Re: [tor-talk] Torrentfreak and Cloudflare

2014-09-18 Thread Grace H.
On Thu, 18 Sep 2014 11:01:47 -0400
Rick  wrote:

> TF has replied to my email request for comment. Issue seems resolved. 
> Copy below.

Confirmed. TF seems to be working just fine right now.

Regards,
Grace H.

-- 
D8C9 EF71 ADC3 0533 29DE  3A80 1152 D1CB 8D9C 47FD



signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Torrentfreak and Cloudflare

2014-09-18 Thread Grace H.
On Thu, 18 Sep 2014 16:48:54 -0400
grarpamp  wrote:

> What your definition of working and fine are, I don't know.
> However on a visit to TF just now, I received, and passed, the CF
> captcha.

I've never entered the captcha on TF. When I saw this mail, I tried
again and I was not presented with a captcha page, but TF website.
That's what I meant by "working and fine" since TF was not working when
presented with Cloudflare captcha page.

-- 
D8C9 EF71 ADC3 0533 29DE  3A80 1152 D1CB 8D9C 47FD



signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Torrentfreak and Cloudflare

2014-09-19 Thread Grace H.
On Thu, 18 Sep 2014 19:17:24 -0400
Rick  wrote:

> Did you have JS enabled when you 
> encountered the captcha? Did you enable it while working through the 
> captcha?

JS was enabled when encountered captcha. However, when JS is not
enabled, I still see the same CF page in different sites. When I try to
complete captcha, it doesn't work. Somehow, CF requires JS to be
enabled. It does not explicitly states it but when you don't enable JS,
you cannot pass captcha easily.

Regards,
Grace

-- 
D8C9 EF71 ADC3 0533 29DE  3A80 1152 D1CB 8D9C 47FD



signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] TorBirdy and Thunderbird chat

2014-09-25 Thread Grace H.
On Thu, 25 Sep 2014 09:07:34 -0600
Mirimir  wrote:

> Maybe a better
> solution would be to encrypt chat archives with users' GnuPG keys?

Or warning the user to use full-disk encryption and to avoid logging?
Encrypting the chat log or sensitive information on the chat with
user's GnuPG key is a good idea as well. However, it is better to not
have the logs in the first place.


-- 
D8C9 EF71 ADC3 0533 29DE  3A80 1152 D1CB 8D9C 47FD



signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Social Research on TOR in Turkey during March2014

2014-10-15 Thread Grace H.
On Mon, 13 Oct 2014 23:43:47 +0300
Gökşin Akdeniz  wrote:

> Run: gpg --search-key "Paolo Cardullo" and import the key.
> 
> Please use OpenPGP and GnuPG properly

He is using OpenPGP and GnuPG properly, but I believe you miss some
important fact about it. The original author did not give the key
details nor he did put his key id (before you added to your keyring).
Somebody reading this list could have created a key pair, and uploaded
to keyserver. Now you might have malicious key, which you will use to
encrypt your emails, and somebody having an access to that e-mail
address (via ISP or AOL) could read your email.

Do not blindly add keys just by searching the name. Wait for the
original author to at least verify using e-mail, or his web address. Of
course, there would be no guarantee for e-mail to be changed during the
transport. But it is a little unlikely to both change e-mail and key on
the web server. It depends on your threat model. I hope I made my point.

Regards,
Grace H.


-- 
D8C9 EF71 ADC3 0533 29DE  3A80 1152 D1CB 8D9C 47FD



signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] updating Tor

2014-10-19 Thread Grace H
On Sun, 19 Oct 2014 12:15:26 +0200
Lunar  wrote:

> Tor Browser 4.0 now contains an automated upgrade system. To start the
> update, go to the Help menu, open About Tor Browser. If there's an
> upgrade available, there will be a button right there.

Great that Tor Browser has automated upgrade system.

Does it check SSL certificate (pinning) and checks the download
against a signature? How does it actually works?

Thanks,
Grace H.

-- 
Key ID: 0x8D9C47FD

Stay Safe!


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] monitoring tor relay traffic

2014-10-22 Thread Grace H
On Tue, 21 Oct 2014 21:09:41 -0700
Robert Watson  wrote:

> I've established a tor relay on a headless centos server.  How can I
> log the traffic coming through either via a log or a command line
> query?

Have you tried "arm" utility? You can see how much data you relayed,
and currently used bandwidth.

https://www.torproject.org/projects/arm.html.en


-- 
Key ID: 0x8D9C47FD

Stay Safe!


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk