Re: [tor-talk] Many more Tor users in the past week?

2013-08-27 Thread Roman Mamedov
On Tue, 27 Aug 2013 03:08:44 -0400
Roger Dingledine a...@mit.edu wrote:

 Anybody know details? It's easy to speculate (Pirate Browser publicity
 gone overboard? People finally reading about the NSA thing? Botnet?),
 but some good solid facts would sure be useful.

Hello,

Just in these recent days Russia has extended its Internet censorship to
require ISPs to not just block things like child pornography and drug
dealer websites, but also any websites against which a copyright complaint has
been filed.

This anti-piracy law is in force since 1st August and just in these recent
days has been used to block websites of two popular torrent trackers:

https://encrypted.google.com/search?hl=enoutput=searchsclient=psy-abq=russia%20internet%20piracy%20law%20august%202013==oq=aq=aqi=aql=gs_l=pbx=1
http://en.rian.ru/crime/20130821/182888505.html
http://rapsinews.com/judicial_information/20130826/268666962.html

Instructions on how to bypass this censorship are all over the Russian
internet, and feature TBB prominently as one of the first go to options.

Incidentally because of this there's also now talk about plans to forbid Tor
in Russia:
http://www.informationweek.com/security/vulnerabilities/russia-may-block-tor/240160329
http://rt.com/politics/russia-tor-anonymizer-ban-571/

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Default clients to be non-exit relay LibTech x

2013-08-27 Thread Roman Mamedov
On Tue, 27 Aug 2013 16:29:48 -0700
Percy Alpha percyal...@gmail.com wrote:

 There're few problems with ISP when running non-exit relay. Users in
 moderately censored areas can act as non-exit relay without causing problem
 to the circuit. So why doesn't Tor default to non-exit relay?  Users with
 problems(e.g crappy hardware, ISP fireware) can manually change it to
 client only to improve performance/trouble shooting.
 
 
 Percy Alpha(PGP https://en.greatfire.org/contact#alt)
 GreatFire.org Team

Didn't you just ask this a couple of days ago?
https://lists.torproject.org/pipermail/tor-talk/2013-August/029505.html

And also got a reply?
https://lists.torproject.org/pipermail/tor-talk/2013-August/029506.html

Why do you keep spamming the list with the same message?

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Default clients to be non-exit relay

2013-08-21 Thread Roman Mamedov
On Wed, 21 Aug 2013 18:32:55 -0700
Percy Alpha percyal...@gmail.com wrote:

 There're few problems with ISP when running non-exit relay. Users in
 moderately censored areas can act as non-exit relay without causing problem
 to the circuit. So why doesn't Tor default to non-exit relay?  Users with
 problems(e.g crappy hardware, ISP fireware) can manually change it to
 client only to improve performance/trouble shooting.

https://www.torproject.org/docs/faq.html.en#EverybodyARelay

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Appearing American

2013-08-18 Thread Roman Mamedov
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On Sun, 18 Aug 2013 10:32:13 -0700
Gordon Morehouse gor...@morehouse.me wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 B Sairafi:
  Hello
  
  I'm using Tor Browser, and I need to be seen by a specific website
  as if I'm in the US. Is this possible? I mean, is this a feature
  you already have?
 
 It's *possible* but it's not easy, and it's not a feature.

ExitNodes {US}
StrictNodes 1

I wonder you do not know about this, or do not want to mention/recommend?

 
 You could use https://check.torproject.org/ to get the IP of the
 server you're exiting through and see if it's American, but that may
 change without warning.
 
 Your best bet if you *need* an American IP is to use a VPN.
 
 Best,
 - -Gordon M.
 
 
 -BEGIN PGP SIGNATURE-
 
 iQEcBAEBCgAGBQJSEQUdAAoJED/jpRoe7/ujBhEIAIdYT2TtXIGNdfRIbS8ixaX1
 HULS9jKiNg/kpLCF+DWREGmLYUBMZr00OeyIQusZxHNm1sJytp41v9xLj71fODrr
 Rtf51g8+0gcnLf1Tj9VPUHrsmbSnBQspAfxLgfQkrHRrmaycHE2+4r+8aOVqMUqC
 WP6wzcYJk+X+DK5VG/176w44ZzELWVLFgIy2dKWryBPkSwDgqLyRuY/Yu99Y3iZW
 dLH/56euQw0R7OyyDtJZGBzG1WIyNvYRSFykPnkcs26IegFlkVchRS7uLvqID4jC
 WyRD+aSQF50utQyyzX/m4VfSdkSGvvMKxsL+jBhQsue85zXMj7MxnarPTzQpDjs=
 =4rc1
 -END PGP SIGNATURE-


- -- 
With respect,
Roman
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlIRPFgACgkQTLKSvz+PZwi+0gCfahKOexFlbdYuuZ855hLobBPw
6koAn3pbKMx5GiUY9KW4oNI9W5QlHLAF
=aKfa
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Flattor: A practical crowdfunded Flattr-like incentive scheme for Tor relays

2013-08-17 Thread Roman Mamedov
On Thu, 15 Aug 2013 15:25:41 +0300
George Kadianakis desnac...@riseup.net wrote:

 Currently, (we want to believe that) the Tor network is run by a bunch
 of cypherpunks that are contributing bandwidth because they believe in
 the Cause.
 
 If relay operators start getting money for their bandwidth, we might
 end up with relay operators that are just in for the money.

And you will also end up with having less operators who run relays just
because they want to support the idea of privacy/freedom/etc.

I am sure there is a clever scientific term for the phenomenon that when you
start paying *some* of your volunteers, others are gonna look and ask, huh
wait a second, we're all doing the same work, yet the other guy now gets paid,
and I am just supposed to keep doing this for free? Screw that.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] torproject.us?

2013-08-09 Thread Roman Mamedov
Hello,

What is www.torproject.us, and is it a scam clone website serving trojaned
copies of Tor and TBB?

I always thought the Tor website is only www.torproject.org, but today I see a
link to the .us site, with no explanation of what's the relation to .org and
why on earth something like that would exist. Both sites use different web
hosts, different SSL certificates, but serve seemingly exactly the same content
(or not?...). Seems fishy to me.

If this .us domain is indeed controlled by the Tor project, the ONLY correct
decision is to set up HTTP 302 redirect to the .org website, NOT validate
the notion that there can be multiple official sources for Tor -- or next time
we will see clones at torproject.tk, torproject.su or torproject.biz and
those while also posing as the official ones may be not so benign in nature.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Introducing Tor Forums :-)

2013-08-06 Thread Roman Mamedov
On Tue, 6 Aug 2013 20:14:13 -0400
Nathan Suchy theusernameiwantista...@gmail.com wrote:

 Admin of Tor Forums
 http://www.torforums.tk/

The amount of seriousness and dedication with which you approach this project
truly shines through the fact that you couldn't even spare $7 for a real
domain -- using a free .tk TLD instead, which not only has the absolute bottom
of the barrel junk/spam/scam reputation, but also can be taken away tomorrow
due to their absolutely draconian policies regarding the FREE DOMAINS.

Also it seems you can't use the Tor trademark like that in the first place:
https://www.torproject.org/docs/trademark-faq.html.en

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Feasability of Network Backbone growth via hardware rollout

2013-07-29 Thread Roman Mamedov
On Mon, 29 Jul 2013 10:19:07 -0400
JC Biggs j...@motorsports-x.com wrote:

 However the main goal of the system is to offer a simple built in OS, with
 a  facebook like networking experience, self hosted email, self hosted
 picture storage and most importantly  a distributed computing platform
 (should users opt in)  for encoding video, or doing compute intensive task
 in photoshop, CAD, etc.  the idea is that, you can upload all your pictures
 and network just like you do with facebook, but by storing it all locally,
 you cant have your account shut down or censored (  I have personally had
 facebook do this to me, for nothing more than “adding  friends…apparently
 that’s harrasement to them… fuck if I know)

http://freedomboxfoundation.org/ already aims to build such a system.

 What my question is,  is how hard would it be to tie Tor into the package.
 That way each of these “boxes” does all of the above, but also
 automatically becomes a preconfigured, secure relay.  My thought is that
 this would not only massively grow the amount of relays, but also give
 users an anonymous, ad free, censor free, solution to social networking
 that’s almost impossible to shut down, or fail.

And they already use Tor:
http://wiki.debian.org/Freedombox/FreedomBuddy

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-07-24 Thread Roman Mamedov
On Wed, 24 Jul 2013 13:24:26 +0600
Roman Mamedov r...@romanrm.ru wrote:

 you're probably going to be building Firefox on a Raspberry Pi,

Sorry: probably NOT going to be building...*

 where you only have 256 or 512 MB of RAM, slow CPU and slow and prone to
 dying from wear-out SD card for storage. And this means you will need to do
 cross-compiling on a different architecture machine

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-07-23 Thread Roman Mamedov
On Tue, 23 Jul 2013 17:47:37 -0400
David Huerta huerta...@opentil.com wrote:

 based on GNU/Linux and thus compatible with the GNU/Linux Tor browser bundle.

That's just beyond hilarious, mind pointing us to a download link of TBB for
the ARM architecture? Or which of the two available ones should I try on the
Raspberry Pi, the i686 one or the amd64 one?

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE

2013-06-18 Thread Roman Mamedov
On Tue, 18 Jun 2013 14:36:50 +0200
Eugen Leitl eu...@leitl.org wrote:

 Why not FB or G+, or whatever.

Well for one, because it will be kind of hilarious when you won't be able
to use the Tor forum/group/circle/whatever _via Tor_.

Google already does hassle Tor users with their constant captchas in the
search engine, I would not be too surprised if those centralized social
networks that you mentioned will soon ban all connections from Tor (if they
already didn't).

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE

2013-06-17 Thread Roman Mamedov
On Mon, 17 Jun 2013 17:14:21 -0700 (PDT)
Cat S catslove...@yahoo.com wrote:

 real solution = discussion forum

Following a dozen forums is a time-consuming hassle, but keeping up with a
dozen of mailing lists in a proper client with filtering set-up is just a 
breeze.

The best you will get from your proposed change will be something like Ubuntu
Forums, it's too often that when I google about some problem, I get a link to
those, and it's almost always some clueless newbie asking about a vaguely
similar problem, but getting no replies on their thread, or a couple of
even more clueless, useless replies. Seems like no one competent wants to
participate in forums, so at best you will get the blind leading the deaf
type of communication.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] E-Mail delays // Re: Until there's a REAL effing way to communicate, that evey1 can use, I'm DONE

2013-06-17 Thread Roman Mamedov
On Mon, 17 Jun 2013 17:40:07 -0700
Asa Rossoff a...@lovetour.info wrote:

 Hi Cat,
 You've been more involved in the Torr community than I over the past 10
 years; I'm only newly trying to get really actively involved, and am pretty
 much new to the scene, so you can bear that in mind.
 
 OK, You're mail popped up on my screen at h:26 (to nbe non-specific about my
 tie zone).  you're mail timestamp is h:14.  Are clocks may be off by up to
 several minutes in opposite directions

Nope -- let's check headers, e.g. of the very first message in this thread.

Received: from nm28.bullet.mail.bf1.yahoo.com (nm28.bullet.mail.bf1.yahoo.com
[98.139.212.187])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(Client did not present a certificate)
by eugeni.torproject.org (Postfix) with ESMTPS id 8048F27CFC
for tor-talk@lists.torproject.org;
Tue, 18 Jun 2013 00:14:24 + (UTC)

 yahoo handed it off at :14

Received: from localhost (localhost [127.0.0.1])
by eugeni.torproject.org (Postfix) with ESMTP id A860627D36
for tor-talk@lists.torproject.org;
Tue, 18 Jun 2013 00:14:24 + (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new,
port 10024)
with ESMTP id Vr2gI1O8co-P for tor-talk@lists.torproject.org;
Tue, 18 Jun 2013 00:14:24 + (UTC)

^ Some virus scanning here

Received: from eugeni.torproject.org (localhost [127.0.0.1])
by eugeni.torproject.org (Postfix) with ESMTP id E10B227D63;
Tue, 18 Jun 2013 00:26:22 + (UTC)

 it's already :26, but it's still traveling inside 
eugeni.torproject.org!!!

Received: from eugeni.torproject.org (eugeni.torproject.org 
[IPv6:2620:0:6b0:b:1a1a:0:26e5:480d])
by len.romanrm.net (Postfix) with ESMTPS id 2240320058
for r...@romanrm.ru; Tue, 18 Jun 2013 00:26:26 + (UTC)

 and finally my server receives the message at :26


Looking at a different message (mine), the culprit is much more obvious:

X-Greylist: delayed 589 seconds by postgrey-1.32 at eugeni;  
--
Sun, 16 Jun 2013 22:59:30 UTC
Received: from len.romanrm.net (len.romanrm.net [176.31.121.172])
(using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(Client did not present a certificate)
by eugeni.torproject.org (Postfix) with ESMTPS id A03482719A
for tor-rel...@lists.torproject.org;
Sun, 16 Jun 2013 22:59:30 + (UTC)
--
Received: from natsu (unknown [IPv6:fd39::1e6f:65ff:fea1:3ea6])
by len.romanrm.net (Postfix) with ESMTPS id 6B22E20060;
Sun, 16 Jun 2013 22:49:37 + (UTC)
--


That said however I don't see a 10 minute delay as a terrible problem, E-Mail is
not a real-time medium anyway.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor 0.2.4.13-alpha is out

2013-06-16 Thread Roman Mamedov
On Sun, 16 Jun 2013 15:18:47 -0700
Mike Perry mikepe...@torproject.org wrote:

 Roger Dingledine:
  Tor 0.2.4.13-alpha fixes a variety of potential remote crash
  vulnerabilities, makes socks5 username/password circuit isolation
  actually actually work (this time for sure!), and cleans up a bunch
  of other issues in preparation for a release candidate.
 
  https://www.torproject.org/dist/
 
 As a heads up, a bug was introduced in this release that allows
 malicious websites to discover a client's Guard nodes in a very short
 amount of time (on the order an hour), if those Guard nodes upgrade to
 this release.

So a random clearnet end-destination website can trace the client all the way
through Tor network and discover information not about its exit, not about the
middle, but even about the entry node? And nodeS, i.e. all of them?*
Wow; can you explain in more detail how that works?

* (then a Three Letter Agency (TLA) can obtain lists of connecting clients
from all three Guards, and pretty much triangulate the actual source IP of
that user either to a bulls-eye hit or a very short list of IPs simultaneously
on all three.)

 Unfortunately, the bug was introduced by fixing another issue that
 allows Guard nodes to be selectively DoSed with an OOM condition, so
 Guard node (and Guard+Exit node) operators are kind of in a jam.

One more reason to abandon the Guard system altogether.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] DNS provider that does not hijack failures

2013-05-31 Thread Roman Mamedov
On Fri, 31 May 2013 15:07:13 -0400
Ted Smith te...@riseup.net wrote:

 On Fri, 2013-05-31 at 21:02 +0200, Andreas Krey wrote:
  On Fri, 31 May 2013 11:32:27 +, Ted Smith wrote:
  ...
   30 second brainstorm of reasons why Google would run a public DNS:
   
 * Reduce load times/increase positive UX on Google services
  
  Esp. by including useful additional reponses.
  
  ...
   Only highly technical users will ever change their DNS server settings,
   so Google can't expect much out of this.
  
  And it's the only open DNS server whose IP address I can remember.
 
 4.2.2.1 is Level 3's. 

Actually it's more:
4.2.2.1
4.2.2.2
4.2.2.3
4.2.2.4
4.2.2.5
but AFAIK those were never officially meant for public consumption and in
theory may go away at any moment.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] What are some good VPS providers for Tor?

2013-05-28 Thread Roman Mamedov
On Tue, 28 May 2013 14:41:05 -0400
Nathan Suchy theusernameiwantista...@gmail.com wrote:

 Would running a bridge on Amazon be a bad idea? I could afford that. I know
 of an offshore provider that loves privacy projects.

Virtually any provider will allow you to run a relay or bridge. Next to none
will allow you an exit; this is normal. 

VPSes start from $10-15/year (yes) nowadays, check http://www.lowendbox.com/
and their forum for some offers and reviews.

In fact currently there's a discussion ongoing, 
http://lowendtalk.com/discussion/10747/which-provider-allows-tor-relay/p1
what's I seem to notice is that more providers seem to become aware of the fact
that relay-only nodes are harmless, they won't bring abuse or land anyone in 
jail.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] The Google Browser, Sand boxing and Tor.

2013-05-23 Thread Roman Mamedov
On Thu, 23 May 2013 10:32:07 -0700
Seth David Schoen sch...@eff.org wrote:

 Andrew F writes:
 
  I does appear that chrome is a free software but not open source. They
  call it proprietary but free software. Is the licensing the issue?
  Apparently they locked down the code with there terms of service.
 
 Free software and open source software are intended to refer to the
 _same software_.

Correct, but to be more precise:

Free Software: http://www.gnu.org/philosophy/free-sw.html
A program is free software if the program's users have the four essential
freedoms;

Open Source: http://opensource.org/osd (must satisfy 10 requirements).

http://en.wikipedia.org/wiki/Open-source_software#Comparison_with_free_software
http://en.wikipedia.org/wiki/Free_software_definition#Free_Software_Definition_vs_Open_Source_Definition

And yes, Chrome is neither, but Chromium is both.

 Chrome is proprietary (non-open source) software, complete with a
 proprietary EULA.  There is also a free and open source software
 version called Chromium.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] torslap!

2013-04-23 Thread Roman Mamedov
On Tue, 23 Apr 2013 09:05:19 -
uru...@tormail.org wrote:

 i read the messages about websites making it hard to register for torians.
 these guys throw out the wheat with the chaff.
 but dont you know to separate wheat from the chaff?

As much as I hate to say it, a shortcut to the byzantine convoluted mess that
you're proposing, would be purchase a right to register, paying in Bitcoins.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Need Help with limiting nodes to USA (Was: Need Help)

2013-03-29 Thread Roman Mamedov
On Fri, 29 Mar 2013 18:45:24 +0100
Sebastian G. bastik.tor bastik@googlemail.com wrote:

 without showing up anonymous made me wonder a bit if I would get what
 you are trying to achieve. If your threat-model or use-case doesn't
 require to be anonymous (to a higher degree than you could) you can
 change your configuration without having to worry.

Maybe this refers to the recent development of MaxMind marking Tor Exit nodes
as country A1 Anonymous Proxy, and the person wants to appear as the real
deal US.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Email provider for privacy-minded folk

2013-02-12 Thread Roman Mamedov
On Tue, 12 Feb 2013 11:47:53 +1100
bvvq beveryveryqu...@lavabit.com wrote:

 Hi tor-talk,
 
 I'm not sure where else to ask this question so I give my apologies if 
 this is off-topic. Please feel free to suggest a better list/forum/website.
 
 I've had a personal email account with GMail since it was invite-only, 
 but lately I've read a few stories about Google's use of our emails to 
 provide better targeted advertising to its users. These stories make me 
 uncomfortable and, continuing with my (slow) changeover from Google 
 services and products, I would like to change.
 
 In no particular order, what I would like from the email provider is:
 
   * Privacy-conscious (don't parse my emails to target advertisements to 
 users)
   * Reasonable storage space (I have currently have 418 emails using 
 ~100MB in my personal GMail account)
   * Don't close the account if I don't log in with the web interface in 
 {X} days
   * IMAP preferred but POP will suffice
   * Free would be nice (I don't want to lose my email account if I lose 
 my job)

In the past I used http://www.autistici.org/en/services/mail.html

But really, it is not very difficult to just register a domain and run your own
Postfix/Dovecot setup, and doable even on residential dynamic IPs (with low
TTL on MX records).

Sending from a dynamic IP is more complicated due to everyone's spam-filtering;
but you can send via your ISP's SMTP server (chances are they do provide one),
or via some free webmail service's SMTP, or via the above-mentioned autistici.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] Guard flag vs relay bandwidth

2012-11-14 Thread Roman Mamedov
Hello,

I am looking for ways to optimize several relay nodes to ensure maximum
possible bandwidth consumption. The actual numbers I have are within 20-50
megabits in one direction per node (i.e. not the gigabit-scale tuning discussed
in the FAQ).

From what I can tell the Guard flag affects routed bandwidth very negatively.
After getting the flag the bandwidth drops off sharply and a Guard node will
typically push an order of magnitude (TEN times) less traffic than a non-guard
one. This is confirmed by some blog and mailing list posts I found, mentioning
that a node will have its traffic drop after receiving the guard flag.

I wonder if can anything can be done about this. Can a torrc option be added to
set that a relay never wants to become a Guard; can the algorithms be tuned
so that Guards also keep receiving more 'casual' traffic (sorry if my
understanding is not consistent with how this actually works); or as a brute
hack should I reset my nodes' private key and fingerprint e.g. every couple of
weeks (but ramping up from scratch takes a lot of time and may nullify any
benefit from even doing so).

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Guard flag vs relay bandwidth

2012-11-14 Thread Roman Mamedov
On Wed, 14 Nov 2012 04:47:38 -0500
Roger Dingledine a...@mit.edu wrote:

 Right. I've got a half-drafted the lifecycle of a new Tor relay blog
 post sitting around here somewhere.

That would be great. :)

 If you want to read a lot more about guard flag allocation, see
 Changing of the Guards: A Framework for Understanding and Improving
 Entry Guard Selection in Tor
 published at this year's WPES:
 http://freehaven.net/anonbib/#wpes12-cogs

Yes I have read descriptions of the Guard flag, but to be honest I am not
convinced at all by the arguments presented in its favour.

To me it just seems to be an elaborate trade off that results in if you
are f***ed, ensure you are f***ed as completely as possible and with the most
dire consequences possible.

An adversary has a chance to see some of my entry traffic for some time

...seems rather harmless to me compared to the Guards system's of:

an adversary has a chance to see ALL of my entry traffic for a long period

 Oh, and I'll leave you with one final thought: ensuring maximum possible
 bandwidth consumption might not actually be the best goal here. Every
 time your relay's bandwidthrate token bucket runs dry, that's a pile of
 Tor users who have to wait another second before their bytes will move
 forward. The best Tor network is one where no relays are bottlenecked.

The nodes are far from being at network bottleneck, I mean b/w consumption in
terms of terabytes per month, since in most cases what I have is a bandwidth
arrangement where on a 100 Mbit or 1 Gbit port usage of X TB/month is possible
and this costs Y USD. Unused bandwidth from one month does not carry over to
the next, so it's suboptimal when a node only uses like 30-50% of what it could
have used that month.

-- 
With respect,
Roman

~~~
Stallman had a printer,
with code he could not see.
So he began to tinker,
and set the software free.


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Unsigned Mac OS X binary for TorBrowser

2012-11-10 Thread Roman Mamedov
On Fri, 9 Nov 2012 18:05:58 -0500
Matthew Fisch mfi...@mfisch.com wrote:

 The installer can be verified with PGP using the published signature and GPG 
 or PGP software.
 This however, is beyond the technical prowess of the vast majority of Mac OS 
 X users of the torbrowser bundle.

Well maybe those users need to get their priorities straight? Do they want
anonymity and freedom on the internet, or do they want to use a proprietary
and restricting OS the parent company of which is as unfriendly to third-party
software developers as it can possibly be.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor on Plug PC running Arch

2012-10-29 Thread Roman Mamedov
On Mon, 29 Oct 2012 21:38:56 -0500
Chris teslas_mousta...@riseup.net wrote:

 Hello,
 
 I'm trying to get Tor running on a plug computer (used to be a Pogo
 Plug) that's running Arch Linux ARM on it. I'm SSH-ing to it from my
 laptop as it doesn't have video out.
 
 I'm just having some trouble figuring this out. Here's what I'm using
 for instructions: https://wiki.archlinux.org/index.php/Tor
 
 whenever I enter # /etc/rc.d/tor start I just get a busy signal.

Can you copy-paste what messages do you get. What do you mean by a busy
signal? Is this on a telephone? :)

Also how much RAM does your Plug computer have? As far as I know some
Pogoplugs had only 128 MB of RAM, and that might be a bit small for Tor (but
could be just enough since you aren't going to push a lot of traffic with that
CPU anyway).

-- 
With respect,
Roman

~~~
Stallman had a printer,
with code he could not see.
So he began to tinker,
and set the software free.


signature.asc
Description: PGP signature
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


<    1   2