Everyone,

I used to be a good C programmer but I haven't written a line of C or
C++ in over a decade so, needless to say, my skills are rusty. Right
now, I run an exit relay but I want to do more. I'd like to get
involved in contributing code.

For the last few years, I've been pretty deep into Python and I'm
wondering if there are any opportunities within the project for me to
contribute? Specifically, what's the best place for a Python guy to
get involved?

Thanks,
Anthony

- -- 
Anthony Papillion
Phone: (918) 533-9699
Skype: CajunTechie
PGP:   0x53B04B15
XMPP"  cyp...@chat.cpunk.us

-BEGIN PGP SIGNATURE-
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=DLYu
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] OT: Bitmessage

2016-01-29 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 01/29/2016 07:05 AM, anonymous coward wrote:
> Good day (again),
> 
> what do you think about Bitmessage? Could it be, Bitmessage gives
> you some anonymity even without using TOR due to the way it works?
> 
> Couldn´t TOR be extended in a way to work like Bitmessage? I guess
> BM is like a mesh or P2P thing, wouldn´t adding such a technology
> enhance TOR?

As I understand it, Bitmessage can prevent an attack that reveals
/with whom/ you communicate but not /that/ you've communicated. It's a
step deeper than, say, using GnuPG. That works for many people in many
cases. However, there might be times when you want to hide, at least
"fairly locally" /that/ you've communicated and that's when BM falls down.

Additionally, the crypto of BM has never been properly verified as I
recall so we can't be sure how secure it actually is. With that alone,
all we can really say is that BM is a great idea that may or may not
protect users but could go further.

Overall though, I love the concept.

Anthony

- -- 
Anthony Papillion
Phone: +1 (918) 533-9699
Skype: CajunTechie
PGP:   0x53B04B15
XMPP"  cyp...@chat.cpunk.us

-BEGIN PGP SIGNATURE-
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=Zl4x
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] OT: Bitmessage

2016-01-30 Thread Anthony Papillion
Thanks Tom but I want even aware that Bitmail existed lol.  I think these are 
problems I've seen talked about around Bitmessage.  For example, someone can 
observe you connect to peers and know you're transmitting data through them.  
But maybe not to whom or what your saying.  Am I wrong?  If I am, this is going 
to make my day.  I love Bitmessage but this has always bugged me.  Also, what 
about a security audit? 

Anthony

On January 30, 2016 2:48:25 AM CST, "Tom A."  wrote:
>Anthony, you describe BitMail - http://bitmail.sf.net not, BitMessage,
>please dont mix it up! Regards Tom
>
>On Sat, Jan 30, 2016 at 3:06 AM, Anthony Papillion
>
>wrote:
>
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
>> On 01/29/2016 07:05 AM, anonymous coward wrote:
>> > Good day (again),
>> >
>> > what do you think about Bitmessage? Could it be, Bitmessage gives
>> > you some anonymity even without using TOR due to the way it works?
>> >
>> > Couldn´t TOR be extended in a way to work like Bitmessage? I guess
>> > BM is like a mesh or P2P thing, wouldn´t adding such a technology
>> > enhance TOR?
>>
>> As I understand it, Bitmessage can prevent an attack that reveals
>> /with whom/ you communicate but not /that/ you've communicated. It's
>a
>> step deeper than, say, using GnuPG. That works for many people in
>many
>> cases. However, there might be times when you want to hide, at least
>> "fairly locally" /that/ you've communicated and that's when BM falls
>down.
>>
>> Additionally, the crypto of BM has never been properly verified as I
>> recall so we can't be sure how secure it actually is. With that
>alone,
>> all we can really say is that BM is a great idea that may or may not
>> protect users but could go further.
>>
>> Overall though, I love the concept.
>>
>> Anthony
>>
>> - --
>> Anthony Papillion
>> Phone: +1 (918) 533-9699
>> Skype: CajunTechie
>> PGP:   0x53B04B15
>> XMPP"  cyp...@chat.cpunk.us
>>
>> -BEGIN PGP SIGNATURE-
>>
>> iQIcBAEBCgAGBQJWrBrCAAoJEAKK33RTsEsVThUP/3gTPuEvuuRjni7JrPhqEM7i
>> Il1OyRdzv0XiBojek73cOAAFrwO8r2D5tcuKYLVy2mgeFTCN/pshwqTH6P+hrXNa
>> QAT1KXhgrhzDujjxuZLCV/GPWKC+TdeDc3bOE9LcQThla5dnCKFrByNSlHukefPq
>> 2aGrm+x4BXkS3KGjv7XsFjjqUgROGDZrxu0B5DSI6Pq3HM3yUqjqEMZAQZRN0TfV
>> 0jKCWq4RtptifCHFy+I9ng3DebwskUj8yn67k0EM1YWeZdTRWeKB+ZUJLcYl5/vS
>> WZrByIdTJu1QCiuQz6+cT3LJfB5kRipI1Lt6C0JkIUShWho9wc/HlSzaVm1662DO
>> IWOk8qZXbDW++y0/FAV3Lfu6lkVWmbWI6Pw2fBygZ5qZdqWr/A6UnKPYBsTYDOm9
>> TkHuvAL4KoOmDsCtrH1bR2cIKM915qnrvU1nW3b1sLha5rroIiHfKt5rQy+deScz
>> gt+Ld2FsAX4Q8v1GvmXE7aDvf++jgVyI+51JnXj6kV45XJ+Ih+gqD/nmhyLIXHQh
>> 6r/Oa2DSwy/QmYjDKoPvi0ZrnMDHvrYnINxbOJDrPOXlB+3CBx5Oz/R8D+YCy0E6
>> vweXAz5UiMDgmjP4mUtu8IDpOnumDRSc0OZ3ukBelC0Hpw0kMJ27cSfT5wNzHCTT
>> v3yBx5NCocWGXuUTQp8L
>> =Zl4x
>> -END PGP SIGNATURE-
>>
>> --
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] PGP and Signed Messages,

2016-02-19 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



On 02/19/2016 06:58 AM, Suphanat Chunhapanya wrote:
> Hi,
> 
> Another way is to use Keybase (https://keybase.io). It will bind
> many different social media (twitter, reddit, github) to the key.
> This means that the attacker needs to compromise all of your
> accounts of those media to forge the key.

I'm not a Keybase user (I've been waiting for more than a year and a
half, I believe for an invite from them) but I have a basic question
about it: What is stopping me from creating a fictitious key for you
and then going and registering a Keybase account for that key,
pretending to be you and listing all of your social media accounts as
my own? Is there some sort of verification that happens?



-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJWxgA3AAoJEAKK33RTsEsVgG0P/AviT8Fyp/Ql4uGJ97wrx9zO
Ell1YruoV+wS7WX+pmB1sPazU4c9Yhz7giAJBli8qJ6jWcGFqLF3yy5BU6iBv1oU
VyG2pv8OrQZQA5AoNb1FkCqOggR9Pq6gIgrM4xS+UDql/TdP8dFAda7MpN+gX9m7
3sOKjhIgTTc/9GuY6Xibyzgqx+fH+2h5EcKrs9J+409RLp8dGsBfiHm5jDJpRVuK
b2VVcSmIHlQ5UPHMIzsuM6gj23eBqUjIV5K4eMSEoK3dQAJhD/fSdaCmptcO48Nh
DySenTNfOipL2n9uzLqQ+ASzyDQVKfK5S3NZplCdZRMiNe/8iL+yVfNthMFyPoJE
v9pMm4T2iQgMr+dbXpaPJ4qUsU7ObHqmR4R9jNG3II53xHZceRLRWISm2KSxTCxl
wEsAk6E5Tr5J/9CiTJd4lgE5/WJJ6cS+4whzo5y5xi0p6d39h4glThZ3k0Nuz7h3
1jsxvU8Iq+ae+yDYGNTE1Q4gEYgpaw82dwQKSFmAXbDxeIhx5aZ7NShAUohTQehg
4dKQB6wyOYxdgkEcoooZ5mb+grVHoBVDBJn5/2hoQ0UWKQ4qRRZHmL9xvWEes3mP
px2tmOWSRlMFtb8jmmIlQ1x1T2KAOfeYOm/TRmdTb0xebAnQHm77ax4fj3bjGpb8
a5rmoCw3pLFhVy49t0YO
=WMTx
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Tor Browser Bundle stuck at "Loading authority certificates"

2016-02-19 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I just downloaded the new version of Tor Browser Bundle and I can't
get it to run. It just sits on the "loading authority certificates"
screen and won't go any further. Can anyone tell me what might be
wrong? I've let it sit for quite a while thinking the servers might be
busy but it doesn't move. I'd include the log but I can't find it.
Clicking "Copy Tor Log to Clipboard" doesn't do anything and I can't
find a log file anywhere.

System is Xubuntu 14.04.

Thanks,
Anthony


-BEGIN PGP SIGNATURE-
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=qdrw
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] [SOLVED] Tor Browser Bundle stuck at "Loading authority certificates"

2016-02-19 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Just wanted to update the list in case anyone else runs into this: I
just figured it out. My problem was caused by an incorrectly set
clock. Once I set the clock correctly, everything worked perfectly.

Anthony

-BEGIN PGP SIGNATURE-
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=u5qL
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] PGP and Signed Messages,

2016-02-19 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 02/19/2016 12:46 PM, Juan Miguel Navarro Martínez wrote:
> El 18/02/16 a las 18:32, Anthony Papillion escribió:
>> What is stopping me from creating a fictitious key for you and
>> then going and registering a Keybase account for that key,
>> pretending to be you and listing all of your social media
>> accounts as my own? Is there some sort of verification that
>> happens?
> 
> 
> Yes, there is a verification process for each supported 
> account/website on Keybase.
> 
> For Twitter, it's a tweet with some verification ID. For GitHub,
> it's a gist called keybase.md. For Reddit, it's a post on
> https://www.reddit.com/r/KeybaseProofs.
> 
> For both last verification processes, it contains some code and a
> PGP message.

All of that makes sense. Good to see that they have verification. But
what about faked accounts? I mean, technically, I suppose if I were
motivated enough, I could create all of those (maybe the user doesn't
even have any SM accounts even). I guess, at that point, it's about
common sense.

>> I'm not a Keybase user (I've been waiting for more than a year
>> and a half, I believe for an invite from them)
> 
> 
> If you are still interested, I could send you one.

I'd love one! I've been wanting to try out Keybase for a while now and
I don't think I'll ever get an invite otherwise. Thank you very much!

Anthony
-BEGIN PGP SIGNATURE-
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=Acf9
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Bridges and Exits together

2016-02-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I already run an exit node and would like to also run a bridge. Is it
acceptable to run a bridge and an exit on the same machine and on the
same instance of Tor? If so, are there any security issues I should be
aware of in doing so? Any special precautions or measures I should
take to protect my users?

Thanks,
Anthony


-BEGIN PGP SIGNATURE-
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=LrnL
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bridges and Exits together

2016-02-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 02/20/2016 03:28 PM, Seth David Schoen wrote:
> Anthony Papillion writes:
> 
>> I already run an exit node and would like to also run a bridge.
>> Is it acceptable to run a bridge and an exit on the same machine
>> and on the same instance of Tor? If so, are there any security
>> issues I should be aware of in doing so? Any special precautions
>> or measures I should take to protect my users?
> 
> Your bridge will become less useful for censorship circumvention
> because its IP address (as an exit) will get published in the
> public directory of Tor nodes and so automatically added to
> blacklists of Tor-related addresses.  The censorship-circumvention
> benefit of bridges, ideally, comes in because censors don't know
> that their traffic is related to Tor.

Thank you. In that case, I'll bring up my bridge on another machine
and, probably preferably, on another network. Thanks for the fast
response.

Anthony


-BEGIN PGP SIGNATURE-
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=5AH1
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] ProtonMail

2016-05-12 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512



On 05/12/2016 03:05 PM, Alexis Wattel wrote:
> Excerpts from Jerry Rocteur's message of May 12, 2016 2:47 pm:
>> Hi,
>> 
>> I tried to post this before but it never got to the list I
>> think. I wanted to subscribe to ProtonMail, which I discovered
>> from reading posts here on this list.
>> 
>> I wanted to get your opinion, is ProtonMail a good solution for 
>> encrypted mails or should I look at alternatives.
>> 
>> I’ve searched and read quite a few articles and I understand
>> that nothing is really secure .. I also have my own Debian server
>> on the web so I’m open to suggestions if any of you has an
>> opinion.
>> 
>> Thanks in advance,
>> 
>> Jerry
> 
> Hello!
> 
> If you have your own server, I'd say go for setting up your own
> mail server! This way you are sure about who has your mail. Of
> course, you ought to have some minimal technical capacity to do
> that. It mostly depends on what feature you want.

Just to add a bit to what Alexis said, check out iRedMail. It's a
complete mail solution that supports POP3/IMAP and SMTP and includes
web mail (RoundCube Mail) right out of the box. Setup and config takes
less than 30 minutes.

www.iredmail.org

HTH,
Anthony

- -- 
OpenPGP Key: 4096R/028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber: cyp...@chat.cpunk.us

-BEGIN PGP SIGNATURE-
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=rJI1
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Adverse Affects of Using Tor > Gmail Specifically

2016-05-25 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 5/25/2016 2:25 PM, Bradley Harvey wrote:
> I have seen some people post that google had flagged their gmail
> account and could no longer access it, because they used it through
> Tor. Is this anecdotal or has anyone been affected by this? If it
> is possible to lose a service because of using Tor, I would wonder
> why. I am just trying to get ahead of any issues before I send most
> of my traffic through Tor and VPN.

I don't know of anyone losing their Gmail account over using Tor. But
the common problem I hear are accounts constantly getting locked
because Google believes your connection is a breach attempt. Then, you
have to go through the processes of unlocking your account and
changing your password.

Anthony

- -- 
OpenPGP Key:4096R/028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXRgZXAAoJEAKK33RTsEsVa1cP/32yze49ZZWoJWCbSzUb8vRx
Q9OwTkHv2VCLboq7tDdCq180hLReq4BMbUVZELFBXC9o6sy8xz20nE6DLeKsh3Vi
TCiAr8JBv8Vw+vwuynE3dxpW5BtNk9BOGFYJ2R51L4O40arivX7U80/yry2lJGLU
Bo2LtCx+Wgua5ZalCydtpyLU+po/VorvlRgWqhmE7sYd8EaLlS5GFAk7cxCjFuKl
R/4pgfqvnTT9jx3iNykfzvG9XdcVrG32ANaUYtMJYUfSwKFNoyzVMK1PsQPYP5HU
EYfo5xIjC6R0top3T4VlklbNHFb4zszu/kypS57DD06AUTTF5vA5/YxCTX94cund
S17A6CwrGuOmTSZQcnz2zYIJdmUl1Mc9xuVmDLgGpsKOsXPUUIB9f0zdud2KbN6X
vEZEA1AiANjHnSRn4LJjqqSNBOb5qe9qKm8rCdPULSUhWnR6d2uG95gsIrVr159E
z1Ut0e3uHdnmJtHotM89adMIM4SsWHVkl0HQM49yuFuJfXR+GjkbMltuSxzN0j11
rezDNaGmpk40qzlKwSILJCcBIquWhNGQXXXFK+EmlsJiJAdmwTshopjmc/SGaqN9
+u+nx9DWkTbcs8W6VLVcSVOYX1QFxW3tRNiJJdZDm1gFyzM9PAJo/sx03+WJZlK8
9NJ1nZd+4CTiTDJgIaI9
=6lEs
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] New mailing list for digital activists

2016-05-25 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

A friend and I have set up a discussion mailing list for activists
interested in discussing digital freedom, legislation effecting
digital rights, government and corporate surveillance, etc. Just
thought this group might be interested.

If you want to learn more or to subscribe visit
https://lists.riseup.net/www/info/digital-rights-activism or send an
email to digital-rights-activism-subscr...@lists.riseup.net

Anthony

- -- 
OpenPGP Key:4096R/028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us

-BEGIN PGP SIGNATURE-
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=/CE9
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Which reputable webmail providers function well with Tor?

2016-06-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/3/2016 9:39 AM, Katya Titov wrote:
> blo...@openmailbox.org:
>> Can anyone suggest a reputable webmail provider that is not
>> totally anti-Tor.
>> 
>> Cock.li and Sigaint and Unseen.is and Mail2Tor are out as the
>> names look weird to "normal" people.
>> 
>> Ruggedinbox is unreliable as the site is often down. VFEmail used
>> to work but I can't seem to sign-up now.
>> 
>> ProtonMail demands SMS validation.
>> 
>> Tutanota seems OK but on this list a poster said that they closed
>> his accounts down for no reason.
>> 
>> RiseUp requires an invitation.
> 
> I have had very few problems with Yandex and GMX. Yandex sometimes 
> blocks IMAPS connections, but a change of exit node fixes that. No 
> issues with either via the web interface.

I've had a great experience with Yandex so far so I second that
recommendation. I've heard a few spotty things about GMX so I've never
tried them.

Also, to the person who said that RiseUp requires an invite, it does
not. You can go and apply for an account, give a good reason why you
want it (it can be something like "I value privacy in my
communications") and you will usually be approved within 24-48 hours.

Anthony



-BEGIN PGP SIGNATURE-
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=mjjH
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

The last time IOError tweeted was on 30 May. Has anyone on this list
actually HEARD from him since then? We have to remember that Jake
comes from a really fucked up childhood. Something like these
allegations could push someone over the edge.

Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us
SIP:cajuntec...@sip.linphone.org

-BEGIN PGP SIGNATURE-
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=NIpt
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 6:08 PM, Cecilia Tanaka wrote:
> Hi Anthony.
> 
> I am really worried about Jake and contacted some friends in
> common yesterday and today.  I had no news until now.
> 
> I really don't know if he is receiving my messages or reading them
> and I tried to contact some CCC friends, but I don't know if he is
> in Berlin or not.
> 
> He is, probably, very stressed and confused in this moment.  Jake
> has much more scars in his soul than he usually exposes in public
> and I know very well how hard can be living with deep pain.  I
> don't know if God exists or not, but I am sincerely praying for
> him.

Thank you for the response Cicilia. While I don't know Jake except
from a few IRC conversations, I find myself worried that, with all of
the stress from these allegations, it could push him over the edge.
I'm glad to find that he has friends like you who are actively
checking up on him.

If there is a chance that he is still in Berlin, do you have any CCC
contacts that might be willing to drop by his apartment to check on
him? I know that sounds paranoid and extreme but this is a pretty
strange time for him I'm sure.

Like you, I am praying for him as well. He needs all the strength and
support he can get right now. I hope that he is at least reading messages.

Anthony



-BEGIN PGP SIGNATURE-
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=5skx
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 5:43 PM, notfrien...@riseup.net wrote:
> On 2016-06-05 18:17, Anthony Papillion wrote: The last time IOError
> tweeted was on 30 May. Has anyone on this list actually HEARD from
> him since then? We have to remember that Jake comes from a really
> fucked up childhood. Something like these allegations could push
> someone over the edge.
> 
> Anthony
> 
> 
> He might need time to himself for now. He has a lot of people
> talking about him right now. He probably needs a break.

You're probably right. I've just seen this kind of thing get out of
hand before and, innocent or not, people can be pushed over the edge.




-BEGIN PGP SIGNATURE-
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=l177
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 6:20 PM, notfrien...@riseup.net wrote:
> On 2016-06-05 19:08, Cecilia Tanaka wrote:
>> Hi Anthony.
>> 
>> I am really worried about Jake and contacted some friends in
>> common yesterday and today.  I had no news until now.
>> 
>> I really don't know if he is receiving my messages or reading
>> them and I tried to contact some CCC friends, but I don't know if
>> he is in Berlin or not.
>> 
>> He is, probably, very stressed and confused in this moment.  Jake
>> has much more scars in his soul than he usually exposes in public
>> and I know very well how hard can be living with deep pain.  I
>> don't know if God exists or not, but I am sincerely praying for
>> him.
>> 
>> Cecilia
> 
> I find it concerning we haven't heard from him. His website is
> also offline (the one listed on his twitter) which is also
> worrying.

IIRC, his website has been offline since a good bit before this. I
tried to visit it late last year and got an offline error.



-BEGIN PGP SIGNATURE-
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=E4J5
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [OFF-LIST] Re: Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 6:30 PM, Mirimir wrote:
> On 06/05/2016 05:14 PM, Anthony Papillion wrote:
>> On 6/5/2016 5:43 PM, notfrien...@riseup.net wrote:
>>> On 2016-06-05 18:17, Anthony Papillion wrote: The last time
>>> IOError tweeted was on 30 May. Has anyone on this list actually
>>> HEARD from him since then? We have to remember that Jake comes
>>> from a really fucked up childhood. Something like these
>>> allegations could push someone over the edge.
>> 
>>> Anthony
>> 
>> 
>>> He might need time to himself for now. He has a lot of people 
>>> talking about him right now. He probably needs a break.
>> 
>> You're probably right. I've just seen this kind of thing get out
>> of hand before and, innocent or not, people can be pushed over
>> the edge.
> 
> I get where you're coming from, but public comments about his
> history, and speculation about suicide, really aren't appropriate.
> IMHO, anyway.
> 
> Just sayin'.
> 

Showing concern is completely appropriate. And why not discuss his
history? It's not like he hides it or even tries to. He's very open
about it. I'm not saying anything Jake hasn't publicly said himself,
usually in front of a few hundred people. Sorry, concern for a fellow
human being trumps 'appropriateness' IMO.


-BEGIN PGP SIGNATURE-
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=dyjN
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [OFF-LIST] Re: Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 6:35 PM, notfrien...@riseup.net wrote:
> On 2016-06-05 19:30, Mirimir wrote:
>> On 06/05/2016 05:14 PM, Anthony Papillion wrote:
>>> On 6/5/2016 5:43 PM, notfrien...@riseup.net wrote:
>>>> On 2016-06-05 18:17, Anthony Papillion wrote: The last time
>>>> IOError tweeted was on 30 May. Has anyone on this list
>>>> actually HEARD from him since then? We have to remember that
>>>> Jake comes from a really fucked up childhood. Something like
>>>> these allegations could push someone over the edge.
>>> 
>>>> Anthony
>>> 
>>> 
>>>> He might need time to himself for now. He has a lot of
>>>> people talking about him right now. He probably needs a
>>>> break.
>>> 
>>> You're probably right. I've just seen this kind of thing get
>>> out of hand before and, innocent or not, people can be pushed
>>> over the edge.
>> 
>> I get where you're coming from, but public comments about his
>> history, and speculation about suicide, really aren't
>> appropriate. IMHO, anyway.
>> 
>> Just sayin'.
> I agree with that. We shouldn't assume someone died just because
> they are not responding to online communications. The speculation
> is suicide as you said is indefinably inappropriate. He might need
> a break. Another possibility is that he is in an area with a power
> or internet outage (I'm not sure why long term but still). These
> are all possibilities.

I'm pretty sure I never said he had suicided so there's no
'assumption' there. What I did say is that, in light of the stress
he's under, someone should at least check on him. I mean yes there are
other possibilities but nothing should be flippantly ruled out. At
what point is it 'appropriate' to be concerned? A month? A year?
Never? If we never hear from him again should we simply assume he's
alright and just decided to check out of the community? I guess we're
all allowed our opinions but I choose to err on the side of concern
for a fellow human being who's directly impacted my life. Your choices
might be different.



-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXVLiwAAoJEAKK33RTsEsV+gkP/RFuj5jFnglZ/FAAsmrZPjqR
oqDoWbr8axbhw1m7TkI1uGN+YGgLLuK+VsSCtPlQn+J9KN8pj38SvpVzIPA/1Dke
snPdyA59BkE95oN5dkRmzuDT0y9yujgKXOBn/h33pfyRV259lGseJLDzf6y5IcCq
7pSWeoDEBnWqt0LjdLODOQrRCti1Vdiu32tNf5vUQRgX4r1bNvMUPu/xTDcR6/K9
m2zf56ejIgDuiu6wXb1Hu+9Vi5p27UWibt4NvExpxBTCbF9ajbpI4EZtKQi81R1B
JzsNHQS5O2Mg9daCuOYgf0pLXbuhozDeXdoH4mmwTZvkOqoBv843hJl8SrXnZZPK
B6i7kQ0wx0dTMUpbacN3oNLYSaBDdXgDe3HqxRBqWXhTcCEMP0LMzQJ8TEljuYOv
6c3ZMnrOh6hMm1h5ScWSK/MGTil7392PPzt8/MdGWTjwGTq2X+KXhIjfsT6qQ9rz
fg/QgBBNaRFCYLKzEWV+k9JHU8SyFEoI5VK89W39K+sZeemFmTcyOwTFnGPyeBIi
mO7udvZiFyeBoc0r4mYAMh16mcP1JycaG5WSYvA5KlwuUqVWljpyXHp4ib3Og28B
z/cidAxOpaC9jBjZqvmqXbfi3dzzPWd7DWOKsI9k0BPMtWyUuReVutrDnbye/SOk
tGeDevtxHSsxgibhq7MI
=akKt
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] [OFF-LIST] Re: Has anyone HEARD from IOError since his last tweet?

2016-06-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/5/2016 6:47 PM, Mirimir wrote:
> On 06/05/2016 05:36 PM, Anthony Papillion wrote:
>> On 6/5/2016 6:30 PM, Mirimir wrote:
>>> On 06/05/2016 05:14 PM, Anthony Papillion wrote:
>>>> On 6/5/2016 5:43 PM, notfrien...@riseup.net wrote:
>>>>> On 2016-06-05 18:17, Anthony Papillion wrote: The last
>>>>> time IOError tweeted was on 30 May. Has anyone on this list
>>>>> actually HEARD from him since then? We have to remember
>>>>> that Jake comes from a really fucked up childhood.
>>>>> Something like these allegations could push someone over
>>>>> the edge.
>>>> 
>>>>> Anthony
>>>> 
>>>> 
>>>>> He might need time to himself for now. He has a lot of
>>>>> people talking about him right now. He probably needs a
>>>>> break.
>>>> 
>>>> You're probably right. I've just seen this kind of thing get
>>>> out of hand before and, innocent or not, people can be pushed
>>>> over the edge.
>> 
>>> I get where you're coming from, but public comments about his 
>>> history, and speculation about suicide, really aren't
>>> appropriate. IMHO, anyway.
>> 
>>> Just sayin'.
>> 
>> 
>> Showing concern is completely appropriate. And why not discuss
>> his history? It's not like he hides it or even tries to. He's
>> very open about it. I'm not saying anything Jake hasn't publicly
>> said himself, usually in front of a few hundred people. Sorry,
>> concern for a fellow human being trumps 'appropriateness' IMO.
> 
> I'm fine with concern. But on a mail list, it's creepy. But then,
> I don't know him. And I'm pretty old-school about privacy.

Yes, I can agree it's kind of creepy. The only reason I sent it down
the list was because I don't know specific people who know him that I
could email privately. Otherwise, I definitely would have preferred
that. But, surprisingly, I'm pretty OK with being creepy lol

> I did, however, screw up by sending my own "[OFF-LIST]" message to
> the list ;)

That threw me for a second! I saw the off-list designation and then
thought 'oh crap, I just violated his privacy by responding to a
private email on the list'. THen I saw it had been sent to the list. I
should have paid more attention as well and readdressed it. Sorry
about that!



-BEGIN PGP SIGNATURE-
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=agD7
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Which reputable webmail providers function well with Tor?

2016-06-06 Thread Anthony Papillion


On June 6, 2016 7:47:16 PM CDT, Not Friendly  wrote:
>I'm not sure about registering from Tor but Riseup.net is pretty
>friendly with Tor. That being said you must have an invite or request
>an account. However I will say the interface works great with Tor. I've
>never had an issue with them.

You can absolutely register from Tor. As far as I can tell, they put no 
restrictions on connecting to the site via Tor at all. Unlike many others, they 
actually respect privacy and don't feel the need to treat every new user as a 
potential spammer. 

Anthony

-- 
OpenPGP Key:4096R/028ADF7453B04B15
Other Key Info:http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] RIP Tor

2016-06-07 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/7/2016 12:13 PM, Not Friendly wrote:
> On 2016-06-07 02:35, a...@cock.lu wrote:
>> First they fall for the social justice meme thinking it's a force
>> for good. Then they allow the project to be infiltrated by the
>> blue haired problem glasses brigade. Then they start modifying
>> their community guidelines to appease their new members, probably
>> under the guise that it's to prevent evil sexist MRAs from
>> "harassing" (read: disagreeing with) their new SJW friends. Then
>> the SJWs decide prominent members of the project need to be
>> cyber lynched so they can take over. "Jacob once farted in the
>> same elevator as me, it was literally rape! 
>> #FireHimOrTorIsRapists" "Jacob once disagreed with me, it was a
>> legitimate death threat that made me fear for my life!
>> #FireHimOrTorWantsToKillAllWomen" "He once mentioned playing a
>> video game, I knew he was a gamergater! Damn misogynist hates
>> women! #KillAllWhiteMen" Then Tor loses their best spokesman. The
>> SJWs and their friends fill the now empty jobs and repeat the 
>> process until they're the only ones with power over the project. 
>> Then Tor dies, since the only "work" that gets done is virtue 
>> signalling on Twitter.
>> 
>> It's only a matter of time before they eat Nick or Roger.
>> 
>> RIP Jacob. RIP Tor.
>> 
>> Usually I get a lot of schadenfreude from watching idiots
>> destroy themselves like this, but Tor is close to my heart so I'm
>> quite sad. The NSA has won.
> I'm unsure how "Tor" has in anyway died. The network is still
> secure. They only thing that happened is that a former member of
> the Tor Project has bad publicity. I'm unsure how that makes Tor
> dead.

It doesn't. The Tor haters never miss an opportunity to declare Tor
"dead". "Oh! It's Tuesday! RIP Tor!". It's often the same crowd (or
associates of them) that love to declare Tor a honeypot for the
federal government.

Anyway, I'm just wondering when this list move beyond the recent
sensationalism and back to actually discussing Tor.



-BEGIN PGP SIGNATURE-
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=In7+
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] RIP Tor

2016-06-07 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/7/2016 1:30 PM, Rick Evans wrote:
> Could be Tor is not a honey pot, maybe it is Tar Baby.
> 
> On Tue, Jun 7, 2016 at 1:12 PM, Not Friendly
>  wrote:
> 
>> On 2016-06-07 13:48, Anthony Papillion wrote:
>> 
> On 6/7/2016 12:13 PM, Not Friendly wrote:
> 
>>>>> On 2016-06-07 02:35, a...@cock.lu wrote:
>>>>> 
>>>>>> First they fall for the social justice meme thinking it's
>>>>>> a force for good. Then they allow the project to be
>>>>>> infiltrated by the blue haired problem glasses brigade.
>>>>>> Then they start modifying their community guidelines to
>>>>>> appease their new members, probably under the guise that
>>>>>> it's to prevent evil sexist MRAs from "harassing" (read:
>>>>>> disagreeing with) their new SJW friends. Then the SJWs
>>>>>> decide prominent members of the project need to be cyber
>>>>>> lynched so they can take over. "Jacob once farted in the 
>>>>>> same elevator as me, it was literally rape! 
>>>>>> #FireHimOrTorIsRapists" "Jacob once disagreed with me, it
>>>>>> was a legitimate death threat that made me fear for my
>>>>>> life! #FireHimOrTorWantsToKillAllWomen" "He once
>>>>>> mentioned playing a video game, I knew he was a
>>>>>> gamergater! Damn misogynist hates women!
>>>>>> #KillAllWhiteMen" Then Tor loses their best spokesman.
>>>>>> The SJWs and their friends fill the now empty jobs and
>>>>>> repeat the process until they're the only ones with power
>>>>>> over the project. Then Tor dies, since the only "work"
>>>>>> that gets done is virtue signalling on Twitter.
>>>>>> 
>>>>>> It's only a matter of time before they eat Nick or
>>>>>> Roger.
>>>>>> 
>>>>>> RIP Jacob. RIP Tor.
>>>>>> 
>>>>>> Usually I get a lot of schadenfreude from watching
>>>>>> idiots destroy themselves like this, but Tor is close to
>>>>>> my heart so I'm quite sad. The NSA has won.
>>>>>> 
>>>>> I'm unsure how "Tor" has in anyway died. The network is
>>>>> still secure. They only thing that happened is that a
>>>>> former member of the Tor Project has bad publicity. I'm
>>>>> unsure how that makes Tor dead.
>>>>> 
> 
> It doesn't. The Tor haters never miss an opportunity to declare
> Tor "dead". "Oh! It's Tuesday! RIP Tor!". It's often the same crowd
> (or associates of them) that love to declare Tor a honeypot for
> the federal government.
> 
> Anyway, I'm just wondering when this list move beyond the recent 
> sensationalism and back to actually discussing Tor.
> 
> 
> 
>>> 
>> 
>> I do not understand why those people think that Tor is a honeypot
>> by the federal government. It is OPEN SOURCE. If you are by any
>> means worried look at the source code and compile it manually.
>> There is no hiding a backdoor. Unless every relay operator is
>> helping the federal government (which at that point the
>> information would leak) then there isn't a way to backdoor Tor. I
>> don't understand why people do not take the time to research
>> things.
>> 
>> -- Not Friendly

Because, I suspect, most of those people couldn't evaluate even the
simplest C++ program for security. It's much easier just to parrot the
controversial "honeypot" line than it is to actually look at the code.
Some of them are just lazy. But then I guess there are legit concerns
surrounding relays. THAT would likely be the easiest point of attack
on the network


-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXVymfAAoJEAKK33RTsEsVCmkQALEUQvJMs9/1vjOHdXtX2Taq
rFOf2cYrPp/LuXBCJ6llJXg5FFrDDVpJd14wULGBaX+qEK6R10xEGwNhUwsp8tVj
xSimMKJA2uv3pHgE980yrCSs7UObMshVZz80S+QwV9vMcBAdT081ElFJCC6Dz6fz
x1vX5UP54rFUwRKnD3fOFmw+CjGyXoZQWQctBrS1gbV5XbZhlnKbexXbLwAmHgaR
uDJZsqheyC1nr72A+dbIUa89Ye+TesiMBJC40xuVu03wp1ZYACmqauu7UiBeYEGq
irQT3VeiOYWYwq4UzG2VRej5uaLCdcwvivNNS4rKszcKEMrTD175Htg/bVJgOC62
9p+ZeLCGwxIoOwpSohovnWTbLpctJVWz8QL1sb50W1zdYwtsp0pmvvFpaYe55foy
/qC4xW8heNRUhhv5u2e8UE/1KVsCSa44Z1fOwU0N5V3S0kh7Py8YFHkp9dolCA/S
W1XkMgJNpyJlQElHdhegXNE0m6539i0VOSFD7OkvtZhblbPnqlchQlCWVFLvPDPY
ZoUPRoji76GgwEMHv70uhmnRMXvjtg4Nw5CzwFJuckNDFQbVW4f7kmEQCD1EU5zf
8rEhs576Tc+kCwG236rI35PRu18FVqNtL1DCcptQ/7pR76Pl9vmFC91aF4KIAOLv
7aCTgSTDnBjCloen5mJX
=yz4n
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Question for those who say "Tor is pwned"

2016-06-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I see a lot of people talking about how Tor is pwned by the US
Government and is insecure 'by design'. I'm assuming that they know
this from a thorough analysis of the source code, which I freely admit
I haven't done. So, since you guys actually have taken the time to
audit the source and find the vulnerabilities that would allow Tor to
be so easily pwned, could you explain it to me and, preferable, post
relevant sections (or links to sections) of the source you're basing
your statements on?

I'd really like to investigate these vulnerabilities myself but the
code is too massive for one person to realistically audit by
themselves so links would be very helpful.

Thanks!
Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us
SIP:cajuntec...@sip.linphone.org

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXaHcgAAoJEAKK33RTsEsVXzkP/1Pk47AhZUMjzGbKivACMWaE
HnmWeuGE7ORdmHuc5ex7tKpNHGoryHrLoLWWRCAcdqAs0UD84X9JlVMB9o9gUk+m
Y0gtMQFQEuS3gyaLKnOEBWgog4Ir+uI7CBFSo5pJ/Ch+mH2tORb3eXo5liUOXjxQ
hZeK3dTDD3tbFpZw9/nkhQPgiPajaF8iBoQZbdpslnITXNOH/ML7E8YPmzkG5g/V
l9vpsLCO1FXLiGADLOMTaCKRnAjA1rhNF8g8a1qYz95yJm4f7o6TyUA0fc7Hd3BP
qcloz0fOo2AQqpAkUGeRVvsCcdL63zo5Tu3AJH8LwuivBjeTQG4jVfHQyJLFfLZA
H7Vg7tg/Lc/sDB9fu/f1Q5sFm983TZoWZzpYkkGClHkLOWxeE8v4YNEBbuuhHdFe
zwsQaOxefJP/fUym/CuOqnZbLdEHGQxVwhAKDjTYz2H1CPKDyBcmVXD3SLL4SGvo
rWRf3Fjg44E7cVMGAXgbhAeIgZbnLDjdfvhJh9fcq+xy9fnBfDg0Bvn7xSlfOXnS
8rzTIxCkHL1pj8y+5bHiivVeZcHNeKiYzHn0pFEYRsml2JlRki7beUWkdHP4TDjh
1itbC3QG3gHbVLZ+ZKyeve/nX1V/Bqqhgao6g+rL8rZUTqG8jEp/lpkRg6wcPRGK
YVlaF2yMZsBKBi7PRyAT
=KXtj
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question for those who say "Tor is pwned"

2016-06-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/20/2016 6:35 PM, juan wrote:
> On Mon, 20 Jun 2016 18:07:12 -0500 Anthony Papillion
>  wrote:
> 
> I see a lot of people talking about how Tor is pwned by the US 
> Government and is insecure 'by design'. I'm assuming that they
> know this from a thorough analysis of the source code,
> 
> 
>> No. You don't need to look at the source code to know that 
>> 'people'(the US gov't) who can monitor traffic going into the tor
>> network and out of it can correlate the traffic and 'deanonymize'
>> users.
> 
>> It should also be obvious, for instance, that if an attacker 
>> happens to control the 3 nodes used to build a circuit, he can 
>> also 'deanonymize' the user.

True. However, I'm not sure how that's a 'pwned by design' thing
(which ascribes malicious intent to the Tor Project). You know who is
to blame for the 'owning the route' problem? We are. How many people
use Tor but won't run a node of their own? And. yes, I realize that a
lot of people might not be technical enough to run one but there are
places you can pay to do it for you.

>> All that has nothing to do with any 'vulnerabilities' or 'bugs'
>> in the code.
> 
>> Other basics facts about tor, like the users are being abused as
>> cover by the US military, are matters of basic logic. If you are
>> the US military and create an 'anomity' network, and you're the
>> only user, your network is useless. You NEED a 'diverse user
>> base' to hide your criminal activity.

But, if you are the US military and you were designing a network to be
'insecure by design', using route owning is a really crappy way to do
it. Essentially, anyone can deanonymize anyone. Even the mighty US
Government isn't safe because, what's stopping China from deploying
even more nodes than the US and thus being able to deanonymize US
spooks using the network? It would be a never-ending game of
one-upsmanship that would, essentially, result in greater security for
users. And, if they're doing that, why aren't more US spies being
busted by China or Chinese spies being busted by the US? Oh, I know!
They are just keeping /really/ quiet about it so we don't suspect that
Tor is compromised, right?

Don't get me wrong, I don't believe there are no problems with Tor.
But I think we need to look at how such ownership would work in
practice. Ultimately, it would end up in a major international
competition that would benefit users.

Anthony


-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXaIEyAAoJEAKK33RTsEsVvcMP/2KhPmTUrQEaBe0wQxbP8cFd
wlLlrOkIm2gvnkm3TAiZZuWJP61vZTT1zeOKabr3jaU3pgIMJMu6z74mtxThgReb
GgyDpvdIDUo6XoH/kBTawhXmXzqCBFg905Vkg8uuM8hmpwlTeD61RyZB+9u4h+CR
zzoqdfX5XNv1Qw8R2Q0HD0ue3kEN0QJ4rIl7i+N4K8eFcH2mvElj6rHkN/SqsiZJ
xnpzNDFpm3e0rrUNbcIjyl0Q/nfuSv3smmE1e1rmfhHBEIgq07kqhnl7szx7yW7L
+x4a1fW2k9S7mEqi+Sobv6Zj2truCgEGJqUKTWuytav9EvRTBezd67HGa1fiYJ71
Td1HRuvDzf8FLIfYYM8+H1kDRoYVkDGagT3n/U+nDN7WRE24y6Tw8cZzZA1QOd95
kOzTDTNSF7CNuq98KRqt5dtSlzvvko0lPvoK82PjPlxiVNroCxzxbYGqv0KaFBgn
JeDc8YaKMpuGhiit8BpFVf8uB0FMxqcI3NfD2z5Fvs+kXEhxJoOqoe2DkMCsqdOe
FDAwQEZxkQ/8VGp8qUpnZI40/tkCezQq/47PTkb0WX1riD2VKJxgb64X/26Vm/po
SCam467JCPEytUhFKL7nhqITtX8AKTdb+zyB0EAACcaZgJHR4XhJH6atqlIebVMC
5MW2aEdAD8DVIQEKikCI
=D27J
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Question for those who say "Tor is pwned"

2016-06-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/20/2016 6:39 PM, juan wrote:
> 
>  by-the-way
> 
> http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf
> 
> Users Get Routed: Traffic Correlation on Tor by Realistic 
> Adversaries
> 
> "Tor is known to be insecure against an adversary that can observe
> a user’s traffic entering and exiting the anonymity network."
> 
> "Our analysis shows that 80% of all types of users may be de- 
> anonymized by a relatively moderate Tor-relay adversary within six
> months. Our results also show that against a single AS adversary
> roughly 100% of users in some common locations are deanonymized
> within three months (95% in three months for a single IXP).
> Further, we find that an adversary controlling two ASes instead of
> one reduces the median time to the first client de-anonymization by
> an order of magnitude: from over three months to only 1 day for a
> typ- ical web user; and from over three months to roughly one month
> for a BitTorrent user.


So basically you're saying that Tor is actually pretty darn secure if
you don't use it every single time you connect to the Internet or for
extended periods of time?

Anthony

-BEGIN PGP SIGNATURE-
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=HA9W
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Why do you hide the fact that "Ex-CIA in Tor" from all of Tor users?

2016-06-27 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 6/27/2016 6:23 AM, Unknown wrote:
> trac.torproject.org/projects/tor/ticket/19513
> 
> I'm fine with who joins to the Tor Project. The difference to the
> code is reviewable by the community using diff tool.
> 
> I'm disappointed the fact that you, Tor Project, hide this truth
> without sharing to the Tor users.

I couldn't agree more. I understand that the decision to hire any
intelligence agent is a difficult one for a project like Tor. But
hiding it from the community calls into question the vaunted
'transparancy' the project constantly talks about. If they weren't
forthcoming about this, a major development that could absolutely
effect community trust, one has to wonder what else they aren't being
completely forthcoming about with the community?

OTOH, I think the leak about DaveC should also strengthen our trust in
the integrity of the people who run the Tor Project. They didn't just
say 'let's lie about it and hide it from the community'. There was
great debate, a lot of discussion, and a bit of agonizing how to best
handle this. They didn't take this lightly by any means. Still, in the
end, we have what we have and that's not good.

Tor Project definitely needs to address this publicly. This misstep
could really harm user trust.

Anthony



-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXcZYNAAoJEAKK33RTsEsVTQ8QAJXfg3pvuPawwDrU2nLOeEGH
xyyd9MQ+JnC4g9/eKztK2PzsSColHfcce1ED56H3keh5Wv42ONfVt6n/3wwUc0ip
nnp8L5LRwVdHvyiMd0v9mswjSF0PZvknllAboAi4er4y2g/qUhasvFceQG5Wanhv
YnI3kUvaw5FGvXlFdSy5ZwLOiRB91g/3kvNU8x12IR1tJ5En+RdyouO7/HHKgDbW
OktwMUhRzvFiuAseDj6x91hvzjriY1PPZ88F06dfpmuA+haem+qBzJX+H1gCPoO/
7U2JEnMVXb0YC+PifiAhrE9UaqqC0Q9pjVWegc1vHelrPOfESMOPJD4/5jvepi2P
xCCKa0HRecP3+sSWFuwZr6ciKUGt2NYEdkLfRAT+GV1dGpSoFNXO1Y8SzOqgx17n
Q60XPuXXQJbbFACx9TrH0EF1cm5h9CWaVdxkw6LipAqogmmERKOJFc8cR6VFFGab
8Nhp32wbjTTH7JQcME4BtEAcYkVzWlDqNLtGHVoh11AV+57OTm/wmOjZjLH80E1G
SG32rjUsWYYrcizZPeO51SV3ZcrYucKcHUno0IMHpqud9DTeVXYoT5ubczklQG8L
IxdQUC8lDkJf8ifdGavFTLcSGqF/n4WdnyjZsZ8yxpckEQlaRZMf2lKUxqHPG2gW
X42vppSHiAQ2wS1ZWsXd
=cT/e
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] How to include Tor in my application

2016-07-12 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hello Everyone,

I'm writing some software that needs to route an HTTPS request through
Tor. The problem is that the applications users are not going to be
technical and I can't expect them to install Tor separately on their
machines. Is there a way to provide Tor in a ready to use format along
with my application?

Thanks,
Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us
SIP:cajuntec...@sip.linphone.org

-BEGIN PGP SIGNATURE-
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=LnKm
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How to include Tor in my application

2016-07-12 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 7/12/2016 9:17 PM, Allen wrote:
>> 
>> Is there a way to provide Tor in a ready to use format along with
>> my application?
>> 
> 
> windoze app?
> 

Right now, yes. But I eventually want to make it cross-platform. But
I'm starting with Windows.
-BEGIN PGP SIGNATURE-
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=HIwz
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] How to include Tor in my application

2016-07-13 Thread Anthony Papillion
On 7/13/2016 5:01 AM, Allen wrote:
>>
 Is there a way to provide Tor in a ready to use format along with
 my application?
>>
>> I'm starting with Windows.

> 
> Step 1 Option B
> Go to https://dist.torproject.org/torbrowser/ , look in the directory for a
> recent version and hope that it includes a zip file called something like
> "tor-win32-X.X.X.X-.zip".  That contains everything you need.
> 
> Step 2
> Get your app to launch tor.exe with the necessary command line options for
> your application.  The command line options are documented at
> https://www.torproject.org/docs/tor-manual.html.en .  At minimum you
> probably want to use the -SOCKSPort and -DataDirectory options to ensure
> your app's version of Tor doesn't collide with the user's own version of
> Tor (if they have one installed).

This is how I'm going to do it. It's probably the easiest and most
reliable way to do it.

Thanks!
Anthony

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Reddit vs Tor Browser

2016-08-05 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

A friend of mine needs an anonymous Reddit account. So I fired up Tor
Browser and went to the site to register. For some reason, no matter
what username he chooses, he is told "care to try these again?" and
cannot register an account. The password and username boxes all have
green checkmarks by the, so that isn't the problem.

Anyone else have this problem? Has Reddit banned Tor connections from
registering new accounts?

Thanks!
Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us
SIP:cajuntec...@sip.linphone.org

-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXpRDYAAoJEAKK33RTsEsV/X4QAJ3CuNJRGnH1Wo5Hqwoxesam
vkHUrH+DIphk075T9csxF9JrhV5UkLXBz/QLgsORsWmlJ6tJG7E6z8XJ0RSWXjVR
7rLFOskoLC8x52HvE5SbukFvktUL0FdZu4qyKCF2/fB/F01dkQKl1G3qD4yiaR2U
t94R2FDUrQEwrngnb4n/d8kn0B9wbHTDLjOGS4djniCzj7/Tkpn/DqFCtU9VB6Mi
01SeghbN4oJZhfA2ykqXxXg9jzkvb8qATl5rnQGQUAMGraEuUQ9IjD7BspkauldZ
8VAtz7KMZjwRbYn3N8yp+ermMCbErR6gEfQjZMnGsoVCZjftXr4VZBvuA8qeJ+Jx
dAAThIGT/iLKxwqJuO1zJbEvzsQCtS3plVA+WCDQfFkQbo6JG6qMDnZi+IlecVVd
vBEyUve7x7ucKFOHrSugw89DUXvPfz71yycnynPJ3nD2X9OqhCMTBfbLfvWCfFzv
6HVbtQfr//0BHPbU6vtPO3Nmoota2RIL69Ct66wD3hcYVM/5FssqIijPYUX86flS
9IwOTgyewcgYgeVQuP6MONXjq3U7pIBYN9vZTOv5kfA1082cQfeSJKgSPlNtJ9Qx
6yD2xuhBfpd0KDRDnXK1W3TpehE6c00lgyxoIsQGm+MmK+TkfIoJbhspzPp2+RqC
Ygs96gZgCqKVFZYx9GrE
=cHHv
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Shutting down my tor relay

2016-08-19 Thread Anthony Papillion
Sorry, but this is crap. The Tor project has a lot of problems that they
are hopefully trying to address. They are culpable in the whole
situation with Jacob and that's on them. But you know who didn't do
anything wrong? The actual people you're harming by shutting down your
relay.

They have done nothing.

You're not punishing the Tor project by shutting your relay down. You're
putting peoples lives in danger because of a political issue you have
with Tor project. Why should innocent users be punished? Is the
kerfuffle with Jacob worth someone's life?  I suppose only you can
decide that but I think you're making a huge mistake.

On 8/19/2016 6:34 AM, Stephan Seitz wrote:
> Hi!
> 
> The situation how the affair about Jake was handled by the Tor project
> has made me feel very uneasy.
> 
> After digging through several material (for example
> https://shiromarieke.github.io/tor) I find that I am no longer believing
> in this project or trust it.
> 
> That’s why I’m shutting down my tor relay fsingtor now.
> 
> As long as the project stays that way it is I will no longer recommend
> Tor or support it in any ways. And I don’t think that such a project
> should have any future.
> 
> Good luck,
> 
> Stephan
> 

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] sadly have to shut down my tor relay after less then 24 hours

2016-08-20 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 8/20/2016 5:47 PM, Sarah Alawami wrote:
> Hello to all. Sadly I have to shut down my tor relay after less
> then 24 hours, as I received a copyright violation and I don't want
> any network restrictions  placed on me as I want the 150mbps
> speed.
> 
> Sorry to all who were using it, but yeah there it is.
> 
> Blessings.

That sucks! Sorry to hear about your experience. Might it be possible
to run your exit with a greatly reduced exit policy? Maybe just
HTTP/HTTPS and mail?

Anthony



-BEGIN PGP SIGNATURE-

iQIcBAEBCgAGBQJXuN6PAAoJEAKK33RTsEsVIvYP/1TeY2QEDBBLgfVGlPAzgcSe
mXQiMkAP2Jl/zd067cFl2WLzEEz85ZI7M70DRW9ICs1x9XXoGFV0tz/b2cCWIjat
iGps7WPotNIXx4kuxILDTJtj0B0De6lifqYNiDsk8oo421gRqnW3vkk8ZNa9WvcY
mdm4QOw78PzVI+cVO1CKV0q0IxvsTVNEOjskGE22uOmi+A8hPwW7iN0iQd/YZ1+Y
/6huFJoVFcvs0LaQoqVf82GsyxT4enCX7VhhYawFJOsxjuE+OPzfHY8BzbpETMbM
3g7r47nwCI8RN+JN0SgTMiqITx/GqFitFAVT5DiS+8QEXbY0YLbb92Ccx9c7l5Gf
PxI5FzIPAh2arAmz6oMdnihLl/ufKlAsy433by1PYDwwH8qYdudYGtpZL0HlkTHV
g13bs9HrQvdh5e0n8ZDVCd6o0Nx2OADSrnGyaC1P81NxO2hlxjgcFwci3r6sZYL0
3Ajsrw/1l9pIvxsJ238M5KmBOPo9hDrjo7PF6POerF5M0MPRVPMgTkRQlMi3Ii3C
Yn21tPy/W7PRzv47r41kvtI0Mjlm5zr80Ec6s2luB9lw4v6KImKM8o1WxO0e4WdN
W8ih3wH3Dzqj/fQHIWUwf8q2UpsBh+G8w1WtKAivWg2fR4/BRY6QvJ0ipuHQwq68
zLyTxUPK0Ny6nRNRlBSn
=Rok0
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] sadly have to shut down my tor relay after less then 24 hours

2016-08-20 Thread Anthony Papillion
It's actually pretty easy and you definitely don't have to be a coder:

1. Find your torrc file and open it in a text editor
2. Search for 'ExitPolicy' (all one word) to find the right section
3. Enter a list of the ports you want to allow. Example:

ExitPolicy accept *:80
ExitPolicy accept *:443
ExitPolicy accept *:110
ExitPolicy accept *:143
ExitPolicy accept *:465
ExitPolicy accept *:587
ExitPolicy reject *:*

Make sure all of the other ExitPolicy statements are either deleted or
commended out. The exit policy above allows ports 80 and 443 (for web
access), and ports 110, 143, 465, 587 for email access. It rejects
anything else.

This should stop your copyright infringement problem or at least reduce
it to almost nothing since the users would be restricted to stuff they
can get on regular websites (no torrents, USENET groups, etc).

Hope this helps!

Anthony

On 8/20/2016 6:29 PM, Sarah Alawami wrote:
> Well I'm no coder. How do I then do this? I'm going to start over from 
> scratch, maybe. I dont' know much about the exit policies as I'm quite new to 
> this tor thing lol! I wonder what is trigering this to happen on our vps's, 
> at least o my vps. Lol!
>> On Aug 20, 2016, at 4:23 PM, pa011  wrote:
>>
>> Made the same experience this week within 24 hours as well on Bit Torrent
>> Changed my Exit-policy - never had that before...
>>
>> Go on...
>>
>> All the best 
>>
>> Paul
>>
>> Am 21.08.2016 um 00:49 schrieb Anthony Papillion:
>>> On 8/20/2016 5:47 PM, Sarah Alawami wrote:
>>>> Hello to all. Sadly I have to shut down my tor relay after less
>>>> then 24 hours, as I received a copyright violation and I don't want
>>>> any network restrictions  placed on me as I want the 150mbps
>>>> speed.
>>>
>>>> Sorry to all who were using it, but yeah there it is.
>>>
>>>> Blessings.
>>>
>>> That sucks! Sorry to hear about your experience. Might it be possible
>>> to run your exit with a greatly reduced exit policy? Maybe just
>>> HTTP/HTTPS and mail?
>>>
>>> Anthony
>>>
>>>
>>>
>>>
>> -- 
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] sadly have to shut down my tor relay after less then 24 hours

2016-08-20 Thread Anthony Papillion
One last thing: don't forget to restart Tor after you modify the file.
If you're using Ubuntu just issue a

service tor restart

Good luck!


On 8/20/2016 6:53 PM, Sarah Alawami wrote:
> Ok, I modified it. We'll see what happens I guess. Bleh I have to start over 
> with the tor cycle. Oh well, it's all a lyearning process. Eh?
>> On Aug 20, 2016, at 4:39 PM, Anthony Papillion  
>> wrote:
>>
>>  ExitPolicy accept *:80
>>  ExitPolicy accept *:443
>>  ExitPolicy accept *:110
>>  ExitPolicy accept *:143
>>  ExitPolicy accept *:465
>>  ExitPolicy accept *:587
>>  ExitPolicy reject *:*
> 

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] My relay is not showing up in Atlas

2016-08-22 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

A little more than 48 hours ago, I brought up a new relay called
sputnik1. For some reason, even though the logs show no problems, the
relay simply isn't showing up in Atlas. It's an exit relay with
moderately high bandwidth. Oddly, the log also shows that it's routed
abut 14GB of traffic:

anthony@sputnik1:~# sudo tail /var/log/tor/log
Aug 22 06:25:01.000 [notice] Tor 0.2.8.6 (git-89d2e261a925c6a6)
opening new log file.
Aug 22 12:04:30.000 [notice] Heartbeat: Tor's uptime is 1 day 11:59
hours, with 455 circuits open. I've sent 9.99 GB and received 9.83 GB.
Aug 22 12:04:30.000 [notice] Circuit handshake stats since last time:
2551/2551 TAP, 14023/14023 NTor.
Aug 22 12:04:30.000 [notice] Since startup, we have initiated 0 v1
connections, 0 v2 connections, 0 v3 connections, and 14562 v4
connections; and received 61 v1 connections, 1157 v2 connections, 1312
v3 connections, and 44017 v4 connections.
Aug 22 18:04:30.000 [notice] Heartbeat: Tor's uptime is 1 day 17:59
hours, with 456 circuits open. I've sent 15.07 GB and received 14.81 GB.
Aug 22 18:04:30.000 [notice] Circuit handshake stats since last time:
2837/2837 TAP, 16074/16074 NTor.
Aug 22 18:04:30.000 [notice] Since startup, we have initiated 0 v1
connections, 0 v2 connections, 0 v3 connections, and 19761 v4
connections; and received 69 v1 connections, 1570 v2 connections, 1918
v3 connections, and 51408 v4 connections.
anthony@sputnik1:~#


Any idea what might be going on?

Thanks!
Anthony

OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP?Jabber:cyp...@chat.cpunk.us
VoIP/SIP:   17772471988...@in.callcentric.com



-BEGIN PGP SIGNATURE-
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=ykYp
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Exit still not showing in atlas

2016-09-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

About two weeks ago, I set up the sputnik1 exit on a fairly
high-bandwidth connection. Usually, when I set up an exit, I can go
and look in atlas and see the relay listed if I search for it. This
time is different. This time, I can't find the exit at all.

I can see my exit is routing traffic and that it's routed a bit over
80GB of traffic in a few days. Obviously, the network sees it. So why
can't I find it?

Any ideas?

Thanks,
Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP/Jabber:cajunt...@dukgo.com
VoIP/SIP:   1259...@localphone.com

-BEGIN PGP SIGNATURE-
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=CbbI
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Exit still not showing in atlas

2016-09-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 9/3/2016 1:02 PM, Karsten Loesing wrote:
> On 03/09/16 19:51, Anthony Papillion wrote:
>> About two weeks ago, I set up the sputnik1 exit on a fairly 
>> high-bandwidth connection. Usually, when I set up an exit, I can 
>> go and look in atlas and see the relay listed if I search for
>> it. This time is different. This time, I can't find the exit at
>> all.
> 
>> I can see my exit is routing traffic and that it's routed a bit 
>> over 80GB of traffic in a few days. Obviously, the network sees
>> it. So why can't I find it?
> 
> I can't find a relay with nickname sputnik1 in the current
> consensus nor in the consensus archive from last month.  What's its
> relay fingerprint?

Hmm...very odd. Like I said, it appears to be routing traffic so I'd
assume /somebody/ on the network has to know about it. Weird!

The fingerprint is
E673CDB2C5B8B7D429B9A873871FC4F765320E10

Thanks for helping me get to the bottom of this!

Anthony


-BEGIN PGP SIGNATURE-
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=h7MX
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Exit still not showing in atlas

2016-09-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 9/3/2016 1:12 PM, Karsten Loesing wrote:
> On 03/09/16 20:06, Anthony Papillion wrote:
>> On 9/3/2016 1:02 PM, Karsten Loesing wrote:
>>> On 03/09/16 19:51, Anthony Papillion wrote:
>>>> About two weeks ago, I set up the sputnik1 exit on a fairly 
>>>> high-bandwidth connection. Usually, when I set up an exit, I 
>>>> can go and look in atlas and see the relay listed if I
>>>> search for it. This time is different. This time, I can't
>>>> find the exit at all.
> 
>>>> I can see my exit is routing traffic and that it's routed a
>>>> bit over 80GB of traffic in a few days. Obviously, the
>>>> network sees it. So why can't I find it?
> 
>>> I can't find a relay with nickname sputnik1 in the current 
>>> consensus nor in the consensus archive from last month.
>>> What's its relay fingerprint?
> 
>> Hmm...very odd. Like I said, it appears to be routing traffic so 
>> I'd assume /somebody/ on the network has to know about it.
>> Weird!
> 
>> The fingerprint is E673CDB2C5B8B7D429B9A873871FC4F765320E10
> 
> There's a relay with that fingerprint, it's just not called
> "sputnik1":
> 
> https://atlas.torproject.org/#details/E673CDB2C5B8B7D429B9A873871FC4F765320E10

Oh!
> 
Interesting. That's weird. I named it in the torrc file. I'll go
check some stuff out. If the torrc file doesn't work, would it break
anything if I just changed the name in the /var/lib/tor/fingerprint file?

> Is that the node you're looking for?

Yep! That's me.

>> Thanks for helping me get to the bottom of this!
> 
> Thanks for running a relay!

My pleasure. Just want to do my part for the network!

Anthony

-BEGIN PGP SIGNATURE-
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=lggm
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Exit still not showing in atlas

2016-09-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 9/3/2016 1:32 PM, Karsten Loesing wrote:
> On 03/09/16 20:16, Anthony Papillion wrote:
>> On 9/3/2016 1:12 PM, Karsten Loesing wrote:
>>> On 03/09/16 20:06, Anthony Papillion wrote:
>>>> On 9/3/2016 1:02 PM, Karsten Loesing wrote:
>>>>> On 03/09/16 19:51, Anthony Papillion wrote:
>>>>>> About two weeks ago, I set up the sputnik1 exit on a
>>>>>> fairly high-bandwidth connection. Usually, when I set up
>>>>>> an exit, I can go and look in atlas and see the relay
>>>>>> listed if I search for it. This time is different. This
>>>>>> time, I can't find the exit at all.
> 
>>>>>> I can see my exit is routing traffic and that it's
>>>>>> routed a bit over 80GB of traffic in a few days.
>>>>>> Obviously, the network sees it. So why can't I find it?
> 
>>>>> I can't find a relay with nickname sputnik1 in the current
>>>>>  consensus nor in the consensus archive from last month. 
>>>>> What's its relay fingerprint?
> 
>>>> Hmm...very odd. Like I said, it appears to be routing
>>>> traffic so I'd assume /somebody/ on the network has to know
>>>> about it. Weird!
> 
>>>> The fingerprint is E673CDB2C5B8B7D429B9A873871FC4F765320E10
> 
>>> There's a relay with that fingerprint, it's just not called 
>>> "sputnik1":
> 
>>> https://atlas.torproject.org/#details/E673CDB2C5B8B7D429B9A873871FC4F765320E10
>
>>> 
>>> 
>> Oh!
> 
>> Interesting. That's weird. I named it in the torrc file. I'll go
>>  check some stuff out. If the torrc file doesn't work, would it 
>> break anything if I just changed the name in the 
>> /var/lib/tor/fingerprint file?
> 
> That file only gets written but never read by tor, AFAIK.  You'll
> have to change it in the torrc file and restart your tor process
> (or send it a HUP signal).  Maybe you edited the wrong torrc file?
> You could try to move it away and see if your tor still starts.

OK, well, thank you for all of your help! I edited the file manually
before reading your email and Tor would not restart. So I had to do a
clean install of it and generate a new fingerprint and everything.
Looks like it's working now.

Thank you again for all your help!

Anthony


-BEGIN PGP SIGNATURE-
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=JSa7
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Has Weather been discontinued?

2016-09-03 Thread Anthony Papillion
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

When I last ran a relay, I was able to subscribe to Tor Weather and
get updates for important events with my relay. Has Weather been
discontinued? Is anything going to takes it's place?

Thanks,
Anthony

- -- 
OpenPGP Key:4096R/0x028ADF7453B04B15
Other Key Info: http://www.cajuntechie.org/p/my-pgp-key.html
XMPP/Jabber:cajunt...@dukgo.com
VoIP/SIP:   1259...@localphone.com

-BEGIN PGP SIGNATURE-
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=Jtor
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk