Re: [tor-talk] Many more Tor users in the past week?
On Tue, 27 Aug 2013 03:08:44 -0400 Roger Dingledine a...@mit.edu wrote: Anybody know details? It's easy to speculate (Pirate Browser publicity gone overboard? People finally reading about the NSA thing? Botnet?), but some good solid facts would sure be useful. Hello, Just in these recent days Russia has extended its Internet censorship to require ISPs to not just block things like child pornography and drug dealer websites, but also any websites against which a copyright complaint has been filed. This anti-piracy law is in force since 1st August and just in these recent days has been used to block websites of two popular torrent trackers: https://encrypted.google.com/search?hl=enoutput=searchsclient=psy-abq=russia%20internet%20piracy%20law%20august%202013==oq=aq=aqi=aql=gs_l=pbx=1 http://en.rian.ru/crime/20130821/182888505.html http://rapsinews.com/judicial_information/20130826/268666962.html Instructions on how to bypass this censorship are all over the Russian internet, and feature TBB prominently as one of the first go to options. Incidentally because of this there's also now talk about plans to forbid Tor in Russia: http://www.informationweek.com/security/vulnerabilities/russia-may-block-tor/240160329 http://rt.com/politics/russia-tor-anonymizer-ban-571/ -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Default clients to be non-exit relay LibTech x
On Tue, 27 Aug 2013 16:29:48 -0700 Percy Alpha percyal...@gmail.com wrote: There're few problems with ISP when running non-exit relay. Users in moderately censored areas can act as non-exit relay without causing problem to the circuit. So why doesn't Tor default to non-exit relay? Users with problems(e.g crappy hardware, ISP fireware) can manually change it to client only to improve performance/trouble shooting. Percy Alpha(PGP https://en.greatfire.org/contact#alt) GreatFire.org Team Didn't you just ask this a couple of days ago? https://lists.torproject.org/pipermail/tor-talk/2013-August/029505.html And also got a reply? https://lists.torproject.org/pipermail/tor-talk/2013-August/029506.html Why do you keep spamming the list with the same message? -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Default clients to be non-exit relay
On Wed, 21 Aug 2013 18:32:55 -0700 Percy Alpha percyal...@gmail.com wrote: There're few problems with ISP when running non-exit relay. Users in moderately censored areas can act as non-exit relay without causing problem to the circuit. So why doesn't Tor default to non-exit relay? Users with problems(e.g crappy hardware, ISP fireware) can manually change it to client only to improve performance/trouble shooting. https://www.torproject.org/docs/faq.html.en#EverybodyARelay -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Appearing American
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Sun, 18 Aug 2013 10:32:13 -0700 Gordon Morehouse gor...@morehouse.me wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 B Sairafi: Hello I'm using Tor Browser, and I need to be seen by a specific website as if I'm in the US. Is this possible? I mean, is this a feature you already have? It's *possible* but it's not easy, and it's not a feature. ExitNodes {US} StrictNodes 1 I wonder you do not know about this, or do not want to mention/recommend? You could use https://check.torproject.org/ to get the IP of the server you're exiting through and see if it's American, but that may change without warning. Your best bet if you *need* an American IP is to use a VPN. Best, - -Gordon M. -BEGIN PGP SIGNATURE- iQEcBAEBCgAGBQJSEQUdAAoJED/jpRoe7/ujBhEIAIdYT2TtXIGNdfRIbS8ixaX1 HULS9jKiNg/kpLCF+DWREGmLYUBMZr00OeyIQusZxHNm1sJytp41v9xLj71fODrr Rtf51g8+0gcnLf1Tj9VPUHrsmbSnBQspAfxLgfQkrHRrmaycHE2+4r+8aOVqMUqC WP6wzcYJk+X+DK5VG/176w44ZzELWVLFgIy2dKWryBPkSwDgqLyRuY/Yu99Y3iZW dLH/56euQw0R7OyyDtJZGBzG1WIyNvYRSFykPnkcs26IegFlkVchRS7uLvqID4jC WyRD+aSQF50utQyyzX/m4VfSdkSGvvMKxsL+jBhQsue85zXMj7MxnarPTzQpDjs= =4rc1 -END PGP SIGNATURE- - -- With respect, Roman -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlIRPFgACgkQTLKSvz+PZwi+0gCfahKOexFlbdYuuZ855hLobBPw 6koAn3pbKMx5GiUY9KW4oNI9W5QlHLAF =aKfa -END PGP SIGNATURE- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Flattor: A practical crowdfunded Flattr-like incentive scheme for Tor relays
On Thu, 15 Aug 2013 15:25:41 +0300 George Kadianakis desnac...@riseup.net wrote: Currently, (we want to believe that) the Tor network is run by a bunch of cypherpunks that are contributing bandwidth because they believe in the Cause. If relay operators start getting money for their bandwidth, we might end up with relay operators that are just in for the money. And you will also end up with having less operators who run relays just because they want to support the idea of privacy/freedom/etc. I am sure there is a clever scientific term for the phenomenon that when you start paying *some* of your volunteers, others are gonna look and ask, huh wait a second, we're all doing the same work, yet the other guy now gets paid, and I am just supposed to keep doing this for free? Screw that. -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] torproject.us?
Hello, What is www.torproject.us, and is it a scam clone website serving trojaned copies of Tor and TBB? I always thought the Tor website is only www.torproject.org, but today I see a link to the .us site, with no explanation of what's the relation to .org and why on earth something like that would exist. Both sites use different web hosts, different SSL certificates, but serve seemingly exactly the same content (or not?...). Seems fishy to me. If this .us domain is indeed controlled by the Tor project, the ONLY correct decision is to set up HTTP 302 redirect to the .org website, NOT validate the notion that there can be multiple official sources for Tor -- or next time we will see clones at torproject.tk, torproject.su or torproject.biz and those while also posing as the official ones may be not so benign in nature. -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Introducing Tor Forums :-)
On Tue, 6 Aug 2013 20:14:13 -0400 Nathan Suchy theusernameiwantista...@gmail.com wrote: Admin of Tor Forums http://www.torforums.tk/ The amount of seriousness and dedication with which you approach this project truly shines through the fact that you couldn't even spare $7 for a real domain -- using a free .tk TLD instead, which not only has the absolute bottom of the barrel junk/spam/scam reputation, but also can be taken away tomorrow due to their absolutely draconian policies regarding the FREE DOMAINS. Also it seems you can't use the Tor trademark like that in the first place: https://www.torproject.org/docs/trademark-faq.html.en -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Feasability of Network Backbone growth via hardware rollout
On Mon, 29 Jul 2013 10:19:07 -0400 JC Biggs j...@motorsports-x.com wrote: However the main goal of the system is to offer a simple built in OS, with a facebook like networking experience, self hosted email, self hosted picture storage and most importantly a distributed computing platform (should users opt in) for encoding video, or doing compute intensive task in photoshop, CAD, etc. the idea is that, you can upload all your pictures and network just like you do with facebook, but by storing it all locally, you cant have your account shut down or censored ( I have personally had facebook do this to me, for nothing more than “adding friends…apparently that’s harrasement to them… fuck if I know) http://freedomboxfoundation.org/ already aims to build such a system. What my question is, is how hard would it be to tie Tor into the package. That way each of these “boxes” does all of the above, but also automatically becomes a preconfigured, secure relay. My thought is that this would not only massively grow the amount of relays, but also give users an anonymous, ad free, censor free, solution to social networking that’s almost impossible to shut down, or fail. And they already use Tor: http://wiki.debian.org/Freedombox/FreedomBuddy -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Wed, 24 Jul 2013 13:24:26 +0600 Roman Mamedov r...@romanrm.ru wrote: you're probably going to be building Firefox on a Raspberry Pi, Sorry: probably NOT going to be building...* where you only have 256 or 512 MB of RAM, slow CPU and slow and prone to dying from wear-out SD card for storage. And this means you will need to do cross-compiling on a different architecture machine -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] (no subject)
On Tue, 23 Jul 2013 17:47:37 -0400 David Huerta huerta...@opentil.com wrote: based on GNU/Linux and thus compatible with the GNU/Linux Tor browser bundle. That's just beyond hilarious, mind pointing us to a download link of TBB for the ARM architecture? Or which of the two available ones should I try on the Raspberry Pi, the i686 one or the amd64 one? -- With respect, Roman signature.asc Description: PGP signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE
On Tue, 18 Jun 2013 14:36:50 +0200 Eugen Leitl eu...@leitl.org wrote: Why not FB or G+, or whatever. Well for one, because it will be kind of hilarious when you won't be able to use the Tor forum/group/circle/whatever _via Tor_. Google already does hassle Tor users with their constant captchas in the search engine, I would not be too surprised if those centralized social networks that you mentioned will soon ban all connections from Tor (if they already didn't). -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE
On Mon, 17 Jun 2013 17:14:21 -0700 (PDT) Cat S catslove...@yahoo.com wrote: real solution = discussion forum Following a dozen forums is a time-consuming hassle, but keeping up with a dozen of mailing lists in a proper client with filtering set-up is just a breeze. The best you will get from your proposed change will be something like Ubuntu Forums, it's too often that when I google about some problem, I get a link to those, and it's almost always some clueless newbie asking about a vaguely similar problem, but getting no replies on their thread, or a couple of even more clueless, useless replies. Seems like no one competent wants to participate in forums, so at best you will get the blind leading the deaf type of communication. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] E-Mail delays // Re: Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE
On Mon, 17 Jun 2013 17:40:07 -0700 Asa Rossoff a...@lovetour.info wrote: Hi Cat, You've been more involved in the Torr community than I over the past 10 years; I'm only newly trying to get really actively involved, and am pretty much new to the scene, so you can bear that in mind. OK, You're mail popped up on my screen at h:26 (to nbe non-specific about my tie zone). you're mail timestamp is h:14. Are clocks may be off by up to several minutes in opposite directions Nope -- let's check headers, e.g. of the very first message in this thread. Received: from nm28.bullet.mail.bf1.yahoo.com (nm28.bullet.mail.bf1.yahoo.com [98.139.212.187]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by eugeni.torproject.org (Postfix) with ESMTPS id 8048F27CFC for tor-talk@lists.torproject.org; Tue, 18 Jun 2013 00:14:24 + (UTC) yahoo handed it off at :14 Received: from localhost (localhost [127.0.0.1]) by eugeni.torproject.org (Postfix) with ESMTP id A860627D36 for tor-talk@lists.torproject.org; Tue, 18 Jun 2013 00:14:24 + (UTC) X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org Received: from eugeni.torproject.org ([127.0.0.1]) by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vr2gI1O8co-P for tor-talk@lists.torproject.org; Tue, 18 Jun 2013 00:14:24 + (UTC) ^ Some virus scanning here Received: from eugeni.torproject.org (localhost [127.0.0.1]) by eugeni.torproject.org (Postfix) with ESMTP id E10B227D63; Tue, 18 Jun 2013 00:26:22 + (UTC) it's already :26, but it's still traveling inside eugeni.torproject.org!!! Received: from eugeni.torproject.org (eugeni.torproject.org [IPv6:2620:0:6b0:b:1a1a:0:26e5:480d]) by len.romanrm.net (Postfix) with ESMTPS id 2240320058 for r...@romanrm.ru; Tue, 18 Jun 2013 00:26:26 + (UTC) and finally my server receives the message at :26 Looking at a different message (mine), the culprit is much more obvious: X-Greylist: delayed 589 seconds by postgrey-1.32 at eugeni; -- Sun, 16 Jun 2013 22:59:30 UTC Received: from len.romanrm.net (len.romanrm.net [176.31.121.172]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by eugeni.torproject.org (Postfix) with ESMTPS id A03482719A for tor-rel...@lists.torproject.org; Sun, 16 Jun 2013 22:59:30 + (UTC) -- Received: from natsu (unknown [IPv6:fd39::1e6f:65ff:fea1:3ea6]) by len.romanrm.net (Postfix) with ESMTPS id 6B22E20060; Sun, 16 Jun 2013 22:49:37 + (UTC) -- That said however I don't see a 10 minute delay as a terrible problem, E-Mail is not a real-time medium anyway. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor 0.2.4.13-alpha is out
On Sun, 16 Jun 2013 15:18:47 -0700 Mike Perry mikepe...@torproject.org wrote: Roger Dingledine: Tor 0.2.4.13-alpha fixes a variety of potential remote crash vulnerabilities, makes socks5 username/password circuit isolation actually actually work (this time for sure!), and cleans up a bunch of other issues in preparation for a release candidate. https://www.torproject.org/dist/ As a heads up, a bug was introduced in this release that allows malicious websites to discover a client's Guard nodes in a very short amount of time (on the order an hour), if those Guard nodes upgrade to this release. So a random clearnet end-destination website can trace the client all the way through Tor network and discover information not about its exit, not about the middle, but even about the entry node? And nodeS, i.e. all of them?* Wow; can you explain in more detail how that works? * (then a Three Letter Agency (TLA) can obtain lists of connecting clients from all three Guards, and pretty much triangulate the actual source IP of that user either to a bulls-eye hit or a very short list of IPs simultaneously on all three.) Unfortunately, the bug was introduced by fixing another issue that allows Guard nodes to be selectively DoSed with an OOM condition, so Guard node (and Guard+Exit node) operators are kind of in a jam. One more reason to abandon the Guard system altogether. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] DNS provider that does not hijack failures
On Fri, 31 May 2013 15:07:13 -0400 Ted Smith te...@riseup.net wrote: On Fri, 2013-05-31 at 21:02 +0200, Andreas Krey wrote: On Fri, 31 May 2013 11:32:27 +, Ted Smith wrote: ... 30 second brainstorm of reasons why Google would run a public DNS: * Reduce load times/increase positive UX on Google services Esp. by including useful additional reponses. ... Only highly technical users will ever change their DNS server settings, so Google can't expect much out of this. And it's the only open DNS server whose IP address I can remember. 4.2.2.1 is Level 3's. Actually it's more: 4.2.2.1 4.2.2.2 4.2.2.3 4.2.2.4 4.2.2.5 but AFAIK those were never officially meant for public consumption and in theory may go away at any moment. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] What are some good VPS providers for Tor?
On Tue, 28 May 2013 14:41:05 -0400 Nathan Suchy theusernameiwantista...@gmail.com wrote: Would running a bridge on Amazon be a bad idea? I could afford that. I know of an offshore provider that loves privacy projects. Virtually any provider will allow you to run a relay or bridge. Next to none will allow you an exit; this is normal. VPSes start from $10-15/year (yes) nowadays, check http://www.lowendbox.com/ and their forum for some offers and reviews. In fact currently there's a discussion ongoing, http://lowendtalk.com/discussion/10747/which-provider-allows-tor-relay/p1 what's I seem to notice is that more providers seem to become aware of the fact that relay-only nodes are harmless, they won't bring abuse or land anyone in jail. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] The Google Browser, Sand boxing and Tor.
On Thu, 23 May 2013 10:32:07 -0700 Seth David Schoen sch...@eff.org wrote: Andrew F writes: I does appear that chrome is a free software but not open source. They call it proprietary but free software. Is the licensing the issue? Apparently they locked down the code with there terms of service. Free software and open source software are intended to refer to the _same software_. Correct, but to be more precise: Free Software: http://www.gnu.org/philosophy/free-sw.html A program is free software if the program's users have the four essential freedoms; Open Source: http://opensource.org/osd (must satisfy 10 requirements). http://en.wikipedia.org/wiki/Open-source_software#Comparison_with_free_software http://en.wikipedia.org/wiki/Free_software_definition#Free_Software_Definition_vs_Open_Source_Definition And yes, Chrome is neither, but Chromium is both. Chrome is proprietary (non-open source) software, complete with a proprietary EULA. There is also a free and open source software version called Chromium. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] torslap!
On Tue, 23 Apr 2013 09:05:19 - uru...@tormail.org wrote: i read the messages about websites making it hard to register for torians. these guys throw out the wheat with the chaff. but dont you know to separate wheat from the chaff? As much as I hate to say it, a shortcut to the byzantine convoluted mess that you're proposing, would be purchase a right to register, paying in Bitcoins. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Need Help with limiting nodes to USA (Was: Need Help)
On Fri, 29 Mar 2013 18:45:24 +0100 Sebastian G. bastik.tor bastik@googlemail.com wrote: without showing up anonymous made me wonder a bit if I would get what you are trying to achieve. If your threat-model or use-case doesn't require to be anonymous (to a higher degree than you could) you can change your configuration without having to worry. Maybe this refers to the recent development of MaxMind marking Tor Exit nodes as country A1 Anonymous Proxy, and the person wants to appear as the real deal US. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Email provider for privacy-minded folk
On Tue, 12 Feb 2013 11:47:53 +1100 bvvq beveryveryqu...@lavabit.com wrote: Hi tor-talk, I'm not sure where else to ask this question so I give my apologies if this is off-topic. Please feel free to suggest a better list/forum/website. I've had a personal email account with GMail since it was invite-only, but lately I've read a few stories about Google's use of our emails to provide better targeted advertising to its users. These stories make me uncomfortable and, continuing with my (slow) changeover from Google services and products, I would like to change. In no particular order, what I would like from the email provider is: * Privacy-conscious (don't parse my emails to target advertisements to users) * Reasonable storage space (I have currently have 418 emails using ~100MB in my personal GMail account) * Don't close the account if I don't log in with the web interface in {X} days * IMAP preferred but POP will suffice * Free would be nice (I don't want to lose my email account if I lose my job) In the past I used http://www.autistici.org/en/services/mail.html But really, it is not very difficult to just register a domain and run your own Postfix/Dovecot setup, and doable even on residential dynamic IPs (with low TTL on MX records). Sending from a dynamic IP is more complicated due to everyone's spam-filtering; but you can send via your ISP's SMTP server (chances are they do provide one), or via some free webmail service's SMTP, or via the above-mentioned autistici. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[tor-talk] Guard flag vs relay bandwidth
Hello, I am looking for ways to optimize several relay nodes to ensure maximum possible bandwidth consumption. The actual numbers I have are within 20-50 megabits in one direction per node (i.e. not the gigabit-scale tuning discussed in the FAQ). From what I can tell the Guard flag affects routed bandwidth very negatively. After getting the flag the bandwidth drops off sharply and a Guard node will typically push an order of magnitude (TEN times) less traffic than a non-guard one. This is confirmed by some blog and mailing list posts I found, mentioning that a node will have its traffic drop after receiving the guard flag. I wonder if can anything can be done about this. Can a torrc option be added to set that a relay never wants to become a Guard; can the algorithms be tuned so that Guards also keep receiving more 'casual' traffic (sorry if my understanding is not consistent with how this actually works); or as a brute hack should I reset my nodes' private key and fingerprint e.g. every couple of weeks (but ramping up from scratch takes a lot of time and may nullify any benefit from even doing so). -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Guard flag vs relay bandwidth
On Wed, 14 Nov 2012 04:47:38 -0500 Roger Dingledine a...@mit.edu wrote: Right. I've got a half-drafted the lifecycle of a new Tor relay blog post sitting around here somewhere. That would be great. :) If you want to read a lot more about guard flag allocation, see Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor published at this year's WPES: http://freehaven.net/anonbib/#wpes12-cogs Yes I have read descriptions of the Guard flag, but to be honest I am not convinced at all by the arguments presented in its favour. To me it just seems to be an elaborate trade off that results in if you are f***ed, ensure you are f***ed as completely as possible and with the most dire consequences possible. An adversary has a chance to see some of my entry traffic for some time ...seems rather harmless to me compared to the Guards system's of: an adversary has a chance to see ALL of my entry traffic for a long period Oh, and I'll leave you with one final thought: ensuring maximum possible bandwidth consumption might not actually be the best goal here. Every time your relay's bandwidthrate token bucket runs dry, that's a pile of Tor users who have to wait another second before their bytes will move forward. The best Tor network is one where no relays are bottlenecked. The nodes are far from being at network bottleneck, I mean b/w consumption in terms of terabytes per month, since in most cases what I have is a bandwidth arrangement where on a 100 Mbit or 1 Gbit port usage of X TB/month is possible and this costs Y USD. Unused bandwidth from one month does not carry over to the next, so it's suboptimal when a node only uses like 30-50% of what it could have used that month. -- With respect, Roman ~~~ Stallman had a printer, with code he could not see. So he began to tinker, and set the software free. signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Unsigned Mac OS X binary for TorBrowser
On Fri, 9 Nov 2012 18:05:58 -0500 Matthew Fisch mfi...@mfisch.com wrote: The installer can be verified with PGP using the published signature and GPG or PGP software. This however, is beyond the technical prowess of the vast majority of Mac OS X users of the torbrowser bundle. Well maybe those users need to get their priorities straight? Do they want anonymity and freedom on the internet, or do they want to use a proprietary and restricting OS the parent company of which is as unfriendly to third-party software developers as it can possibly be. -- With respect, Roman signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Re: [tor-talk] Tor on Plug PC running Arch
On Mon, 29 Oct 2012 21:38:56 -0500 Chris teslas_mousta...@riseup.net wrote: Hello, I'm trying to get Tor running on a plug computer (used to be a Pogo Plug) that's running Arch Linux ARM on it. I'm SSH-ing to it from my laptop as it doesn't have video out. I'm just having some trouble figuring this out. Here's what I'm using for instructions: https://wiki.archlinux.org/index.php/Tor whenever I enter # /etc/rc.d/tor start I just get a busy signal. Can you copy-paste what messages do you get. What do you mean by a busy signal? Is this on a telephone? :) Also how much RAM does your Plug computer have? As far as I know some Pogoplugs had only 128 MB of RAM, and that might be a bit small for Tor (but could be just enough since you aren't going to push a lot of traffic with that CPU anyway). -- With respect, Roman ~~~ Stallman had a printer, with code he could not see. So he began to tinker, and set the software free. signature.asc Description: PGP signature ___ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk