Re: [tor-talk] (no subject)

2019-01-03 Thread Damon (TheDcoder)
Hello, at the end of every mail from the mailing list you should see a link to 
change your settings or unsubscribe.

On 2 January 2019 10:21:25 AM IST, Larry Martin  wrote:
>I wish to unsubscribe
>-- 
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2019-01-01 Thread Jaysinh Shukla
On Tue, Jan 01, 2019 at 11:51:25PM -0500, Larry Martin wrote:
> I wish to unsubscribe

To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-11-26 Thread john doe
On 11/26/2018 3:19 PM, Dj Blind wrote:
> Bonjour je souhaiterais savoir 6 l'application tort le navigateur web il y
> a une version pour les personnes aveugles parce que j'ai constaté que ça ne
> prend pas en charge ma synthèse vocale quand je navigue sur l'application
> aussi si on pourrait développer un script pour moi le fait que je suis
> aveugle et ça pourrait devenir accessible même pour les personnes aveugles
> qui veut utiliser l'application tord j'utilise jaws comme synthèse vocale
> laisse-moi savoir si c'est possible merci beaucoup je serai très
> reconnaissant envers vous si j'arrive à utiliser l'application tord je
> souhaite savoir si il y a un façon nous les personnes aveugles peut avoir
> accès avec cette application merci beaucoup
> 

Tor Browser is accessible with a screenreader, how ever, beginning with
"TBB for Windows" 8.0 there is an issue that is being fixed:

https://trac.torproject.org/projects/tor/ticket/27503

-- 
John Doe
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-25 Thread Mirimir
On 10/24/2018 06:23 AM, Nathaniel Suchy wrote:
> I thought this wasn't sent to the list server. Reporting the archive link
> on IRC. They can get this handled :)

From the message source, it surely seems that it was ...

...
Received: from eugeni.torproject.org (eugeni.torproject.org\
  [94.130.28.202])
  (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
  (Client CN "clientcerts/eugeni.torproject.org", Issuer\
  "auto-ca.torproject.org" (not verified))
  by mx1.riseup.net (Postfix) with ESMTPS id 394DD1A04F4;
  Wed, 24 Oct 2018 02:34:35 -0700 (PDT)
Authentication-Results: mx1.riseup.net; dkim=fail
  reason="verification failed; unprotected key"
  header.d=gmail.com header.i=@gmail.com header.b=m91qVvbr;
  dkim-adsp=none (unprotected policy); dkim-atps=neutral
Received: from eugeni.torproject.org (localhost [127.0.0.1])
  by eugeni.torproject.org (Postfix) with ESMTP id 68AB1E161F;
  Wed, 24 Oct 2018 09:34:32 + (UTC)
Received: from localhost (localhost [127.0.0.1])
  by eugeni.torproject.org (Postfix) with ESMTP id 60A2BE161F
  for ; Wed, 24 Oct 2018 09:34:28\
  + (UTC)
...
Received: from eugeni.torproject.org ([127.0.0.1])
  by localhost (eugeni.torproject.org [127.0.0.1])\
  (amavisd-new, port 10024)
  with ESMTP id BX0svQDLp3CT for ;
  Wed, 24 Oct 2018 09:34:28 + (UTC)
Received: from mail-lf1-x141.google.com (mail-lf1-x141.google.com
  [IPv6:2a00:1450:4864:20::141])
  (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
  (Client CN "smtp.gmail.com",
  Issuer "Google Internet Authority G3" (not verified))
  by eugeni.torproject.org (Postfix) with ESMTPS id 3C7D4E15C0
  for ; Wed, 24 Oct 2018 09:34:28\
  + (UTC)
Received: by mail-lf1-x141.google.com with SMTP id n26-v6so3434767lfl.1
  for ; Wed, 24 Oct 2018 02:34:28\
  -0700 (PDT)
...

Unless they did a good job at spoofing. My email skills are iffy :(

> On Wed, Oct 24, 2018 at 9:10 AM Mirimir  wrote:
> 
>> On 10/24/2018 02:34 AM, Today's Yug wrote:
>>> Contact to me in case of girlfriend  trace
>>
>> So is this grounds for unsubscribing this address from the list, and
>> blocking it and its IP address from resubscribing?
>> --
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Gökşin Akdeniz
Wed, 24 Oct 2018 06:09:43 -0700 tarihinde
Mirimir  yazmış:

> On 10/24/2018 02:34 AM, Today's Yug wrote:
> > Contact to me in case of girlfriend  trace
> 
> So is this grounds for unsubscribing this address from the list, and
> blocking it and its IP address from resubscribing?
> 

Perfectly it is.
-- 
Gökşin Akdeniz 


pgpBIsgIqOa2d.pgp
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Nathaniel Suchy
I thought this wasn't sent to the list server. Reporting the archive link
on IRC. They can get this handled :)

On Wed, Oct 24, 2018 at 9:10 AM Mirimir  wrote:

> On 10/24/2018 02:34 AM, Today's Yug wrote:
> > Contact to me in case of girlfriend  trace
>
> So is this grounds for unsubscribing this address from the list, and
> blocking it and its IP address from resubscribing?
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2018-10-24 Thread Mirimir
On 10/24/2018 02:34 AM, Today's Yug wrote:
> Contact to me in case of girlfriend  trace

So is this grounds for unsubscribing this address from the list, and
blocking it and its IP address from resubscribing?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2016-06-17 Thread Cecilia Tanaka
On Jun 17, 2016 2:04 PM, "Ryan Carboni"  wrote:
>
> https://twitter.com/YourAnonCentral/status/743498759892406272

Meh, too childish...  It's becoming pretty boring!  :-/

Maybe a man can't see it, but even the most stupid woman in the world can
notice an evident *lie* in the last statment published.

The obvious efforts trying to adjust the accusations to being more
realistic and plausible, giving also more colours and emotions, are pretty
interesting.  I like it!  ;)

I didn't stop to search for some trustworthy information and for more
references in last days.

A programmer (woman) told me some 'juicy gossip' about one of alleged
victims, but it would be pretty disgusting to tell it here.  Ugh!  :-/

Well, in thesis, one of alleged victims is being hypocrite and hates
Jacob.  It was obvious since the first message, but some of the reasons
were unexpected for me, at least.  I need to search more information about
it and verify if it is really true before invite her to write a statment or
tell more about it in a trial.

Another tech woman, a brutally sincere friend who I love a lot and consider
one of the most intelligent persons that I know, perceived the lie that I
mentioned before I point it to her.  It simply does not make sense...  :-/

I always says my friend is a 'feminazi' who hates all the men and she knows
about it and says even worse things about me, hahaha!!  She is really
bitter sometimes, but pretty realistic and I do love extremely sincere
friends, haha!!  ;D

Well, she knows in person Jake, Isis and a lot of people mentioned and
doesn't like anyone.  None of them, I swear.  :P

Told me some stories about egocentrism, injured pride, politics, money,
etc, and asked me to avoid this kind of f*cking harmful crazy people
because I am too stupid to protect myself, haha!!  It makes sense, but now
I am curious about the truth, haha!!  ;D

She asked me to avoid meetings with one of alleged victims at any cost,
because "she is a f*cking sick jealous crazy b*tch", able of killing me and
tell lies about self-defense or psychotical breaks and lapses of memory in
public.  My friend is a bit neurotic, but is a good woman and is just
worried about me, hihi...  ;)

Just in case, the world is really small and I will contact one of the
ex-partners of this alleged victim in special.  I don't know him, but I
would like to know if she likes scandals, lies, breaking objects, this kind
of crazy stupid actions...  She has an ego much bigger than usual and I
know that Jake has the same problem, ugh!  :P

Warm hugs and tender kisses!!!  Ah, thank you everybody!!!  I received some
lovely messages about helping homeless people and two donations, yay!!!  ;D

(No Tor t-shirts, but some hot blankets!  <3 )
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2016-03-19 Thread Kristoffer Rath Hansen
There's a link to unsubscribe in the footer of the emails.

lør. 19. mar. 2016 kl. 18.14 skrev Lukas Epple :

> Help yourself:
>
> > To unsubscribe or change other settings go to
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2016-03-19 Thread Lukas Epple
Help yourself:

> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-29 Thread Roman Mamedov
On Sat, 29 Aug 2015 17:11:23 +0200
blaatenator  wrote:

> Indeed, some (coincidentally???) big corps do block relays. For a while
> I ran a relay from my home connection and for instance Nike was not
> reachable without the use of a VPN (I don't mind, and even favor, Nike
> being out of the picture, not everyone feels the same way ;) ).

It's not "some big corps", it's just the same simgular entity: Akamai.
www.nike.com is using the Akamai CDN. And the issue of Akamai blocking
non-exit nodes has been raised on this list time and time again in the past.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-29 Thread blaatenator
Indeed, some (coincidentally???) big corps do block relays. For a while
I ran a relay from my home connection and for instance Nike was not
reachable without the use of a VPN (I don't mind, and even favor, Nike
being out of the picture, not everyone feels the same way ;) ).


On 28-08-15 18:56, Rejo Zenger wrote:
> ++ 23/08/15 15:59 -0800 - I:
>>> Beware though that running a Tor Relay from your home connection is
>>> discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en
>> Running an exit from home is discouraged not a middle relay.
>>
>> Less fearmongering might help expand Tor.
> Reality is a thing of nuance: although the risks of running a middle 
> relay from home are for more limited compared to running an exit relay 
> from home, there are some things that should be taken into account.
>
> Most notably: the IP-address from your home connection will be listed in 
> one or more block lists, based on the criteria that these lists list all 
> none Tor relays. This may be a problem when site owners decided to deny 
> traffic from IP-addresses that are running a Tor relay. As a result of 
> that, if you run a middle relay from home, you may have difficulties 
> reaching some sites.
>
>
>
>

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-28 Thread Rejo Zenger
++ 23/08/15 15:59 -0800 - I:
>> Beware though that running a Tor Relay from your home connection is
>> discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en
>
>Running an exit from home is discouraged not a middle relay.
>
>Less fearmongering might help expand Tor.

Reality is a thing of nuance: although the risks of running a middle 
relay from home are for more limited compared to running an exit relay 
from home, there are some things that should be taken into account.

Most notably: the IP-address from your home connection will be listed in 
one or more block lists, based on the criteria that these lists list all 
none Tor relays. This may be a problem when site owners decided to deny 
traffic from IP-addresses that are running a Tor relay. As a result of 
that, if you run a middle relay from home, you may have difficulties 
reaching some sites.


-- 
Rejo Zenger
E r...@zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J r...@zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
Signal0507 A41B F4D6 5DB4 937D  E8A1 29B6 AAA6 524F B68B
  93D4 4C6E 8BAB 7C9E 17C9  FB28 03


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-28 Thread kleft
Hey Said,

You were injected by a virus called 'ransomware'. This software has encrypted 
your data using a private key which is only available through the attacker. 
Despite that you shouldn't pay money to anybody for decrypting your files or 
making the private key available to you. 

There are several methods available to 'clean' your computer, just google for 
'CTB removal' but I recommend you to setup your computer with a clean and fresh 
install of your OS and restore your data from a backup.

The ransomware/ virus is not affiliated with or made by the Tor Project in any 
way. 

Regards,

Kleft 

> On 28 Aug 2015, at 08:24, SAID MADI  wrote:
> 
> 
> Please Almsaadh sooner that all the files are not open to me because I
> know no PDF files and Word and photos and a video message, but not in
> the form of image documents as follows:
> 
> what happend to your files
> all of your files protected by a strong encryption with RSA-2048 CAN
> BE FOUND Here
> what does this mean
> this meas that the structure and data within your files have been
> irrevocably changed, you will not be able to work with them read them
> or see them, it is the same thing as losing them forever, but with our
> help, you can restore them.
> how di this happen
> especially for you , on our server was generated the secret key pair
> RSA-2048 - public and private.
> All your files were encrypted with the public key, which has been
> transferred to your computer via the internet.
> decrypting of your files is only possible with the help of the private
> key and decrypt program, wich is on our secret server.
> What do i do
> alas; if you do do not take the necessary measures for the specified
> time then the conditions for obtaining the private key will be
> changed.
> if you really value your data, then we suggest you do not waste
> valuable time searching for other solutions because they do not exist.
> 
> for more specific instructions, please visit your personal home page,
> there are a few different addresses pointing to your page below:
> 
> 
> if for some reasons the addresses are not available , follow these steps:
> 1- download and install tor-browser :
> www.torproject.org/progects/torbroser.html.en
> 2- after a successful installation, run the browse and wait for 
> initialization.
> 3- Type in the address bar
> 4- follow the instructins on the site.
> 
> 
> important information
> your personal page
> your personal page ( using TOR )
> your personal page code (if you open the site ( or TOR's ) directly )
> 
> 
> 
> I tried to find solutions and follow the steps but to no avail
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread NOC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

My bad, I should have explicitely mentioned exit indeed.

On August 24, 2015 1:59:31 AM GMT+02:00, I  wrote:
>
>> Beware though that running a Tor Relay from your home connection is
>> discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en
>
>
>Running an exit from home is discouraged not a middle relay.
>
>Less fearmongering might help expand Tor.
>
>Robert
>
>
>
>--
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

- --
Tim Semeijn
Babylon Network

PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5
-BEGIN PGP SIGNATURE-
Version: APG v1.1.1
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=T0ws
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread I
 
> Beware though that running a Tor Relay from your home connection is
> discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en


Running an exit from home is discouraged not a middle relay.

Less fearmongering might help expand Tor.

Robert



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-23 Thread NOC
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

As the Tor Relay software does not fully utilize multiple cores yet
the use of the parallel processing power is not that big. It might
help a bit but not as you would love to see it.

The choice is yours.

Beware though that running a Tor Relay from your home connection is
discouraged: https://www.torproject.org/eff/tor-legal-faq.html.en

On 8/23/15 10:52 PM, Naseem Dillman-Hasso wrote:
> Hello, I have the ability to get a parallel processing computer. I
> was wondering if this would help run a tor relay faster, or if a
> regular computer works just as fast. Thanks so much.
> 

- -- 
Tim Semeijn
Babylon Network

PGP: 0x2A540FA5 / 3DF3 13FA 4B60 E48A E755 9663 B187 0310 2A54 0FA5
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCgAGBQJV2kB7AAoJELGHAxAqVA+lDkgP/A1UAvZmnykFhmDik1W/J62v
ARW/pP4KcGtP3oX03lggSti70J00NDGd3yy1YSeChi/KklHXU2y4dhp0VPQE1Sut
IhMownEa/p4T9ZV9lnJg6Nh5ITCHP4lrUz586XLgBvFAWkF73JVF8zjlfVwBx6xl
Lx49s06Rl238qA5F6fC5Xcg8i7T2jFWaLbU5nEt6PY1TIx/8r5Fw+cYDiiR2smW2
AGQs6XKZLctoBnXeM+6Cm2ip2KopPMPdPBkcPrlU9PvmEy95qpy5tTyGejKuoQfP
evpYm1Y+TWD6FRvHf+I8UOXthLryx5o+jHN9jQn0t8H6SPaDSl5EYo/K8F8WQRcd
0mDcbDRR2662EqMwt0aZxWiMdBCpXm/XapJdXBn4LqwYPL4J8V48qb9RfiHy6Js+
rlmpJxYlAy+qNE6GsPT5Z3Sn9/YKVFa84E4AZxKi+ij9vKDnEu2EJ67r2OckWtEC
9WXF6sxgFyO4DF6TNrRe8NlKjl+E0HtLl+Y6EoDOoCiNabZ3qMe4tEjLf5E3qC5u
t/7AAJ/YvUW5JmhHXSEmllKB71POuUVwvUPeQBSUvraxKP+0E9cjBKQFEUkjHsrf
HSXDiVbgWZLoTKcIKDyiIceXy490oquR5zSzW/Em37kCqjW3Q2xLVILdVKJ8ENKn
X+3E97iVDnHySKhySjFt
=sWyn
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-17 Thread Nick Mathewson
On Tue, Aug 11, 2015 at 9:28 PM, Thomas White  wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Does anyone in Tor want to name a price to get this task done? Can
> then be followed by a match donation to be spent with on whatever you
> wish once the multicore has been added.

Hi, Thomas, and congratulations!  You've asked a question I wasn't
prepared to answer.  Here's a thread we had about it today:

18:25 < nickm> So, I assume people have seen the tor-relays/tor-talk
thread about "Hey Tor folks, what would you want in exchange for
making tor parallelize better"
18:25 < nickm> Do we have a way of even answering that?
18:26 < nickm> If not, I think we should reply to say "This is a
generous offer and we need to apologize for taking so long, but it's
not been something we had a way of answering before. We'll try to come
up with such a way and see what it outputs RSN"
18:26 < nickm> thoughts?
18:44 < arma4> sounds plausible. i think the issue is a combination of
not enough developerpower and also not enough money
18:44 < arma4> a short small amount of money wouldn't be enough to
overcome the first issue,
18:45 < arma4> and we need to overcome both
18:47 < nickm> yeah.  I think that anything less than a year fulltime
of dev time, plus overhead and incidentals, can't work out here.
18:47 < nickm> plus, no timeline promised
18:48 < nickm> arma4: thoughts?
18:49 < arma4> are there any incremental steps that can be done, by
other people, in the mean time?
18:49 < nickm> in theory sure
18:49 < arma4> it seems like a wildly unpredictable amount of work
18:50 < nickm> in practice nobody who isn't a Solid Wizard is going to
get much done here
18:50 < arma4> and it's not even clear, to me, what architecture we
should use to parallelize cleanly
18:50 < arma4> all of this ipc stuff sounds great in theory until you
try to run the program on ios or something and then boy are you
surprised
18:51 < nickm> I have an architecture in mind for circuit crypto
18:51 < nickm> for tls, I have no bloody clue
18:52 < toml> but would we feel good about taking a shot if there was
one full-time equivalent devoted to the problem?
18:52 < arma4> maybe explaining very briefly why it isn't trivial, and
why it is going to be hard to do right, would be helpful for the folks
wondering why we don't just do it already
18:52 < toml> arma: I agree that we should take the opportunity to
explain the challenge
18:52 < arma4> toml: and if we had said full-time developer, would
this be the most important thing to have her work on?
18:53 < arma4> so far the answer has been "no, other things are more important"
18:53 < toml> well, it would be an answer to the question: what would it take?
18:53 < toml> so if they put cash on the barrel head, we could
dedicate. (I would bet there would be other associated benefits not
strictly related)
18:54 < toml> probably the cost would be too steep, but they would
know where we stand. (part of the education piece)
18:55  * nickm suggests that we just copy-and-paste this conversation
into the thread
18:56 < arma4> sounds good
18:58 < toml> arma: and let's always use the term "full-time
equivalent." There is an industry standard for a FTE amount, but we
reserve the right to apportion those funds among more than one person.
18:58 < nickm> any more to add ?
19:00 < nickm> I feel like we could safely say "More than 80k and less
than 500k" on this today, and if those numbers don't scare people
away, invest time into digging into getter numbers
19:01 < arma4> sounds good. it is basically a big architectural change
inside tor. our work on better testing and better modularity is
(slowly) moving us in the right direction as we wait.
19:01 < toml> I would say minimum $100K, as this would leapfrog
several other priorities.
19:02 < nickm> also overhead
19:02 < toml> si
19:02 < nickm> yeah, good point, toml
19:03 < nickm> OTOH, we can also mention the $0 price point: for no
money at all, we will _care_ about this, because we already do. And at
some point eventually, somebody will surely work on it in their free
time, one of these days
19:03 < toml> (and that is too low for a FT equivalent, but it is
enought to motivate us to explore
19:03 < arma4> heck, not only do we care, but we even wrote up a thing
on how it might be done
19:04 < toml> arma: should we share that? (or share it again?)
19:05 < arma4> nickm should point to it in his response i hope
19:06 < arma4> he wrote it so hopefully he knows what is the best
thing to point at :)
19:06 < nickm> well,it's quite old and maybe I should revise some
morning/afternoon when I am smarter
19:08 < toml> perhaps leave it as is — show how long we have been
thinking on this. Then maybe a add brief bit on things we have learned
since, at your leisure.
19:08 < arma4> that way lies paralysis. which is almost like
parallelization, but not quite. :)
18:13 < nickm> ok.  So I am going to add this to topics for the
wednesday core tor dev meeting, and send it to the ml, unless somebody

Re: [tor-talk] (no subject)

2015-08-12 Thread syndikal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

> On Tue, 11 Aug 2015 21:08:45 -0700
> $20 today gets you not just a public IP address, but a whole 100 Mbit
> unmetered VM or a dedicated server to go with it, and not even just one,
> but
> easily two or three.

i'd be very interested in purchasing these if you were to share the
offers! finding hosts happy to allow exit nodes is tricky but it seems
like you've got it down.

syndikal

-BEGIN PGP SIGNATURE-
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=04MA
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread Ryan Carboni
Last year's summer of code had someone working on Tor multicore.

This year's summer of privacy has Donncha O'Cearbhaill working on load
balancing for hidden services.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread Apple Apple
>And yeah, maybe
because other priorities, such as the need to work on other features and
keep
the code reasonably simple still outweigh the performance benefit from
proper
multi-threading.

Don't forget about security.

Is it worth having Tor run a little faster at the expense of complex multi
threaded code with more potential security vulnerabilities?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-12 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

$20 a month for a dedicated IP is a ripoff. My point here is actually
not about the cost of multicore being added as each user can rate
limit it to curb additional expense, but the cost of actually getting
the thing coded and implemented.

For relays, being able to make more use of available bandwidth would
vastly increase the network speed, furthermore make home clients see
an improvement in their daily Tor usage. It also benefits hidden
service people as they can then run their Tor processes on more than
one core and thus handle higher volumes of traffic.

As a disclaimer, I am of course asking since my company is going live
in the next few months. But of course, that is also where my funding
proposal is coming from.

On 12/08/2015 05:08, Ryan Carboni wrote:
>> Does anyone in Tor want to name a price to get this task done?
> 
> 
> 
> The price of a public dedicated ip address is at worst, $20 a 
> month.
> 
> Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
>  $60,000 per year. That is perhaps the only price of no multicore 
> support. Although, many Tor nodes are hosted using dynamic IPs, so 
> perhaps the cost is closer to $1,000 per year. In any case, I'm
> not sure how many sequential operations there are.
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
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=AUY9
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Roman Mamedov
On Tue, 11 Aug 2015 21:08:45 -0700
Ryan Carboni  wrote:

> > Does anyone in Tor want to name a price to get this task done?
> 
> 
> 
> The price of a public dedicated ip address is at worst, $20 a month.

What. More like $3-5, and that's indeed at worst, with the price more
commonly being around $1-2.

$20 today gets you not just a public IP address, but a whole 100 Mbit
unmetered VM or a dedicated server to go with it, and not even just one, but
easily two or three.

I get it that you want to "influence" the decision making, but using comically
wrong estimates will not get you anywhere.

> Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
> $60,000 per year.
> That is perhaps the only price of no multicore support.
> Although, many Tor nodes are hosted using dynamic IPs, so perhaps the
> cost is closer to $1,000 per year.
> In any case, I'm not sure how many sequential operations there are.


-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Ryan Carboni
> Does anyone in Tor want to name a price to get this task done?



The price of a public dedicated ip address is at worst, $20 a month.

Two tor nodes max per IP address, so roughly $20*6000 relays / 2 =
$60,000 per year.
That is perhaps the only price of no multicore support.
Although, many Tor nodes are hosted using dynamic IPs, so perhaps the
cost is closer to $1,000 per year.
In any case, I'm not sure how many sequential operations there are.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Does anyone in Tor want to name a price to get this task done? Can
then be followed by a match donation to be spent with on whatever you
wish once the multicore has been added.

T

On 12/08/2015 00:32, coderman wrote:
> On 8/11/15, Roman Mamedov  wrote:
>> ... *Repeatedly headbangs on the desk*
>> 
>> Uhm so what was I talking about. Ah yes, I believe that's not the
>> case. It would add a great deal of benefit actually.
> 
> it would be useful, particularly on systems with native
> acceleration of supported crypto primitives.
> 
> 
> 
>> As to why it's not implemented, I think simply because no one has
>> coded it yet.
> 
> correct. in particular, making the Tor internals efficiently 
> multi-threaded is difficult due to the particulars of crypto and
> Tor network I/O in the implementation.
> 
> i thought i had a list of Trac tickets to the gist of this matter, 
> alas i cannot find them. perhaps someone else has a convenient
> collection?
> 
> this also came up in context of using CUDA or OpenCL to accelerate 
> network crypto via CPU offload to GPU.
> 
> the good news is that it is maybe less hard now, than it was some 
> years ago, to make this transition to well threaded internals in
> Tor. maybe soon, even closer yet. and as you mention, patches
> welcome since the best fix is code under test :)
> 
> 
> best regards,
> 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQIcBAEBAgAGBQJVyqE0AAoJEIC+hZxcLl/keTAP/AnxXMUFNxFMY/sCMjFWrmV+
soKpOuo4Xoz4leJh15JkTtNK0FePODA6zH2Xrf1r7MiPq8EU06SJlOivPgqruV3i
iLcCjKCLDGN+21T0M9br/dCxnXdwjT8s0MdnNvIQYQynX2bR7Wv+XMD5JIUWy5io
JoNWWCTR3dRIPwqTFYltHDZYJp42qSrgTFicFDyZdPLtdzIz9Rl4C30sNPlA+uoG
qQWAA3AsM2LnMvOUc2wjH/hvaG5cHBbATA65N1kfxKneIemEL/FS85YYwM1C/O4t
jdUzN1Me9qW2VD9P/KtIVidl3RQcGZKnv6ZoAqGHwKBjEVEUa6oM8TWwyfUNJTHE
GKBvCeOkblkOwp5WvzuHMRLdpr61hir+37KeZtJfbShGukEWrx8lxAfIYBui7iPC
0HwISwTxyCMd//OuzE6WFLyokwWUTVb0JPYoQMUxxDiPnnVmNfxq/M5sc1NXGieK
KQFkzwaFRdk3aFeu9nuQRrGKk1okFsyPp1PU18ZBa+4TtbZar0OFn3nOQgO599pv
NN0zrTuNfjFRaknkWJB3MkqBtLk1Lkg8LP0+fmTd3uHUkh7KMOUKFN4mC3thS3UT
UteN58WLkdAxG8VHkR14ZlN30Us1/1bMZtHdMJTZrHIvUkswbkiUV0rATq+Z11hS
Fwu52KUTcIKnacgoSe0u
=5Wd9
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread coderman
On 8/11/15, Roman Mamedov  wrote:
> ...
> *Repeatedly headbangs on the desk*
>
> Uhm so what was I talking about. Ah yes, I believe that's not the case. It
> would add a great deal of benefit actually.

it would be useful, particularly on systems with native acceleration
of supported crypto primitives.



> As to why it's not implemented, I think simply because no one has coded it
> yet.

correct. in particular, making the Tor internals efficiently
multi-threaded is difficult due to the particulars of crypto and Tor
network I/O in the implementation.

i thought i had a list of Trac tickets to the gist of this matter,
  alas i cannot find them. perhaps someone else has a convenient collection?

this also came up in context of using CUDA or OpenCL to accelerate
network crypto via CPU offload to GPU.

the good news is that it is maybe less hard now, than it was some
years ago, to make this transition to well threaded internals in Tor.
maybe soon, even closer yet. and as you mention, patches welcome since
the best fix is code under test :)


best regards,
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Roman Mamedov
On Tue, 11 Aug 2015 15:28:01 -0700
Yuri  wrote:

> On 08/11/2015 15:13, Ryan Carboni wrote:
> > Why is there no multicore support for Tor? I haven't been able to find an
> > answer to this question.
> 
> This is maybe because even with the quite high for the Tor network 
> bitrates of 5-6MBps tor process never comes close to 100% CPU usage on 
> the average hardware. So multicore capability will add no benefit.

> never comes close

> to 100% usage

> never

*Repeatedly headbangs on the desk*

Uhm so what was I talking about. Ah yes, I believe that's not the case. It
would add a great deal of benefit actually.

As to why it's not implemented, I think simply because no one has coded it yet.
Often things tend to not exist until someone creates them. For the reason why
it's not added, my guess is because it is rather difficult. And yeah, maybe
because other priorities, such as the need to work on other features and keep
the code reasonably simple still outweigh the performance benefit from proper
multi-threading.

Currently Tor can use about 130-150% of a CPU, so if you have 4 cores you
could run 2 copies of Tor on the same IP and attain a reasonable degree of
your resources' utilization.

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-08-11 Thread Yuri

On 08/11/2015 15:13, Ryan Carboni wrote:

Why is there no multicore support for Tor? I haven't been able to find an
answer to this question.


This is maybe because even with the quite high for the Tor network 
bitrates of 5-6MBps tor process never comes close to 100% CPU usage on 
the average hardware. So multicore capability will add no benefit.


Yuri
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-22 Thread Çağıl P . Şesto
On Sun, Jun 21, 2015 at 10:35:09PM -0700, Andy Iwanski wrote:
> I'm screwed.  But it they ain't getting my money.  
> My files weren't that valuable to me or anyone else. 
> We can never let the terrorists win.

See https://blog.torproject.org/category/tags/ransomware and
beisdes that, it is considered good practice to do backups.

There may be tools available thay may decrypt your data.

https://en.wikipedia.org/wiki/Backup
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-22 Thread I
> -Original Message-
> From: aiwan...@cox.net
> 
> I'm screwed.  But it they ain't getting my money.  My files weren't that
> valuable to me or anyone else.  We can never let the terrorists win.
>

The term terrorism is now virtually useless and does not fit your situation.

https://firstlook.org/theintercept/2015/06/19/refusal-call-charleston-shootings-terrorism-shows-meaningless-propaganda-term/

Robert


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Andy Iwanski
I'm screwed.  But it they ain't getting my money.  My files weren't that 
valuable to me or anyone else.  We can never let the terrorists win. 




 Mirimir  wrote: 
On 06/21/2015 12:29 PM, Andrew F wrote:
> Would Linux work as a rescue disk for him?

If Joe is right about the cause, no.

His stuff is encrypted, and he needs the passphrase.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Mirimir
On 06/21/2015 12:29 PM, Andrew F wrote:
> Would Linux work as a rescue disk for him?

If Joe is right about the cause, no.

His stuff is encrypted, and he needs the passphrase.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-21 Thread Andrew F
Would Linux work as a rescue disk for him?


On Friday, June 19, 2015, Joe Btfsplk  wrote:

>
> On 6/19/2015 4:17 AM, Andy Iwanski wrote:
>
>> Can someone please help me.  I have lost access to all my files.  I do
>> not understand any of this and need to access my stuff.  I can be reached
>> at XXX-XXX-.  I tried following the directions but it didn't work.
>>
>>  Also, it's a bad idea to post personal data (phone #, home addresses,
> etc.) anywhere on the internet that the general public* could access it.
> * Meaning, spammers, marketers, but possibly also persons w/ some
> malicious intent.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-19 Thread Joe Btfsplk


On 6/19/2015 4:17 AM, Andy Iwanski wrote:

Can someone please help me.  I have lost access to all my files.  I do not 
understand any of this and need to access my stuff.  I can be reached at 
XXX-XXX-.  I tried following the directions but it didn't work.

Also, it's a bad idea to post personal data (phone #, home addresses, 
etc.) anywhere on the internet that the general public* could access it.
* Meaning, spammers, marketers, but possibly also persons w/ some 
malicious intent.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2015-06-19 Thread Geoff Down
If you are the victim of ransomware, you have my sympathy. Note however
that Tor is not connected to the malware that has encrypted your files,
nor to the criminals. It's just software for browsing the private web.
There is a small chance that this blog post may help you:
http://krebsonsecurity.com/2014/08/new-site-recovers-files-locked-by-cryptolocker-ransomware/
 If you are intent upon paying the ransom and need to get Tor working,
 then this list is the right place for help getting Tor working - but
 only that. Note that you can also access .onion sites via
 https://tor2web.org/ .
Good luck
GD

On Fri, Jun 19, 2015, at 10:17 AM, Andy Iwanski wrote:
> Can someone please help me.  I have lost access to all my files.  I do
> not understand any of this and need to access my stuff.  I can be reached
> at 480-688-1048.  I tried following the directions but it didn't work. 
> 
> 
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
http://www.fastmail.com - Choose from over 50 domains or use your own

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-11-17 Thread Jan Varga
hope that you can see message upthere, because i sent it before i suscribed

On Sun, Nov 16, 2014 at 9:28 PM, Jan Varga  wrote:

> which programming tools, languages must i know if i want to contribute
> somehow to this network. Im sturdent so you could help me with my student
> path a little bit :). And another question, which are firsts steps into
> hacking? I really wouldnt like to waste time learning uselest things, so im
> questioning you
> Thanks for your time and answer.
> PS. im inspired by free sourse, non profit orgs. wish you all the best in
> doing right things
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-10 Thread Greg Curcio
sorry, wont happen again, frustrated about what i read, oliver stone

Greg Curcio

On Fri, Oct 10, 2014 at 6:17 AM, Derric Atzrott <
datzr...@alizeepathology.com> wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> > GUYS still looking for ed snowden. i am a producer in l.a. and want to do
> > his entire life story, get his exclusive permission, a 1 or 2 yr option.
> > please help connect us gregcurcio at gmail thanks men
>
> This is the wrong venue for this request. I am highly doubtful that
> anyone here knows Edward Snowden.  This is comparable to walking
> into the auto dealership where Snowden bought his car and yelling,
> "Yo does anyone here know this guy."  You got a few no's and a
> couple of suggestions for where to look.  Shouting further will
> not likely net you any further leads.
>
> Now if you'd like to buy a car... (discuss Tor and Tor related topics)
>
> Thank you,
> Derric Atzrott
> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.2 (MingW32)
>
> iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP
> X6HKkqQ/S7RfUn5qdIK4Jic=
> =Wzlm
> -END PGP SIGNATURE-
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-10 Thread Derric Atzrott
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> GUYS still looking for ed snowden. i am a producer in l.a. and want to do
> his entire life story, get his exclusive permission, a 1 or 2 yr option.
> please help connect us gregcurcio at gmail thanks men

This is the wrong venue for this request. I am highly doubtful that
anyone here knows Edward Snowden.  This is comparable to walking
into the auto dealership where Snowden bought his car and yelling,
"Yo does anyone here know this guy."  You got a few no's and a
couple of suggestions for where to look.  Shouting further will
not likely net you any further leads.

Now if you'd like to buy a car... (discuss Tor and Tor related topics)

Thank you,
Derric Atzrott
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (MingW32)

iD8DBQFUN9xLRHoDdZBwKDgRAvtaAKCulC0oDviwiZZfrS4RmT8RwE/hIgCgr/DP
X6HKkqQ/S7RfUn5qdIK4Jic=
=Wzlm
-END PGP SIGNATURE-

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread I
Look at https://firstlook.org/theintercept/staff/ for Glenn Greenwald's address.


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread Greg Curcio
GUYS still looking for ed snowden. i am a producer in l.a. and want to do
his entire life story, get his exclusive permission, a 1 or 2 yr option.
please help connect us gregcurcio at gmail thanks men

Greg Curcio

On Thu, Oct 9, 2014 at 10:37 AM, ben ho  wrote:

> get bridges
>
> 2014-10-10 1:23 GMT+08:00, ben ho :
> > get bridges
> >
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread Seth David Schoen
ben ho writes:

> get bridges

Hi,

Unfortunately you sent this to a public discussion list for talking
about Tor, which isn't the right address for requesting bridges.

The right place to send that request is .

If you do that and your bridges don't work, you can also try other
resources at

https://bridges.torproject.org/

Good luck!

-- 
Seth Schoen  
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread ben ho
get bridges

2014-10-10 1:23 GMT+08:00, ben ho :
> get bridges
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-10-09 Thread ben ho
get bridges

2014-10-10 1:35 GMT+08:00, ben ho :
> get bridges
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-09-30 Thread Elrippo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hy there,

maybe you want to take a look at this.

https://elrippoisland.net/public/how_to/anonymity.html

Kind regards,
elrippo

On 30. September 2014 12:52:10 MESZ, "René Pedersen"  
wrote:
>Hello is it possible to set a router to relay tor, all the time like
>portforwarding.
>Because I will help tor, also ween my pc is shut off
>--
>tor-talk mailing list - tor-talk@lists.torproject.org
>To unsubscribe or change other settings go to
>https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

- --
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net

Encrypted messages are welcome.
0x84DF1F7E6AE03644

- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.11 (GNU/Linux)
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=otlL
- -END PGP PUBLIC KEY BLOCK-


-BEGIN PGP SIGNATURE-
Version: APG v1.1.1

iQJcBAEBCgBGBQJUKpqPPxxlbHJpcHBvIChrZWVwIHlvdXIgZGF0YSBlbmNyeXB0
ZWQpIDxlbHJpcHBvQGVscmlwcG9pc2xhbmQubmV0PgAKCRAkQ93r2VDR68/ID/wM
X9uhbgNoZ5Q04l7XDCWR8d6dF9R2deL/azDioMC2ixCJfdY++SRbvFCQ9hqHbyqS
/KKz3ojo1K+BthiaGCE24GXgSaDLcv1P9Wie0iGM3rJF1CNzDTim5u7pKhCjSGma
n+j1FWXU1g/D+Mp6X1F8BfbJ8TqiMekLLU3y6EbkfZsAtZifMdPTrJm8hyoM3eoM
2vogfZ

Re: [tor-talk] (no subject)

2014-09-30 Thread CJ


On 09/30/2014 12:52 PM, René Pedersen wrote:
>  Hello is it possible to set a router to relay tor, all the time like 
> portforwarding.
> Because I will help tor, also ween my pc is shut off  
>   
> 

Heya!

maybe have a look at this article:
http://www.instructables.com/id/Raspberry-Pi-Tor-relay/

that may be the easiest way to do things.

Cheers,

C.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread ideas buenas
Do you mean TBB over a VPN?


On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera  wrote:

> On 14-07-29 04:44 PM, cav78 wrote:
> > I would like to know if it's necessary to
> > install or configure a web proxy (privoxy or polipo) with Tor Browser
> > Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
> > Orbot
> >  (a software for Android) includes Polipo, but I don't see it in Tor
> > Browser. Is it really important or we can do without it? Sorry for my
> > english if it's not so perfect. Bye.
>
> Polipo was removed a long time ago because it is no longer needed.  See:
> https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0
>
> Privoxy performed the same functions so it also isnt needed.
>
> The FAQ item explaining this was removed as well, but a dangling
> reference to it remained behind:
>
> https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter
>
> Polipo is still mentioned in the "new" FAQ (even in association with
> Mozilla) which could lead to confusion.
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread Mirimir
On 07/29/2014 02:44 PM, cav78 wrote:
> Hallo everybody.
> 
> I would like to know if it's necessary to 
> install or configure a web proxy (privoxy or polipo) with Tor Browser 
> Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
> Orbot
>  (a software for Android) includes Polipo, but I don't see it in Tor 
> Browser. Is it really important or we can do without it? Sorry for my 
> english if it's not so perfect. Bye.

No, it's not necessary for using the Tor browser. Firefox no longer
requires it. You only need Polipo for other apps that need a web proxy,
and won't work with Tor's SOCKS5 proxy. For apps without any native
proxy support, you need something like torsocks.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-29 Thread krishna e bera
On 14-07-29 04:44 PM, cav78 wrote:
> I would like to know if it's necessary to 
> install or configure a web proxy (privoxy or polipo) with Tor Browser 
> Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
> Orbot
>  (a software for Android) includes Polipo, but I don't see it in Tor 
> Browser. Is it really important or we can do without it? Sorry for my 
> english if it's not so perfect. Bye.

Polipo was removed a long time ago because it is no longer needed.  See:
https://blog.torproject.org/blog/new-tor-browser-bundle-packages-0

Privoxy performed the same functions so it also isnt needed.

The FAQ item explaining this was removed as well, but a dangling
reference to it remained behind:
https://trac.torproject.org/projects/tor/wiki/doc/TorFAQ#WhydoweneedPolipoorPrivoxywithTorWhichisbetter

Polipo is still mentioned in the "new" FAQ (even in association with
Mozilla) which could lead to confusion.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-27 Thread obx
> I would like to know if it's necessary to 
> install or configure a web proxy (privoxy or polipo) with Tor Browser 
> Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.

No, this is not necessary.

> Orbot
>  (a software for Android) includes Polipo, but I don't see it in Tor 
> Browser. Is it really important or we can do without it? Sorry for my 
> english if it's not so perfect. Bye.

Not sure why they do this, but I assume it's to provide Tor to
applications that are unable to use socks5.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-05 Thread Geoff Down


On Fri, Jul 4, 2014, at 11:42 PM, ideas buenas wrote:
> Do a Whois lookup of  the addreses I gave u before  and check that all of
> this resolve to markmonitor.  s3-us-west-2-w.amazonaws.com
 amazonaws.com is registered with Markmonitor, yes: The 'registrar' is
 MarkMonitor, Inc and the 'registrant' is Amazon.com, Inc.
Nothing bad about that, Markmonitor are a big Registrar - if you don't
understand what 'registrar' and 'registrant' mean, see
http://en.wikipedia.org/wiki/Domain_name_system#Domain_name_registration


> 
> just when I was visiting www.lemonde.fr ?
 If you mean that address appears in the status bar when page
 http://www.lemonde.fr/ is loading, look at the bottom of that page.
 There is a Facebook logo.
Le Monde have a Facebook account, and they are letting Facebook put
tracking links in their webpages:
http://en.wikipedia.org/wiki/Web_analytics
 So they are trying to track you, but probably only to sell you things.
This is something that Torbrowser is designed to stop, as long as you
clear cookies between sessions.
GD

-- 
http://www.fastmail.fm - Send your email first class

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Do a Whois lookup of  the addreses I gave u before  and check that all of
this resolve to markmonitor.  s3-us-west-2-w.amazonaws.com
> ec2-174-129-247-121.compute-1.amazonaws.com
> edge-star-shv-04-gru1.facebook.com st

just when I was visiting www.lemonde.fr ?



On Fri, Jul 4, 2014 at 4:51 PM, Geoff Down  wrote:

>
>
> On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
> > Visiting the same website with Tor or normal Firefox its gave me the same
>
>  So this is nothing to do with Tor.
>
> > Remote Address:
> > s3-us-west-2-w.amazonaws.com
> > ec2-174-129-247-121.compute-1.amazonaws.com
> > edge-star-shv-04-gru1.facebook.com
> > as an example.
>
> >While ones repeat themselves in both browsers, others not.
>
> That's not particularly unusual - the website you are visiting is seeing
> accesses from different countries, and so may be serving slightly
> different content to suit those countries.
> It may also server slightly different content at different times.
>
> >
> > One class of unidentifies servers are the ones that not respond to a
> > whois lookup.
>  If you mean that there is no Whois entry for
>  s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
>  provides data for second-level domains (in this case amazonaws.com),
>  not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
>  for example) provided only limited information - which they are
>  entitled to do.
>
> > Other class use an address that not resolve in whois with that
> > address and instead belongs to other
> >
>  I don't understand this, sorry. Can you give an example?
> GD
>
> --
> http://www.fastmail.fm - Choose from over 50 domains or use your own
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down


On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
> Visiting the same website with Tor or normal Firefox its gave me the same

 So this is nothing to do with Tor.

> Remote Address:
> s3-us-west-2-w.amazonaws.com
> ec2-174-129-247-121.compute-1.amazonaws.com
> edge-star-shv-04-gru1.facebook.com
> as an example. 

>While ones repeat themselves in both browsers, others not.

That's not particularly unusual - the website you are visiting is seeing
accesses from different countries, and so may be serving slightly
different content to suit those countries.
It may also server slightly different content at different times.

> 
> One class of unidentifies servers are the ones that not respond to a
> whois lookup. 
 If you mean that there is no Whois entry for
 s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
 provides data for second-level domains (in this case amazonaws.com),
 not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
 for example) provided only limited information - which they are
 entitled to do. 

> Other class use an address that not resolve in whois with that
> address and instead belongs to other
> 
 I don't understand this, sorry. Can you give an example?
GD

-- 
http://www.fastmail.fm - Choose from over 50 domains or use your own

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Visiting the same website with Tor or normal Firefox its gave me the same
Remote Address:
s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com
as an example. While ones repeat themselves in both browsers, others not.

One class of unidentifies servers are the ones that not respond to a whois
lookup. Other class use an address that not resolve in whois with that
address and instead belongs to other




On Fri, Jul 4, 2014 at 2:47 PM, Geoff Down  wrote:

> I don't have any unidentified servers - I don't know what you mean by
> that. Which webpage are you visiting? Have you compared what happens
> when visiting with Torbrowser and visiting with normal Firefox over the
> normal internet?
>
> On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
> > I don think is chatbeat. How many inindetifed servers do u have?
> >
> >
> > On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down 
> > wrote:
> >
> > > See https://chartbeat.com/faq/what-is-ping-chartbeat-net
> > > for what I think you are seeing - website analytics.
> > >
> > > On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
> > > > Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
> > > > this,please. Nor in Whois
> > > >
> > > >
> > > > On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas 
> > > > wrote:
> > > >
> > > > > Another example is this   s3-website-eu-west-1.amazonaws.comOR
> > > > > edge-star-shv-08-gru1.facebook.com  OR
> > > > > ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
> > > > > markmonitor.com
> > > > >
> > > > >
> > > > > On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas <
> ideasbue...@gmail.com>
> > > > > wrote:
> > > > >
> > > > >> I'm not referring to this.I'm talking of a lot of URI that appears
> > > when I
> > > > >> try to link to any site. Every one of those Remote Address start
> with
> > > a
> > > > >> couple o letters followed by numbers like this:
> > > > >> server-54-230-83-145.mia50.r.cloudfront.net  .
> > > > >>
> > > > >>
> > > > >>
> > > > >>
> > > > >> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen  >
> > > wrote:
> > > > >>
> > > > >>> ideas buenas writes:
> > > > >>>
> > > > >>> > Why is markmonitor.com and its derivates in my TBB? How can I
> do
> > > to
> > > > >>> delete
> > > > >>> > this ? Are they watching me?
> > > > >>>
> > > > >>> Hi,
> > > > >>>
> > > > >>> Are you talking about seeing a markmonitor.com rule in the HTTPS
> > > > >>> Everywhere
> > > > >>> Enable/Disable Rules menu?
> > > > >>>
> > > > >>>
> > >
> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
> > > > >>>
> > > > >>> If so, this is one of thousands of HTTPS Everywhere rewrite rules
> > > that
> > > > >>> are included with HTTPS Everywhere, which is included with the
> Tor
> > > > >>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite
> rules
> > > > >>> is to automatically access as many sites as possible with secure
> > > HTTPS
> > > > >>> connections.
> > > > >>>
> > > > >>> HTTPS Everywhere typically does not make your browser access
> sites or
> > > > >>> services that it would not otherwise have accessed, so it
> shouldn't
> > > help
> > > > >>> sites monitor your web browsing if they would otherwise not have
> been
> > > > >>> able to.  There are definitely lots of sites that can monitor
> some
> > > > >>> aspects
> > > > >>> of your web browsing because the site operator has included
> content
> > > > >>> loaded
> > > > >>> from those sites in their web page (so your browser automatically
> > > > >>> retrieves
> > > > >>> that content when you visit the page that embedded the content).
>  For
> > > > >>> example, there are ad networks whose ads are embedded in
> thousands or
> > > > >>> millions of different sites, and if you visit any of those sites
> > > without
> > > > >>> blocking those ads, the ad network operator will get some
> information
> > > > >>> about your visit when your browser loads the embedded content
> from
> > > those
> > > > >>> servers.
> > > > >>>
> > > > >>> The "monitor" in the name of markmonitor is not a reference to
> > > monitoring
> > > > >>> users' web browsing.  Instead, it's part of the name of the
> company
> > > > >>> MarkMonitor, a subsidiary of Thomson Reuters, that provides
> certain
> > > > >>> Internet services mostly to very large companies.
> > > > >>>
> > > > >>> https://www.markmonitor.com/
> > > > >>>
> > > > >>> Their name is supposed to suggest that they can "monitor" their
> > > clients'
> > > > >>> trademarks, but not specifically by spying on Internet (or Tor)
> > > users'
> > > > >>> web browsing.  It seems that one of their original lines of
> business
> > > was
> > > > >>> letting companies know about trademark infringement on web
> sites, so
> > > that
> > > > >>> MarkMonitor's customers could threaten to sue those web sites'
> > > operators.
> > > > >>> They subsequently went into other more infrastructural lines of
> > > business.
> > > > >>>
> > > > >>> There was a

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
I don't have any unidentified servers - I don't know what you mean by
that. Which webpage are you visiting? Have you compared what happens
when visiting with Torbrowser and visiting with normal Firefox over the
normal internet?

On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
> I don think is chatbeat. How many inindetifed servers do u have?
> 
> 
> On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down 
> wrote:
> 
> > See https://chartbeat.com/faq/what-is-ping-chartbeat-net
> > for what I think you are seeing - website analytics.
> >
> > On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
> > > Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
> > > this,please. Nor in Whois
> > >
> > >
> > > On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas 
> > > wrote:
> > >
> > > > Another example is this   s3-website-eu-west-1.amazonaws.comOR
> > > > edge-star-shv-08-gru1.facebook.com  OR
> > > > ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
> > > > markmonitor.com
> > > >
> > > >
> > > > On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
> > > > wrote:
> > > >
> > > >> I'm not referring to this.I'm talking of a lot of URI that appears
> > when I
> > > >> try to link to any site. Every one of those Remote Address start with
> > a
> > > >> couple o letters followed by numbers like this:
> > > >> server-54-230-83-145.mia50.r.cloudfront.net  .
> > > >>
> > > >>
> > > >>
> > > >>
> > > >> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen 
> > wrote:
> > > >>
> > > >>> ideas buenas writes:
> > > >>>
> > > >>> > Why is markmonitor.com and its derivates in my TBB? How can I do
> > to
> > > >>> delete
> > > >>> > this ? Are they watching me?
> > > >>>
> > > >>> Hi,
> > > >>>
> > > >>> Are you talking about seeing a markmonitor.com rule in the HTTPS
> > > >>> Everywhere
> > > >>> Enable/Disable Rules menu?
> > > >>>
> > > >>>
> > https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
> > > >>>
> > > >>> If so, this is one of thousands of HTTPS Everywhere rewrite rules
> > that
> > > >>> are included with HTTPS Everywhere, which is included with the Tor
> > > >>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
> > > >>> is to automatically access as many sites as possible with secure
> > HTTPS
> > > >>> connections.
> > > >>>
> > > >>> HTTPS Everywhere typically does not make your browser access sites or
> > > >>> services that it would not otherwise have accessed, so it shouldn't
> > help
> > > >>> sites monitor your web browsing if they would otherwise not have been
> > > >>> able to.  There are definitely lots of sites that can monitor some
> > > >>> aspects
> > > >>> of your web browsing because the site operator has included content
> > > >>> loaded
> > > >>> from those sites in their web page (so your browser automatically
> > > >>> retrieves
> > > >>> that content when you visit the page that embedded the content).  For
> > > >>> example, there are ad networks whose ads are embedded in thousands or
> > > >>> millions of different sites, and if you visit any of those sites
> > without
> > > >>> blocking those ads, the ad network operator will get some information
> > > >>> about your visit when your browser loads the embedded content from
> > those
> > > >>> servers.
> > > >>>
> > > >>> The "monitor" in the name of markmonitor is not a reference to
> > monitoring
> > > >>> users' web browsing.  Instead, it's part of the name of the company
> > > >>> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
> > > >>> Internet services mostly to very large companies.
> > > >>>
> > > >>> https://www.markmonitor.com/
> > > >>>
> > > >>> Their name is supposed to suggest that they can "monitor" their
> > clients'
> > > >>> trademarks, but not specifically by spying on Internet (or Tor)
> > users'
> > > >>> web browsing.  It seems that one of their original lines of business
> > was
> > > >>> letting companies know about trademark infringement on web sites, so
> > that
> > > >>> MarkMonitor's customers could threaten to sue those web sites'
> > operators.
> > > >>> They subsequently went into other more infrastructural lines of
> > business.
> > > >>>
> > > >>> There was an article a few years ago criticizing the large amount of
> > > >>> power that MarkMonitor has, but most of that power seems to have
> > arisen
> > > >>> mainly because it's an infrastructure provider that some very popular
> > > >>> sites decided to sign up with for various purposes (primarily to
> > register
> > > >>> Internet domain names, because MarkMonitor's domain name registration
> > > >>> services make it extremely difficult for somebody else to take over
> > > >>> control of a domain name illicitly).
> > > >>>
> > > >>> The markmonitor.com HTTPS Everywhere rule is one of thousands of
> > HTTPS
> > > >>> Everywhere rules, and its goal is solely to make sure that if you're
> > > >>> visiting a web page hosted at (or loading content from)
> > markmonitor.com
> > > >>> itsel

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
I don think is chatbeat. How many inindetifed servers do u have?


On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down  wrote:

> See https://chartbeat.com/faq/what-is-ping-chartbeat-net
> for what I think you are seeing - website analytics.
>
> On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
> > Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
> > this,please. Nor in Whois
> >
> >
> > On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas 
> > wrote:
> >
> > > Another example is this   s3-website-eu-west-1.amazonaws.comOR
> > > edge-star-shv-08-gru1.facebook.com  OR
> > > ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
> > > markmonitor.com
> > >
> > >
> > > On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
> > > wrote:
> > >
> > >> I'm not referring to this.I'm talking of a lot of URI that appears
> when I
> > >> try to link to any site. Every one of those Remote Address start with
> a
> > >> couple o letters followed by numbers like this:
> > >> server-54-230-83-145.mia50.r.cloudfront.net  .
> > >>
> > >>
> > >>
> > >>
> > >> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen 
> wrote:
> > >>
> > >>> ideas buenas writes:
> > >>>
> > >>> > Why is markmonitor.com and its derivates in my TBB? How can I do
> to
> > >>> delete
> > >>> > this ? Are they watching me?
> > >>>
> > >>> Hi,
> > >>>
> > >>> Are you talking about seeing a markmonitor.com rule in the HTTPS
> > >>> Everywhere
> > >>> Enable/Disable Rules menu?
> > >>>
> > >>>
> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
> > >>>
> > >>> If so, this is one of thousands of HTTPS Everywhere rewrite rules
> that
> > >>> are included with HTTPS Everywhere, which is included with the Tor
> > >>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
> > >>> is to automatically access as many sites as possible with secure
> HTTPS
> > >>> connections.
> > >>>
> > >>> HTTPS Everywhere typically does not make your browser access sites or
> > >>> services that it would not otherwise have accessed, so it shouldn't
> help
> > >>> sites monitor your web browsing if they would otherwise not have been
> > >>> able to.  There are definitely lots of sites that can monitor some
> > >>> aspects
> > >>> of your web browsing because the site operator has included content
> > >>> loaded
> > >>> from those sites in their web page (so your browser automatically
> > >>> retrieves
> > >>> that content when you visit the page that embedded the content).  For
> > >>> example, there are ad networks whose ads are embedded in thousands or
> > >>> millions of different sites, and if you visit any of those sites
> without
> > >>> blocking those ads, the ad network operator will get some information
> > >>> about your visit when your browser loads the embedded content from
> those
> > >>> servers.
> > >>>
> > >>> The "monitor" in the name of markmonitor is not a reference to
> monitoring
> > >>> users' web browsing.  Instead, it's part of the name of the company
> > >>> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
> > >>> Internet services mostly to very large companies.
> > >>>
> > >>> https://www.markmonitor.com/
> > >>>
> > >>> Their name is supposed to suggest that they can "monitor" their
> clients'
> > >>> trademarks, but not specifically by spying on Internet (or Tor)
> users'
> > >>> web browsing.  It seems that one of their original lines of business
> was
> > >>> letting companies know about trademark infringement on web sites, so
> that
> > >>> MarkMonitor's customers could threaten to sue those web sites'
> operators.
> > >>> They subsequently went into other more infrastructural lines of
> business.
> > >>>
> > >>> There was an article a few years ago criticizing the large amount of
> > >>> power that MarkMonitor has, but most of that power seems to have
> arisen
> > >>> mainly because it's an infrastructure provider that some very popular
> > >>> sites decided to sign up with for various purposes (primarily to
> register
> > >>> Internet domain names, because MarkMonitor's domain name registration
> > >>> services make it extremely difficult for somebody else to take over
> > >>> control of a domain name illicitly).
> > >>>
> > >>> The markmonitor.com HTTPS Everywhere rule is one of thousands of
> HTTPS
> > >>> Everywhere rules, and its goal is solely to make sure that if you're
> > >>> visiting a web page hosted at (or loading content from)
> markmonitor.com
> > >>> itself, that your browser's connection to markmonitor.com's servers
> will
> > >>> be a secure HTTPS connection instead of an insecure HTTP connection.
>  It
> > >>> is not trying to give any additional information to those servers or
> to
> > >>> cause your browser to connect to those servers when it would not
> > >>> otherwise have done so.
> > >>>
> > >>> (You can see the rule itself in the atlas link toward the beginning
> of
> > >>> my message, and see that its effect is to rewrite some http:// links
> > >>> into
> 

Re: [tor-talk] (no subject)

2014-07-03 Thread Geoff Down
See https://chartbeat.com/faq/what-is-ping-chartbeat-net
for what I think you are seeing - website analytics.

On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
> Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
> this,please. Nor in Whois
> 
> 
> On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas 
> wrote:
> 
> > Another example is this   s3-website-eu-west-1.amazonaws.comOR
> > edge-star-shv-08-gru1.facebook.com  OR
> > ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
> > markmonitor.com
> >
> >
> > On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
> > wrote:
> >
> >> I'm not referring to this.I'm talking of a lot of URI that appears when I
> >> try to link to any site. Every one of those Remote Address start with a
> >> couple o letters followed by numbers like this:
> >> server-54-230-83-145.mia50.r.cloudfront.net  .
> >>
> >>
> >>
> >>
> >> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen  wrote:
> >>
> >>> ideas buenas writes:
> >>>
> >>> > Why is markmonitor.com and its derivates in my TBB? How can I do to
> >>> delete
> >>> > this ? Are they watching me?
> >>>
> >>> Hi,
> >>>
> >>> Are you talking about seeing a markmonitor.com rule in the HTTPS
> >>> Everywhere
> >>> Enable/Disable Rules menu?
> >>>
> >>> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
> >>>
> >>> If so, this is one of thousands of HTTPS Everywhere rewrite rules that
> >>> are included with HTTPS Everywhere, which is included with the Tor
> >>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
> >>> is to automatically access as many sites as possible with secure HTTPS
> >>> connections.
> >>>
> >>> HTTPS Everywhere typically does not make your browser access sites or
> >>> services that it would not otherwise have accessed, so it shouldn't help
> >>> sites monitor your web browsing if they would otherwise not have been
> >>> able to.  There are definitely lots of sites that can monitor some
> >>> aspects
> >>> of your web browsing because the site operator has included content
> >>> loaded
> >>> from those sites in their web page (so your browser automatically
> >>> retrieves
> >>> that content when you visit the page that embedded the content).  For
> >>> example, there are ad networks whose ads are embedded in thousands or
> >>> millions of different sites, and if you visit any of those sites without
> >>> blocking those ads, the ad network operator will get some information
> >>> about your visit when your browser loads the embedded content from those
> >>> servers.
> >>>
> >>> The "monitor" in the name of markmonitor is not a reference to monitoring
> >>> users' web browsing.  Instead, it's part of the name of the company
> >>> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
> >>> Internet services mostly to very large companies.
> >>>
> >>> https://www.markmonitor.com/
> >>>
> >>> Their name is supposed to suggest that they can "monitor" their clients'
> >>> trademarks, but not specifically by spying on Internet (or Tor) users'
> >>> web browsing.  It seems that one of their original lines of business was
> >>> letting companies know about trademark infringement on web sites, so that
> >>> MarkMonitor's customers could threaten to sue those web sites' operators.
> >>> They subsequently went into other more infrastructural lines of business.
> >>>
> >>> There was an article a few years ago criticizing the large amount of
> >>> power that MarkMonitor has, but most of that power seems to have arisen
> >>> mainly because it's an infrastructure provider that some very popular
> >>> sites decided to sign up with for various purposes (primarily to register
> >>> Internet domain names, because MarkMonitor's domain name registration
> >>> services make it extremely difficult for somebody else to take over
> >>> control of a domain name illicitly).
> >>>
> >>> The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
> >>> Everywhere rules, and its goal is solely to make sure that if you're
> >>> visiting a web page hosted at (or loading content from) markmonitor.com
> >>> itself, that your browser's connection to markmonitor.com's servers will
> >>> be a secure HTTPS connection instead of an insecure HTTP connection.  It
> >>> is not trying to give any additional information to those servers or to
> >>> cause your browser to connect to those servers when it would not
> >>> otherwise have done so.
> >>>
> >>> (You can see the rule itself in the atlas link toward the beginning of
> >>> my message, and see that its effect is to rewrite some http:// links
> >>> into
> >>> corresponding https:// links, just like other HTTPS Everywhere rules
> >>> do.)
> >>>
> >>> Having HTTPS Everywhere rules that relate to a site does not necessarily
> >>> mean that your browser has ever visited that site or will ever visit
> >>> that site.  We've tried to make this clear because many of the rules
> >>> do relate to controversial or unpopular s

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois


On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas  wrote:

> Another example is this   s3-website-eu-west-1.amazonaws.comOR
> edge-star-shv-08-gru1.facebook.com  OR
> ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
> markmonitor.com
>
>
> On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
> wrote:
>
>> I'm not referring to this.I'm talking of a lot of URI that appears when I
>> try to link to any site. Every one of those Remote Address start with a
>> couple o letters followed by numbers like this:
>> server-54-230-83-145.mia50.r.cloudfront.net  .
>>
>>
>>
>>
>> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen  wrote:
>>
>>> ideas buenas writes:
>>>
>>> > Why is markmonitor.com and its derivates in my TBB? How can I do to
>>> delete
>>> > this ? Are they watching me?
>>>
>>> Hi,
>>>
>>> Are you talking about seeing a markmonitor.com rule in the HTTPS
>>> Everywhere
>>> Enable/Disable Rules menu?
>>>
>>> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
>>>
>>> If so, this is one of thousands of HTTPS Everywhere rewrite rules that
>>> are included with HTTPS Everywhere, which is included with the Tor
>>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
>>> is to automatically access as many sites as possible with secure HTTPS
>>> connections.
>>>
>>> HTTPS Everywhere typically does not make your browser access sites or
>>> services that it would not otherwise have accessed, so it shouldn't help
>>> sites monitor your web browsing if they would otherwise not have been
>>> able to.  There are definitely lots of sites that can monitor some
>>> aspects
>>> of your web browsing because the site operator has included content
>>> loaded
>>> from those sites in their web page (so your browser automatically
>>> retrieves
>>> that content when you visit the page that embedded the content).  For
>>> example, there are ad networks whose ads are embedded in thousands or
>>> millions of different sites, and if you visit any of those sites without
>>> blocking those ads, the ad network operator will get some information
>>> about your visit when your browser loads the embedded content from those
>>> servers.
>>>
>>> The "monitor" in the name of markmonitor is not a reference to monitoring
>>> users' web browsing.  Instead, it's part of the name of the company
>>> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
>>> Internet services mostly to very large companies.
>>>
>>> https://www.markmonitor.com/
>>>
>>> Their name is supposed to suggest that they can "monitor" their clients'
>>> trademarks, but not specifically by spying on Internet (or Tor) users'
>>> web browsing.  It seems that one of their original lines of business was
>>> letting companies know about trademark infringement on web sites, so that
>>> MarkMonitor's customers could threaten to sue those web sites' operators.
>>> They subsequently went into other more infrastructural lines of business.
>>>
>>> There was an article a few years ago criticizing the large amount of
>>> power that MarkMonitor has, but most of that power seems to have arisen
>>> mainly because it's an infrastructure provider that some very popular
>>> sites decided to sign up with for various purposes (primarily to register
>>> Internet domain names, because MarkMonitor's domain name registration
>>> services make it extremely difficult for somebody else to take over
>>> control of a domain name illicitly).
>>>
>>> The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
>>> Everywhere rules, and its goal is solely to make sure that if you're
>>> visiting a web page hosted at (or loading content from) markmonitor.com
>>> itself, that your browser's connection to markmonitor.com's servers will
>>> be a secure HTTPS connection instead of an insecure HTTP connection.  It
>>> is not trying to give any additional information to those servers or to
>>> cause your browser to connect to those servers when it would not
>>> otherwise have done so.
>>>
>>> (You can see the rule itself in the atlas link toward the beginning of
>>> my message, and see that its effect is to rewrite some http:// links
>>> into
>>> corresponding https:// links, just like other HTTPS Everywhere rules
>>> do.)
>>>
>>> Having HTTPS Everywhere rules that relate to a site does not necessarily
>>> mean that your browser has ever visited that site or will ever visit
>>> that site.  We've tried to make this clear because many of the rules
>>> do relate to controversial or unpopular sites, or sites that somebody
>>> could disagree with or be unhappy about in some way.  Each rule just
>>> tries to make your connection more secure if and when you as the end
>>> user of HTTPS Everywhere decide to visit a site that loads content from
>>> the servers in question.
>>>
>>> You can disable the markmonitor.com HTTPS Everywhere rule from within
>>> the
>>> E

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
Another example is this   s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com  OR
ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
markmonitor.com


On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas  wrote:

> I'm not referring to this.I'm talking of a lot of URI that appears when I
> try to link to any site. Every one of those Remote Address start with a
> couple o letters followed by numbers like this:
> server-54-230-83-145.mia50.r.cloudfront.net  .
>
>
>
>
> On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen  wrote:
>
>> ideas buenas writes:
>>
>> > Why is markmonitor.com and its derivates in my TBB? How can I do to
>> delete
>> > this ? Are they watching me?
>>
>> Hi,
>>
>> Are you talking about seeing a markmonitor.com rule in the HTTPS
>> Everywhere
>> Enable/Disable Rules menu?
>>
>> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
>>
>> If so, this is one of thousands of HTTPS Everywhere rewrite rules that
>> are included with HTTPS Everywhere, which is included with the Tor
>> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
>> is to automatically access as many sites as possible with secure HTTPS
>> connections.
>>
>> HTTPS Everywhere typically does not make your browser access sites or
>> services that it would not otherwise have accessed, so it shouldn't help
>> sites monitor your web browsing if they would otherwise not have been
>> able to.  There are definitely lots of sites that can monitor some aspects
>> of your web browsing because the site operator has included content loaded
>> from those sites in their web page (so your browser automatically
>> retrieves
>> that content when you visit the page that embedded the content).  For
>> example, there are ad networks whose ads are embedded in thousands or
>> millions of different sites, and if you visit any of those sites without
>> blocking those ads, the ad network operator will get some information
>> about your visit when your browser loads the embedded content from those
>> servers.
>>
>> The "monitor" in the name of markmonitor is not a reference to monitoring
>> users' web browsing.  Instead, it's part of the name of the company
>> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
>> Internet services mostly to very large companies.
>>
>> https://www.markmonitor.com/
>>
>> Their name is supposed to suggest that they can "monitor" their clients'
>> trademarks, but not specifically by spying on Internet (or Tor) users'
>> web browsing.  It seems that one of their original lines of business was
>> letting companies know about trademark infringement on web sites, so that
>> MarkMonitor's customers could threaten to sue those web sites' operators.
>> They subsequently went into other more infrastructural lines of business.
>>
>> There was an article a few years ago criticizing the large amount of
>> power that MarkMonitor has, but most of that power seems to have arisen
>> mainly because it's an infrastructure provider that some very popular
>> sites decided to sign up with for various purposes (primarily to register
>> Internet domain names, because MarkMonitor's domain name registration
>> services make it extremely difficult for somebody else to take over
>> control of a domain name illicitly).
>>
>> The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
>> Everywhere rules, and its goal is solely to make sure that if you're
>> visiting a web page hosted at (or loading content from) markmonitor.com
>> itself, that your browser's connection to markmonitor.com's servers will
>> be a secure HTTPS connection instead of an insecure HTTP connection.  It
>> is not trying to give any additional information to those servers or to
>> cause your browser to connect to those servers when it would not
>> otherwise have done so.
>>
>> (You can see the rule itself in the atlas link toward the beginning of
>> my message, and see that its effect is to rewrite some http:// links into
>> corresponding https:// links, just like other HTTPS Everywhere rules do.)
>>
>> Having HTTPS Everywhere rules that relate to a site does not necessarily
>> mean that your browser has ever visited that site or will ever visit
>> that site.  We've tried to make this clear because many of the rules
>> do relate to controversial or unpopular sites, or sites that somebody
>> could disagree with or be unhappy about in some way.  Each rule just
>> tries to make your connection more secure if and when you as the end
>> user of HTTPS Everywhere decide to visit a site that loads content from
>> the servers in question.
>>
>> You can disable the markmonitor.com HTTPS Everywhere rule from within the
>> Enable/Disable Rules menu -- but that won't stop your web browser from
>> loading things from markmonitor.com's servers if and when you visit pages
>> that refer to content that's hosted on those servers.  It will just stop
>> HTTPS Eveyrwhere from rewriting that access to tak

Re: [tor-talk] (no subject)

2014-07-03 Thread ideas buenas
I'm not referring to this.I'm talking of a lot of URI that appears when I
try to link to any site. Every one of those Remote Address start with a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net  .



On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen  wrote:

> ideas buenas writes:
>
> > Why is markmonitor.com and its derivates in my TBB? How can I do to
> delete
> > this ? Are they watching me?
>
> Hi,
>
> Are you talking about seeing a markmonitor.com rule in the HTTPS
> Everywhere
> Enable/Disable Rules menu?
>
> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
>
> If so, this is one of thousands of HTTPS Everywhere rewrite rules that
> are included with HTTPS Everywhere, which is included with the Tor
> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
> is to automatically access as many sites as possible with secure HTTPS
> connections.
>
> HTTPS Everywhere typically does not make your browser access sites or
> services that it would not otherwise have accessed, so it shouldn't help
> sites monitor your web browsing if they would otherwise not have been
> able to.  There are definitely lots of sites that can monitor some aspects
> of your web browsing because the site operator has included content loaded
> from those sites in their web page (so your browser automatically retrieves
> that content when you visit the page that embedded the content).  For
> example, there are ad networks whose ads are embedded in thousands or
> millions of different sites, and if you visit any of those sites without
> blocking those ads, the ad network operator will get some information
> about your visit when your browser loads the embedded content from those
> servers.
>
> The "monitor" in the name of markmonitor is not a reference to monitoring
> users' web browsing.  Instead, it's part of the name of the company
> MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
> Internet services mostly to very large companies.
>
> https://www.markmonitor.com/
>
> Their name is supposed to suggest that they can "monitor" their clients'
> trademarks, but not specifically by spying on Internet (or Tor) users'
> web browsing.  It seems that one of their original lines of business was
> letting companies know about trademark infringement on web sites, so that
> MarkMonitor's customers could threaten to sue those web sites' operators.
> They subsequently went into other more infrastructural lines of business.
>
> There was an article a few years ago criticizing the large amount of
> power that MarkMonitor has, but most of that power seems to have arisen
> mainly because it's an infrastructure provider that some very popular
> sites decided to sign up with for various purposes (primarily to register
> Internet domain names, because MarkMonitor's domain name registration
> services make it extremely difficult for somebody else to take over
> control of a domain name illicitly).
>
> The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
> Everywhere rules, and its goal is solely to make sure that if you're
> visiting a web page hosted at (or loading content from) markmonitor.com
> itself, that your browser's connection to markmonitor.com's servers will
> be a secure HTTPS connection instead of an insecure HTTP connection.  It
> is not trying to give any additional information to those servers or to
> cause your browser to connect to those servers when it would not
> otherwise have done so.
>
> (You can see the rule itself in the atlas link toward the beginning of
> my message, and see that its effect is to rewrite some http:// links into
> corresponding https:// links, just like other HTTPS Everywhere rules do.)
>
> Having HTTPS Everywhere rules that relate to a site does not necessarily
> mean that your browser has ever visited that site or will ever visit
> that site.  We've tried to make this clear because many of the rules
> do relate to controversial or unpopular sites, or sites that somebody
> could disagree with or be unhappy about in some way.  Each rule just
> tries to make your connection more secure if and when you as the end
> user of HTTPS Everywhere decide to visit a site that loads content from
> the servers in question.
>
> You can disable the markmonitor.com HTTPS Everywhere rule from within the
> Enable/Disable Rules menu -- but that won't stop your web browser from
> loading things from markmonitor.com's servers if and when you visit pages
> that refer to content that's hosted on those servers.  It will just stop
> HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs.
>
> --
> Seth Schoen  
> Senior Staff Technologist   https://www.eff.org/
> Electronic Frontier Foundation  https://www.eff.org/join
> 815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or 

Re: [tor-talk] (no subject) HTTPS Everywhere

2014-07-03 Thread krishna e bera
On 14-07-02 10:59 PM, Seth David Schoen wrote:
> ideas buenas writes:
> 
>> Why is markmonitor.com and its derivates in my TBB? How can I do to delete
>> this ? Are they watching me?
> 
> Hi,
> 
> Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
> Enable/Disable Rules menu?
> 
> https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
> 
> If so, this is one of thousands of HTTPS Everywhere rewrite rules that
> are included with HTTPS Everywhere, which is included with the Tor
> Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
> is to automatically access as many sites as possible with secure HTTPS
> connections.
> 
> HTTPS Everywhere typically does not make your browser access sites or
> services that it would not otherwise have accessed, so it shouldn't help
> sites monitor your web browsing if they would otherwise not have been
> able to.  

"typically does not"?!  Why is that not "never"?
i am guessing either
a) rogue or buggy HTTPS Everywhere rules
b) sites that redirect SSL/TLS connections elsewhere



-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-02 Thread Seth David Schoen
ideas buenas writes:

> Why is markmonitor.com and its derivates in my TBB? How can I do to delete
> this ? Are they watching me?

Hi,

Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
Enable/Disable Rules menu?

https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

If so, this is one of thousands of HTTPS Everywhere rewrite rules that
are included with HTTPS Everywhere, which is included with the Tor
Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
is to automatically access as many sites as possible with secure HTTPS
connections.

HTTPS Everywhere typically does not make your browser access sites or
services that it would not otherwise have accessed, so it shouldn't help
sites monitor your web browsing if they would otherwise not have been
able to.  There are definitely lots of sites that can monitor some aspects
of your web browsing because the site operator has included content loaded
from those sites in their web page (so your browser automatically retrieves
that content when you visit the page that embedded the content).  For
example, there are ad networks whose ads are embedded in thousands or
millions of different sites, and if you visit any of those sites without
blocking those ads, the ad network operator will get some information
about your visit when your browser loads the embedded content from those
servers.

The "monitor" in the name of markmonitor is not a reference to monitoring
users' web browsing.  Instead, it's part of the name of the company
MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
Internet services mostly to very large companies.

https://www.markmonitor.com/

Their name is supposed to suggest that they can "monitor" their clients'
trademarks, but not specifically by spying on Internet (or Tor) users'
web browsing.  It seems that one of their original lines of business was
letting companies know about trademark infringement on web sites, so that
MarkMonitor's customers could threaten to sue those web sites' operators.
They subsequently went into other more infrastructural lines of business.

There was an article a few years ago criticizing the large amount of
power that MarkMonitor has, but most of that power seems to have arisen
mainly because it's an infrastructure provider that some very popular
sites decided to sign up with for various purposes (primarily to register
Internet domain names, because MarkMonitor's domain name registration
services make it extremely difficult for somebody else to take over
control of a domain name illicitly).

The markmonitor.com HTTPS Everywhere rule is one of thousands of HTTPS
Everywhere rules, and its goal is solely to make sure that if you're
visiting a web page hosted at (or loading content from) markmonitor.com
itself, that your browser's connection to markmonitor.com's servers will
be a secure HTTPS connection instead of an insecure HTTP connection.  It
is not trying to give any additional information to those servers or to
cause your browser to connect to those servers when it would not
otherwise have done so.

(You can see the rule itself in the atlas link toward the beginning of
my message, and see that its effect is to rewrite some http:// links into
corresponding https:// links, just like other HTTPS Everywhere rules do.)

Having HTTPS Everywhere rules that relate to a site does not necessarily
mean that your browser has ever visited that site or will ever visit
that site.  We've tried to make this clear because many of the rules
do relate to controversial or unpopular sites, or sites that somebody
could disagree with or be unhappy about in some way.  Each rule just
tries to make your connection more secure if and when you as the end
user of HTTPS Everywhere decide to visit a site that loads content from
the servers in question.

You can disable the markmonitor.com HTTPS Everywhere rule from within the
Enable/Disable Rules menu -- but that won't stop your web browser from
loading things from markmonitor.com's servers if and when you visit pages
that refer to content that's hosted on those servers.  It will just stop
HTTPS Eveyrwhere from rewriting that access to take place over HTTPS URLs.

-- 
Seth Schoen  
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-02 Thread Joe Btfsplk


On 7/2/2014 6:56 PM, ideas buenas wrote:

Why is markmonitor.com and its derivates in my TBB? How can I do to delete
this ? Are they watching me?
"In your computer" in what sense?  How does it manifest itself? What are 
its derivatives?

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-22 Thread Joe Btfsplk

On 3/20/2014 12:47 PM, Patrick Schleizer wrote:

Joe Btfsplk:

1) I doubt you'll be able to run > 1 instance of TBB - at once - if
that's part of what you want.
Others can correct me, if wrong.

This is possible. Simpler since TBB 3.x. Although undocumented. Bits can
be found here:
- https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers
-
https://www.whonix.org/wiki/Advanced_Security_Guide#More_than_one_Tor_Browser_in_Whonix
Yes, I discovered 2 (or more?) instances of Fx can be run.  Even for the 
same Fx .exe file / version, I can start one;
either clicking a shortcut or thru profile manager.  It allows me to 
start a 2nd instance, where I've mostly used profile manager.


The "-no-remote" command can also be used from Run (Windows) or command 
line / prompt.
This article explains different scenarios pretty well. 
http://kb.mozillazine.org/Opening_a_new_instance_of_Firefox_with_another_profile


NOTE:  under all scenarios, a different profile must be used for the 
2nd, 3rd Firefox instance.  Or, you'll get a "Profile is already in use" 
error.


In this case, the warning is valid - as the same profile is trying to be 
used by 2 instances.  That wouldn't work, as possible changes from each 
instance might try to make conflicting changes for the same prefs in 
same profile.  Thus, the warning.  That same error message in stand 
alone Profile Mgr (*when the selected profile is NOT already in use*) is 
a bug.  But if a selected profile WAS already in use, you wouldn't want 
to use it in another Fx instance.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-20 Thread Patrick Schleizer
Joe Btfsplk:
> 1) I doubt you'll be able to run > 1 instance of TBB - at once - if
> that's part of what you want.
> Others can correct me, if wrong.

This is possible. Simpler since TBB 3.x. Although undocumented. Bits can
be found here:
- https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/WebBrowsers
-
https://www.whonix.org/wiki/Advanced_Security_Guide#More_than_one_Tor_Browser_in_Whonix

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-18 Thread muhammed gokce
If you want to buy a few pc's for me 😂

> Op 18 mrt. 2014 om 03:56 heeft "krishna e bera"  het 
> volgende geschreven:
> 
>> On 14-03-17 12:27 PM, muhammed gokce wrote:
>> No, I don't want to run 1 instance of TBB. I wan't to run a few instances of 
>> TBB, but all with an other IP-adress. Like you can make profiles in firefox. 
>> So you can log in with different accounts at a site. But all the accounts 
>> must own an own IP.
> 
> 
> Some options:
> 
> 1) get more than 1 pc
> 
> 2) modify the source code to do what you need, or offer money to Tor
> Project to develop what you need
> 
> 3) run a TBB in separate virtual machines on a single pc
> 
> 4) have a single TBB with separate tabs or windows open, and each window
> connects to a separate 3rd party vpn or proxy (to get a different ip
> address), and then to the destination.
> 
> 5) if you dont care about "relatively good" anonymity, run multiple Tor
> client instances each listening on a distinct SOCKS port and connect a
> regular Firefox (with separate profile) to each one.
> 
> You can also ask on IRC for detailed help with any of the above.
> 
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-17 Thread krishna e bera
On 14-03-17 12:27 PM, muhammed gokce wrote:
> No, I don't want to run 1 instance of TBB. I wan't to run a few instances of 
> TBB, but all with an other IP-adress. Like you can make profiles in firefox. 
> So you can log in with different accounts at a site. But all the accounts 
> must own an own IP.


Some options:

1) get more than 1 pc

2) modify the source code to do what you need, or offer money to Tor
Project to develop what you need

3) run a TBB in separate virtual machines on a single pc

4) have a single TBB with separate tabs or windows open, and each window
connects to a separate 3rd party vpn or proxy (to get a different ip
address), and then to the destination.

5) if you dont care about "relatively good" anonymity, run multiple Tor
client instances each listening on a distinct SOCKS port and connect a
regular Firefox (with separate profile) to each one.

You can also ask on IRC for detailed help with any of the above.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-17 Thread muhammed gokce
No, I don't want to run 1 instance of TBB. I wan't to run a few instances of 
TBB, but all with an other IP-adress. Like you can make profiles in firefox. So 
you can log in with different accounts at a site. But all the accounts must own 
an own IP.

> Op 16 mrt. 2014 om 21:26 heeft "Joe Btfsplk"  het 
> volgende geschreven:
> 
> 1) I doubt you'll be able to run > 1 instance of TBB - at once - if that's 
> part of what you want.
> Others can correct me, if wrong.
> 
> WARNING:  Be careful about what you modify in a TBB profile.  You could 
> compromise your anonymity.
> Making changes in about:config, etc., w/o *really knowing* how they might 
> affect TBB's ability to preserve anonymity, could be risky.
> 
> If you tell us your main objectives are for multiple TBB profiles, maybe 
> someone can make suggestions.  Possibly, "don't do it."  It depends.
> 
> Same for installing plugins, extensions.  They may not observe instructions 
> to use only the Tor network / port. Or may affect anonymity in other ways.
> Generally, the fewer modifications to TBB preferences / default options & the 
> fewer extensions installed, the better.
> 
> 2) "proxy server is refusing connections" probably has nothing to do w/ (any) 
> profile manager.  It doesn't choose how to connect - it only opens a profile 
> you select (either from existing ones, or new one(s) you create), and uses 
> the file & path you specify, to which ever version of Fx you want to use.
> It's possible that using profile mgr to start TBB, it bypassing the "start 
> Tor Browser.exe" (or other files) & is causing some problem in connecting.
> That might be fixable, but I don't have time to play w/ it.
> 
> 3) If you just want multiple TBB profiles, you could install TBB to a few 
> different folders, then customize each one.
> Start each TBB installation (w/ its own profile) by creating shortcuts for 
> Start Tor Browser.exe, from each installation folder.
> 
> Again, some TBB modifications (say, to the UI) can make your copy of TBB look 
> different than TBB with default settings, to sites that query, log & compare 
> browser characteristics.  For purposes of developing a browser fingerprint so 
> you can be identified later on the same site, or at other sites run by the 
> same people, or that are monitored by tracking companies / "profile builders."
> 
> 
> 
>> On 3/16/2014 5:35 AM, muhammed gokce wrote:
>> I've downloaded the profile manager, selected the TBB firefox.exe, he opened 
>> the TBB, but! But, he said The proxy server is refusing connections.. And 
>> it's like firefox, without the button to choose new identity.
>> 
>> So this is not working, I wan't different profiles, so I can open different 
>> TBB's with each a own IP-adress..
>> 
>> 
>>> Op 14 mrt. 2014 om 23:57 heeft "muhammed gokce" 
>>>  het volgende geschreven:
>>> 
>>> And how do I create in torbrowser different profiles, I still don't 
>>> understand it..
>>> 
 Op 14 mrt. 2014 om 18:11 heeft "Joe Btfsplk"  het 
 volgende geschreven:
 
 It probably won't allow 2 instances of Firefox (TBB) running at once.
 
 You may be able to use the stand alone profile mgr for Firefox 
 https://developer.mozilla.org/en-US/docs/Profile_Manager
 You'd have to add an entry in the profile mgr, to the location of TBB 
 (firefox.exe).   So you can specify which Fx version to use w/ which 
 profile.
 
 Also have to create a new profile for TBB (in a location you choose), then 
 launch TBB using that profile & do any modifications.
 To use different TBB profiles, you'd have to launch the profile mgr each 
 time (not a big deal).
 
 Or, you could use the TBB / firefox ESR's native profile mgr, to create a 
 2nd, 3rd profile - perhaps? in same general location, but different folder.
 Then you'd have to use one of the profile mgrs to select the profile to 
 start each time.  Unless, most times you only use one - then it can be the 
 default profile & only when needing a non-default profile would you need 
 to start profile mgr to select that profile.
 
 On any of these, it's a possibility you may have to manually edit 
 profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)
 
 
> On 3/14/2014 10:30 AM, muhammed gokce wrote:
> Thanks, but copy the browser and trying to open it twice doesn't work.
> 
> I wan't different tor browsers(profiles). Like you kan make it in firefox.
> 
>> Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  
>> het volgende geschreven:
>> 
>> Unless you hope for a TOR dev to anwser you should just go ahead and try
>> it out as its not documented. It is probably either 16 or 32 bits which
>> would be around either 32.000 and about 2 milion.
>> In any case TOR should warn you if you have an invalid value set in your
>> config.
>> 
>> I believe (I dont know for sure) that there is already a specific
>> prof

Re: [tor-talk] (no subject)

2014-03-16 Thread Joe Btfsplk
1) I doubt you'll be able to run > 1 instance of TBB - at once - if 
that's part of what you want.

Others can correct me, if wrong.

WARNING:  Be careful about what you modify in a TBB profile.  You could 
compromise your anonymity.
Making changes in about:config, etc., w/o *really knowing* how they 
might affect TBB's ability to preserve anonymity, could be risky.


If you tell us your main objectives are for multiple TBB profiles, maybe 
someone can make suggestions.  Possibly, "don't do it."  It depends.


Same for installing plugins, extensions.  They may not observe 
instructions to use only the Tor network / port. Or may affect anonymity 
in other ways.
Generally, the fewer modifications to TBB preferences / default options 
& the fewer extensions installed, the better.


2) "proxy server is refusing connections" probably has nothing to do w/ 
(any) profile manager.  It doesn't choose how to connect - it only opens 
a profile you select (either from existing ones, or new one(s) you 
create), and uses the file & path you specify, to which ever version of 
Fx you want to use.
It's possible that using profile mgr to start TBB, it bypassing the 
"start Tor Browser.exe" (or other files) & is causing some problem in 
connecting.

That might be fixable, but I don't have time to play w/ it.

3) If you just want multiple TBB profiles, you could install TBB to a 
few different folders, then customize each one.
Start each TBB installation (w/ its own profile) by creating shortcuts 
for Start Tor Browser.exe, from each installation folder.


Again, some TBB modifications (say, to the UI) can make your copy of TBB 
look different than TBB with default settings, to sites that query, log 
& compare browser characteristics.  For purposes of developing a browser 
fingerprint so you can be identified later on the same site, or at other 
sites run by the same people, or that are monitored by tracking 
companies / "profile builders."




On 3/16/2014 5:35 AM, muhammed gokce wrote:

I've downloaded the profile manager, selected the TBB firefox.exe, he opened 
the TBB, but! But, he said The proxy server is refusing connections.. And it's 
like firefox, without the button to choose new identity.

So this is not working, I wan't different profiles, so I can open different 
TBB's with each a own IP-adress..



Op 14 mrt. 2014 om 23:57 heeft "muhammed gokce"  
het volgende geschreven:

And how do I create in torbrowser different profiles, I still don't understand 
it..


Op 14 mrt. 2014 om 18:11 heeft "Joe Btfsplk"  het volgende 
geschreven:

It probably won't allow 2 instances of Firefox (TBB) running at once.

You may be able to use the stand alone profile mgr for Firefox 
https://developer.mozilla.org/en-US/docs/Profile_Manager
You'd have to add an entry in the profile mgr, to the location of TBB 
(firefox.exe).   So you can specify which Fx version to use w/ which profile.

Also have to create a new profile for TBB (in a location you choose), then launch 
TBB using that profile & do any modifications.
To use different TBB profiles, you'd have to launch the profile mgr each time 
(not a big deal).

Or, you could use the TBB / firefox ESR's native profile mgr, to create a 2nd, 
3rd profile - perhaps? in same general location, but different folder.
Then you'd have to use one of the profile mgrs to select the profile to start each 
time.  Unless, most times you only use one - then it can be the default profile 
& only when needing a non-default profile would you need to start profile mgr 
to select that profile.

On any of these, it's a possibility you may have to manually edit profiles.ini 
(in Windows path:  Tor Browser\Data\Browser\profiles.ini.)



On 3/14/2014 10:30 AM, muhammed gokce wrote:
Thanks, but copy the browser and trying to open it twice doesn't work.

I wan't different tor browsers(profiles). Like you kan make it in firefox.


Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  het 
volgende geschreven:

Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:

Hi, thanks for the help!
I've got a few questions more, what is; does the TrackHostExistExpire a limit 
for the max. seconds, or can I put just 999 behind it ?

And how can I make diffirent profiles in tor browser like firefox, in windows 7?

Thanking you!

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--
tor-talk mailing list - 

Re: [tor-talk] (no subject)

2014-03-16 Thread muhammed gokce
I've downloaded the profile manager, selected the TBB firefox.exe, he opened 
the TBB, but! But, he said The proxy server is refusing connections.. And it's 
like firefox, without the button to choose new identity.

So this is not working, I wan't different profiles, so I can open different 
TBB's with each a own IP-adress..


> Op 14 mrt. 2014 om 23:57 heeft "muhammed gokce"  
> het volgende geschreven:
> 
> And how do I create in torbrowser different profiles, I still don't 
> understand it..
> 
>> Op 14 mrt. 2014 om 18:11 heeft "Joe Btfsplk"  het 
>> volgende geschreven:
>> 
>> It probably won't allow 2 instances of Firefox (TBB) running at once.
>> 
>> You may be able to use the stand alone profile mgr for Firefox 
>> https://developer.mozilla.org/en-US/docs/Profile_Manager
>> You'd have to add an entry in the profile mgr, to the location of TBB 
>> (firefox.exe).   So you can specify which Fx version to use w/ which profile.
>> 
>> Also have to create a new profile for TBB (in a location you choose), then 
>> launch TBB using that profile & do any modifications.
>> To use different TBB profiles, you'd have to launch the profile mgr each 
>> time (not a big deal).
>> 
>> Or, you could use the TBB / firefox ESR's native profile mgr, to create a 
>> 2nd, 3rd profile - perhaps? in same general location, but different folder.
>> Then you'd have to use one of the profile mgrs to select the profile to 
>> start each time.  Unless, most times you only use one - then it can be the 
>> default profile & only when needing a non-default profile would you need to 
>> start profile mgr to select that profile.
>> 
>> On any of these, it's a possibility you may have to manually edit 
>> profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)
>> 
>> 
>>> On 3/14/2014 10:30 AM, muhammed gokce wrote:
>>> Thanks, but copy the browser and trying to open it twice doesn't work.
>>> 
>>> I wan't different tor browsers(profiles). Like you kan make it in firefox.
>>> 
 Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  het 
 volgende geschreven:
 
 Unless you hope for a TOR dev to anwser you should just go ahead and try
 it out as its not documented. It is probably either 16 or 32 bits which
 would be around either 32.000 and about 2 milion.
 In any case TOR should warn you if you have an invalid value set in your
 config.
 
 I believe (I dont know for sure) that there is already a specific
 profile defined for your TOR session hence it wouldnt be wise to create
 a different one.
 Why dont you just copy the TOR browser folder and swap out the config
 values you need in one copy.
 
 Am 14.03.14 15:20, schrieb muhammed gokce:
> Hi, thanks for the help!
> I've got a few questions more, what is; does the TrackHostExistExpire a 
> limit for the max. seconds, or can I put just 999 behind it ?
> 
> And how can I make diffirent profiles in tor browser like firefox, in 
> windows 7?
> 
> Thanking you!
 
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> 
>> -- 
>> tor-talk mailing list - tor-talk@lists.torproject.org
>> To unsubscribe or change other settings go to
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread Joe Btfsplk

On 3/14/2014 4:57 PM, muhammed gokce wrote:

And how do I create in torbrowser different profiles, I still don't understand 
it..

Please go to the MDN (mozilla) link I gave.  Like anything, there's some 
reading on how to use the profile manager, but it's child's play 
compared to using a browser.
They have online help section to use the utility (which doesn't need 
"installing.")
There's also an article in Mozillazine knowledge base on creating 
profiles.  If one can't read & master the steps needed to do this, maybe 
they might shouldn't be creating multiple profiles, esp. to use in TBB.  
Just sayin'.


You use the menu options in the profile manager to create new profiles.  
About a 10 sec. operation, once you know basic menu options.  In the 
same way the native Fx profile manager does.
The native manager would also work, it's just that the stand alone 
manager from MDN has more features, flexibility.  It's not difficult 
(unless one refuses to read simple instructions).


One thing:  The MDN profile manager (or Firefox) has a known bug - which 
doesn't really bother anything.
When the manager is used to open a profile that's previously been 
*opened* (but is now closed), it will show a message that the profile 
you selected appears to be in use & starting Fx with it could damage 
"stuff."
Unless Firefox IS running, with the profile SELECTED,  the profiles 
aren't open & starting them doesn't damage anything.


The only time that might be the case, is if you actually had a running 
instance of Fx / TBB; in which case you'd see it running in Task Manager 
or equivalent running processes monitor in other OSes.
As long as [the profile you've selected] isn't started / running, the 
warnings about it in Profile Manager can be ignored.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread muhammed gokce
And how do I create in torbrowser different profiles, I still don't understand 
it..

> Op 14 mrt. 2014 om 18:11 heeft "Joe Btfsplk"  het 
> volgende geschreven:
> 
> It probably won't allow 2 instances of Firefox (TBB) running at once.
> 
> You may be able to use the stand alone profile mgr for Firefox 
> https://developer.mozilla.org/en-US/docs/Profile_Manager
> You'd have to add an entry in the profile mgr, to the location of TBB 
> (firefox.exe).   So you can specify which Fx version to use w/ which profile.
> 
> Also have to create a new profile for TBB (in a location you choose), then 
> launch TBB using that profile & do any modifications.
> To use different TBB profiles, you'd have to launch the profile mgr each time 
> (not a big deal).
> 
> Or, you could use the TBB / firefox ESR's native profile mgr, to create a 
> 2nd, 3rd profile - perhaps? in same general location, but different folder.
> Then you'd have to use one of the profile mgrs to select the profile to start 
> each time.  Unless, most times you only use one - then it can be the default 
> profile & only when needing a non-default profile would you need to start 
> profile mgr to select that profile.
> 
> On any of these, it's a possibility you may have to manually edit 
> profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)
> 
> 
>> On 3/14/2014 10:30 AM, muhammed gokce wrote:
>> Thanks, but copy the browser and trying to open it twice doesn't work.
>> 
>> I wan't different tor browsers(profiles). Like you kan make it in firefox.
>> 
>>> Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  het 
>>> volgende geschreven:
>>> 
>>> Unless you hope for a TOR dev to anwser you should just go ahead and try
>>> it out as its not documented. It is probably either 16 or 32 bits which
>>> would be around either 32.000 and about 2 milion.
>>> In any case TOR should warn you if you have an invalid value set in your
>>> config.
>>> 
>>> I believe (I dont know for sure) that there is already a specific
>>> profile defined for your TOR session hence it wouldnt be wise to create
>>> a different one.
>>> Why dont you just copy the TOR browser folder and swap out the config
>>> values you need in one copy.
>>> 
>>> Am 14.03.14 15:20, schrieb muhammed gokce:
 Hi, thanks for the help!
 I've got a few questions more, what is; does the TrackHostExistExpire a 
 limit for the max. seconds, or can I put just 999 behind it ?
 
 And how can I make diffirent profiles in tor browser like firefox, in 
 windows 7?
 
 Thanking you!
>>> 
>>> -- 
>>> tor-talk mailing list - tor-talk@lists.torproject.org
>>> To unsubscribe or change other settings go to
>>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> 
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread Joe Btfsplk

It probably won't allow 2 instances of Firefox (TBB) running at once.

You may be able to use the stand alone profile mgr for Firefox 
https://developer.mozilla.org/en-US/docs/Profile_Manager
You'd have to add an entry in the profile mgr, to the location of TBB 
(firefox.exe).   So you can specify which Fx version to use w/ which 
profile.


Also have to create a new profile for TBB (in a location you choose), 
then launch TBB using that profile & do any modifications.
To use different TBB profiles, you'd have to launch the profile mgr each 
time (not a big deal).


Or, you could use the TBB / firefox ESR's native profile mgr, to create 
a 2nd, 3rd profile - perhaps? in same general location, but different 
folder.
Then you'd have to use one of the profile mgrs to select the profile to 
start each time.  Unless, most times you only use one - then it can be 
the default profile & only when needing a non-default profile would you 
need to start profile mgr to select that profile.


On any of these, it's a possibility you may have to manually edit 
profiles.ini (in Windows path:  Tor Browser\Data\Browser\profiles.ini.)



On 3/14/2014 10:30 AM, muhammed gokce wrote:

Thanks, but copy the browser and trying to open it twice doesn't work.

I wan't different tor browsers(profiles). Like you kan make it in firefox.


Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  het 
volgende geschreven:

Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:

Hi, thanks for the help!
I've got a few questions more, what is; does the TrackHostExistExpire a limit 
for the max. seconds, or can I put just 999 behind it ?

And how can I make diffirent profiles in tor browser like firefox, in windows 7?

Thanking you!


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread muhammed gokce
Thanks, but copy the browser and trying to open it twice doesn't work.

I wan't different tor browsers(profiles). Like you kan make it in firefox.

> Op 14 mrt. 2014 om 16:26 heeft "Rick Ross"  het 
> volgende geschreven:
> 
> Unless you hope for a TOR dev to anwser you should just go ahead and try
> it out as its not documented. It is probably either 16 or 32 bits which
> would be around either 32.000 and about 2 milion.
> In any case TOR should warn you if you have an invalid value set in your
> config.
> 
> I believe (I dont know for sure) that there is already a specific
> profile defined for your TOR session hence it wouldnt be wise to create
> a different one.
> Why dont you just copy the TOR browser folder and swap out the config
> values you need in one copy.
> 
> Am 14.03.14 15:20, schrieb muhammed gokce:
>> Hi, thanks for the help!
>> I've got a few questions more, what is; does the TrackHostExistExpire a 
>> limit for the max. seconds, or can I put just 999 behind it ?
>> 
>> And how can I make diffirent profiles in tor browser like firefox, in 
>> windows 7?
>> 
>> Thanking you!
> 
> 
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-03-14 Thread Rick Ross
Unless you hope for a TOR dev to anwser you should just go ahead and try
it out as its not documented. It is probably either 16 or 32 bits which
would be around either 32.000 and about 2 milion.
In any case TOR should warn you if you have an invalid value set in your
config.

I believe (I dont know for sure) that there is already a specific
profile defined for your TOR session hence it wouldnt be wise to create
a different one.
Why dont you just copy the TOR browser folder and swap out the config
values you need in one copy.

Am 14.03.14 15:20, schrieb muhammed gokce:
> Hi, thanks for the help!
> I've got a few questions more, what is; does the TrackHostExistExpire a limit 
> for the max. seconds, or can I put just 999 behind it ?
>
> And how can I make diffirent profiles in tor browser like firefox, in windows 
> 7?
>
> Thanking you!


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-01-18 Thread Patrick Schleizer
and...@torproject.is:
> Cc
> Bcc: 
> Subject: Re: [tor-talk] giving up pseudonymity after collecting experiences
>  with pseudonymous project development
> Reply-To: 
> In-Reply-To: <52da7d13.4010...@riseup.net>
> X-PhaseofMoon: "The Moon is Waning Gibbous (95% of Full)"
> 
> On Sat, Jan 18, 2014 at 01:09:39PM +, adrela...@riseup.net wrote 2.0K 
> bytes in 0 lines about:
> : speak at conferences, to attend key singing parties, to meet up with
> 
> I know this is a typo, but a "key singing party" sounds far better than
> the pgp parties I've attended so far. :)
> 

Indeed. The task is to sign your public key. Preparation for next superstar.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-12-10 Thread Yuri

On 12/09/2013 22:22, Nishaanth_Kumar wrote:

I am Nishaanth,Undergrad in India.
I would love to contribute to Tor.
But I am stuck with questions like where to start and what should I know.
I can code comfortably with C,C++,HTML and know certain stuff about Python.
It would be really helpful if you can me out.


A good way to contribute to any open source project is to review the 
list of open bug reports, find one that you think really matters and you 
feel comfortable you can correct, and work on it.


Yuri
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-21 Thread Ted Smith
On Wed, 2013-11-20 at 22:42 -0500, Griffin Boyce wrote:
> David Huerta wrote:
> > $11.55 on Amazon.com:
> >
> http://www.amazon.com/Be-Amazing-Toys-SNO-500-Insta-Snow/dp/B000FA6APE/ref=sr_1_3?ie=UTF8&qid=1384993405&sr=8-3&keywords=snow
> 
>   Honestly, I can't believe you'd promote this closed-source garbage
> snow, David.  >_>  They'd be better off trying powdered sugar.  It's
> organic, open source, the ingredient-development process is transparent,
> and I'm *pretty sure* Bruce Schneier eats powdered sugar donuts.

This is dangerously short-sighted advice. Even organic sugar is
susceptible to backdoors inserted by seed companies. We really need to
build an open-source plant movement, not just rely on corporations to
not shill out to the NSA.

-- 
Sent from Ubuntu


signature.asc
Description: This is a digitally signed message part
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-20 Thread Benjamin Ikuta
Come on guys, don't feed the trolls. This is not the place to seek snow, and 
that should be made known. 

Sent from my iPod

On Nov 20, 2013, at 4:26 PM, David Huerta  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> On 11/19/13 7:23 PM, jamie hyatt wrote:
>> looking for small amount of good grade snow to buy.
>> 
> 
> $11.55 on Amazon.com:
> http://www.amazon.com/Be-Amazing-Toys-SNO-500-Insta-Snow/dp/B000FA6APE/ref=sr_1_3?ie=UTF8&qid=1384993405&sr=8-3&keywords=snow
> 
> - -- 
> david [.dh] huerta
> davidhuerta.me
> 
> - -BEGIN PGP PUBLIC KEY BLOCK-
> Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> 
> mQENBFDlBaMBCADDRmcSL+YpVzawcjwCtm61lQT32VILEPE3o9mZMAfKlYiEtfJY
> 8r4ggOCdWRoqglPUGOoTSANsQfahxxmyLylFz1D9iNerx9/23iQ8hcFcokoOAdwA
> fhmNHEdkgyQg9Lyy5KcfGsrzJyxd7SBwMOvbRGudWpuA0+Dp84sQXTxHawp/LUVU
> G+zCrrc39jeyHWVLdNESxXCW7nOSRe/jU92/PiMTS0VAYZuHE9j93bH37JjLvXZx
> MgozTZImBxB9SmvT8ztuU1BS9jdmtO9/XD/XjWdvdbWS7z6fjambB8zWWAOkQvz/
> TbCeaIVqYEaQspDaAs4jhdzfpRYRUAfk20cpABEBAAG0IkRhdmlkIEh1ZXJ0YSA8
> aHVlcnRhbml4QGdtYWlsLmNvbT6JAT8EEwECACkFAlD9jbgCGyMFCQlmAYAHCwkI
> BwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRA11ya9rgnzKGv1CACBZzhAEGpA5IAB
> k58CbcDJ4hXg8OSoay24SNi7jdCemp0CEbr1EhHGw3s05sUExl/KRgeQxgazvXtk
> +Y0ynyguA39U+nu/kkRVhB7vNPXj2GKdcsO9cw92KmCcRhKZiYL3OEAiGXYa/kvl
> 6YqXxzbw7oshcceDmSAKctsiBHhS/zwpdb4Co1v260H8HXAf+tsDPbkZHVRSNX/V
> PyhxQFtnFvdEiLE6D6hsMXJWAvNBoeaGb/xaQnU9Elu0JqY+n2372oc2F9ZYsg/D
> WcwcKb5SkucyXnlph8AXTx3SCTISVVN95Pj8anv2Z1XwKV0iM+K3dp/v0bWsIvRq
> 07ZFT/hKtCREYXZpZCBIdWVydGEgPGh1ZXJ0YW5peEBvcGVudGlsLmNvbT6JAUIE
> EwECACwCGyMFCQlmAYAHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAUCUP2N2gIZ
> AQAKCRA11ya9rgnzKBPcB/4ltGkLGpzhH+4OxI+zRk7qRnF3sFLYJUh/VUSSDU8l
> Bu8eEYPol1DJ/MGIKqZytvLC6kvevHBRGT3YpEWJ3q97Iqvzpg52RftN8IZpN8dQ
> 6L8Tr1DLCcIl+F3J0rHBxrU54pXBlPpeo2Yppv2nGo+plFwKkg711A4ZJIUSaG6V
> hmslIovxoUxo4F0QyRNZ9dPqCzzTP63xJCgh0Ez+WVT8gaan1iE4Ck4xlEH6vMZB
> 8tVjXx0tCYPyNRwl0DDXkIfX+9s92stIQVDt4srNKcu6yjjQs7f+0UiULotZ3fKX
> skykx4wBk59BT92VQwBM/tFxgf+p0BLcbasFhCpfTNepiQE/BBMBAgApBQJQ5QWj
> AhsjBQkJZgGABwsJCAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQNdcmva4J8yj6
> /gf/f4lSeMMK3yHLxcRQ7vqHJ+TrWCh62AxTHbbabnozGaug42ekZUJWqf+O97DT
> TpKRhknaTleXWontnotIdHcv/ciFM85SSlO2+k3jouxnyPEIP45wgabAAG55zUZ4
> lUGH9z4OZo0j/OuxfTj/EWc1AciuJAONd5Cz6wFpbPMQ4811cB7IrDKPd5pTOe7M
> B+Y3SpWo95i0DWWeoa3MfXoBUjTjF8c79ZRel+M/9Qxqi9GkD+NWrJbSh1G9Rrkf
> 4FXFDO2tYadsnXV8+PnR0hoHXHoXSpWQzmbNhYa/OZOhPdgqAuOKTgAoT8rR9ELq
> vSHsuacDQOli8WqWd/IR4Szi8rkBDQRQ5QWjAQgA0oAIKM8AFYqHIrQocHmTGR/j
> YybKQ41u+RUkrhzQPGm9lNSIR7MdD+DEwyEPeZLezNzuUk/huA2eZrjI7P/6aire
> 0CtUePzkrY93/OuDS5Tb9FtduyclCFMVm+OlOkMjBiqUofQsei4mB6FLKKtKRdiH
> 0jng3UUkTbJY7iAlKannKBWtsuDCTQuguLh1+Z9bQmINiKSefYgYGJgCklhvYahc
> kX/NKnisepYOwiCldwvbGs6ify962qG14xPf1y/Q4dSCxgSjzLdXDxpp90XEZNiT
> 5YATzZrPJUrcFZX8/ep6I0COtIE+FnjMDKQ2VLCbC8lOJDcTtJdzXUIALrL69wAR
> AQABiQElBBgBAgAPBQJQ5QWjAhsMBQkJZgGAAAoJEDXXJr2uCfMoxs0H/j9YpD4m
> urSQZh8d6yQahM57sxmqBNer4YyZqHzNBVt6jUJ60wM90Yfn2m7mGjcD/GK6/fLq
> PzLv3VsQmMM+aVcCRGiFR5P/bLx5/t90PAgprrA7/ld3g0yN+5TGkI/fdOXQmApl
> bnKDy1q9a9CmtD5M+cOU7adIMEI8ymW2t2Cnw/aTEDNIss/eg2IcfvqirgkBuqw4
> TtYAZiMhY38zifjTu0n2aUcKv64K4PGZVklo3BWdqN3bpt2cviB/kQCC/9JZNmqs
> WfZkK1q9rzo0wkJKTCAtmYYGDzOTYHDCXcOaviexnnq2+DDdfngcu1YpBclf2S4P
> J9HbchaaZTsCADw=
> =mmiq
> - -END PGP PUBLIC KEY BLOCK-
> -BEGIN PGP SIGNATURE-
> Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
> Comment: GPGTools - http://gpgtools.org
> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
> 
> iQEcBAEBAgAGBQJSjVMcAAoJEDXXJr2uCfMoC2cH/1tNuO9RG49r7I1V1LLkXeEz
> Px2MIonNfie+7P7ncAvgCJ0mBQ7R29y+73KSie9Xvc26c3SvP1NMHwEi3b7RpS+I
> fjM2yjuDCzF3Q7btZl9QLGFlQVt2W5lwyKwe5xfO2+ckzIDWudk942QnVUsyuJuK
> /VDorAs9TJfSTUgsCylk3jivRaWoP0dykkMYkoppMGPmCY9mDdYKKVJwj3SQaGzl
> 7tWvEZxuSwC0y5+vIddznqgdisTSI5FSWRi2W6P155leDa+JG/4n6vdlqFfGZCgj
> pdQHwNWv8p7szFQzWZVBW27iHt4SF3aWEgB5/n2jrk5sDxmVhlpKb7Fj5QQveho=
> =aXRF
> -END PGP SIGNATURE-
> 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-20 Thread Griffin Boyce
David Huerta wrote:
> $11.55 on Amazon.com:
>
http://www.amazon.com/Be-Amazing-Toys-SNO-500-Insta-Snow/dp/B000FA6APE/ref=sr_1_3?ie=UTF8&qid=1384993405&sr=8-3&keywords=snow

  Honestly, I can't believe you'd promote this closed-source garbage
snow, David.  >_>  They'd be better off trying powdered sugar.  It's
organic, open source, the ingredient-development process is transparent,
and I'm *pretty sure* Bruce Schneier eats powdered sugar donuts.

  Sheesh.

~Griffin

-- 
Be kind, for everyone you meet is fighting a hard battle.

PGP: 0xD9D4CADEE3B67E7AB2C05717E331FD29AE792C97
OTR: sa...@jabber.ccc.de

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-20 Thread David Huerta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 11/19/13 7:23 PM, jamie hyatt wrote:
> looking for small amount of good grade snow to buy.
> 

$11.55 on Amazon.com:
http://www.amazon.com/Be-Amazing-Toys-SNO-500-Insta-Snow/dp/B000FA6APE/ref=sr_1_3?ie=UTF8&qid=1384993405&sr=8-3&keywords=snow

- -- 
david [.dh] huerta
davidhuerta.me

- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=mmiq
- -END PGP PUBLIC KEY BLOCK-
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJSjVMcAAoJEDXXJr2uCfMoC2cH/1tNuO9RG49r7I1V1LLkXeEz
Px2MIonNfie+7P7ncAvgCJ0mBQ7R29y+73KSie9Xvc26c3SvP1NMHwEi3b7RpS+I
fjM2yjuDCzF3Q7btZl9QLGFlQVt2W5lwyKwe5xfO2+ckzIDWudk942QnVUsyuJuK
/VDorAs9TJfSTUgsCylk3jivRaWoP0dykkMYkoppMGPmCY9mDdYKKVJwj3SQaGzl
7tWvEZxuSwC0y5+vIddznqgdisTSI5FSWRi2W6P155leDa+JG/4n6vdlqFfGZCgj
pdQHwNWv8p7szFQzWZVBW27iHt4SF3aWEgB5/n2jrk5sDxmVhlpKb7Fj5QQveho=
=aXRF
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-20 Thread bao song
Try

snowmachine.cheapdjgear.us/




On Wed, 20/11/13, jamie hyatt  wrote:

 Subject: [tor-talk] (no subject)
 To: "tor-talk@lists.torproject.org" 
 Received: Wednesday, 20 November, 2013, 4:23 AM
 
 looking for small amount of good
 grade snow to buy.
 -- 
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-20 Thread Andreas Krey
On Tue, 19 Nov 2013 16:23:37 +, jamie hyatt wrote:
> looking for small amount of good grade snow to buy.

There will be large quantities available for free around
here, approxmately mid-december. Please send self-addressed,
self-powered refrigerating container for proper delivery.

Andreas

-- 
"Totally trivial. Famous last words."
From: Linus Torvalds 
Date: Fri, 22 Jan 2010 07:29:21 -0800
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-19 Thread Michael Wolf
On 11/19/2013 7:23 PM, jamie hyatt wrote:
> looking for small amount of good grade snow to buy.
I'm sure the law enforcement in the Charlotte, NC area will be by to
assist you shortly.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-11-19 Thread Jake Tarren
This is the wrong mailing list for you.

Go somewhere else.


On Tue, Nov 19, 2013 at 7:23 PM, jamie hyatt  wrote:

> looking for small amount of good grade snow to buy.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>



-- 
Jake Tarren
jake.tar...@gmail.com
(804) 385-5019
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-10-26 Thread Mirimir
On 10/26/2013 11:38 AM, Griffin Boyce wrote:
> On 10/26/2013 11:14 AM, Laurence McCabe wrote:
>> yeah, so setting the ip address to a fixed location, is that possible? or
>> at least so it can be tracked, but to a location other than mine, like
>> using a remote computer
> 
>   I'd highly recommend that you not pursue this unless you really know
> what you're doing.  Having a fixed IP reduces your ability to be
> anonymous somewhat.  If that's what you want, you may be better served
> by using a private VPN.

One can do both. Use Tor for anonymity, and tunnel a VPN through Tor to
get a fixed, non-Tor IP address. The SecurityKISS free option works fine
for this. It's easy to do this using Whonix.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-10-26 Thread Griffin Boyce
On 10/26/2013 11:14 AM, Laurence McCabe wrote:
> yeah, so setting the ip address to a fixed location, is that possible? or
> at least so it can be tracked, but to a location other than mine, like
> using a remote computer

  I'd highly recommend that you not pursue this unless you really know
what you're doing.  Having a fixed IP reduces your ability to be
anonymous somewhat.  If that's what you want, you may be better served
by using a private VPN.

best,
Griffin

-- 
"Cypherpunks write code not flame wars." --Jurre van Bergen
#Foucault / PGP: 0xAE792C97 / OTR: sa...@jabber.ccc.de

My posts are my own, not my employer's.

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-10-26 Thread Manfred Ackermann
You can configure one or more ExitNodes to be used at the torrc.
 Am 26.10.2013 16:26 schrieb "Laurence McCabe" :

> yeah, so setting the ip address to a fixed location, is that possible? or
> at least so it can be tracked, but to a location other than mine, like
> using a remote computer
>
>
> On Sun, Oct 27, 2013 at 12:27 AM, krishna e bera 
> wrote:
>
> > On 13-10-26 08:40 AM, Laurence McCabe wrote:
> > > just wandering, is there a way to set an ip address? so it is not
> > > anonymous? i would like to set one in brisbane australia that different
> > to
> > > mine, and if possible set the computer info sites take to another
> > > computer.. like using a vps..
> >
> > By "not anonymous" do you mean "doesnt change"?
> >
> > You may be interested in Tor Hidden Services
> > https://www.torproject.org/docs/tor-hidden-service.html.en
> >
> >
> > --
> > tor-talk mailing list - tor-talk@lists.torproject.org
> > To unsubscribe or change other settings go to
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> >
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-10-26 Thread Laurence McCabe
yeah, so setting the ip address to a fixed location, is that possible? or
at least so it can be tracked, but to a location other than mine, like
using a remote computer


On Sun, Oct 27, 2013 at 12:27 AM, krishna e bera  wrote:

> On 13-10-26 08:40 AM, Laurence McCabe wrote:
> > just wandering, is there a way to set an ip address? so it is not
> > anonymous? i would like to set one in brisbane australia that different
> to
> > mine, and if possible set the computer info sites take to another
> > computer.. like using a vps..
>
> By "not anonymous" do you mean "doesnt change"?
>
> You may be interested in Tor Hidden Services
> https://www.torproject.org/docs/tor-hidden-service.html.en
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-10-26 Thread krishna e bera
On 13-10-26 08:40 AM, Laurence McCabe wrote:
> just wandering, is there a way to set an ip address? so it is not
> anonymous? i would like to set one in brisbane australia that different to
> mine, and if possible set the computer info sites take to another
> computer.. like using a vps..

By "not anonymous" do you mean "doesnt change"?

You may be interested in Tor Hidden Services
https://www.torproject.org/docs/tor-hidden-service.html.en


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-27 Thread David Green
I would be interested, although I am using OS X Tiger, and am currently on
my learning curve while working on another sub-project.

'nough said :)


On 27 September 2013 15:12, Micah Lee  wrote:

> On 09/25/2013 03:03 PM, Roger Dingledine wrote:
>
>> On Wed, Sep 25, 2013 at 05:32:32PM -0400, Nathan Suchy wrote:
>>
>>> Yes. You can download the Tor browser bundle which works fine on all
>>> major
>>> linux distributions...
>>>
>>
>> Right.
>>
>> https://www.torproject.org/**projects/torbrowser.html.en#**downloads
>>
>>  On Sep 25, 2013 4:31 PM, "Robert K"  wrote:
>>>
 http://www.youtube.com/watch?**v=I1z2K1Izur4

>>>
>> But be careful following the instructions in the youtube video. It looks
>> like they made some deb somewhere and stuck Tor Browser Bundle in it
>> and want you to install that. A) Nobody's audited what exactly they're
>> having you install, now or in the future, and B) I have no idea how or
>> whether they'll keep that deb up to date.
>>
>> It would be nice to make a deb that has Tor Browser in it. There are
>> a bunch of trac tickets on the topic. I think Micah from EFF has been
>> working on it as well; but I don't think this youtube video is pointing
>> to Micah's thing.
>>
>
> I wrote Tor Browser Launcher, which is currently (very slowly) in the
> process of getting packaged in Debian. Before that, the way to install it
> now is to go to 
> https://github.com/micahflee/**torbrowser-launcherand
>  follow the instructions in the readme.
>
> It works great on Ubuntu, and it keeps your Tor Browser updated, and even
> verifies PGP signatures of the downloads.
>
> I haven't had time to work on it in some time, but I would like to one day
> make it available for Windows and OS X too. If anyone wants to volunteer :).
>
> --
> Micah Lee
> @micahflee
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-27 Thread Micah Lee

On 09/25/2013 03:03 PM, Roger Dingledine wrote:

On Wed, Sep 25, 2013 at 05:32:32PM -0400, Nathan Suchy wrote:

Yes. You can download the Tor browser bundle which works fine on all major
linux distributions...


Right.

https://www.torproject.org/projects/torbrowser.html.en#downloads


On Sep 25, 2013 4:31 PM, "Robert K"  wrote:

http://www.youtube.com/watch?v=I1z2K1Izur4


But be careful following the instructions in the youtube video. It looks
like they made some deb somewhere and stuck Tor Browser Bundle in it
and want you to install that. A) Nobody's audited what exactly they're
having you install, now or in the future, and B) I have no idea how or
whether they'll keep that deb up to date.

It would be nice to make a deb that has Tor Browser in it. There are
a bunch of trac tickets on the topic. I think Micah from EFF has been
working on it as well; but I don't think this youtube video is pointing
to Micah's thing.


I wrote Tor Browser Launcher, which is currently (very slowly) in the 
process of getting packaged in Debian. Before that, the way to install 
it now is to go to https://github.com/micahflee/torbrowser-launcher and 
follow the instructions in the readme.


It works great on Ubuntu, and it keeps your Tor Browser updated, and 
even verifies PGP signatures of the downloads.


I haven't had time to work on it in some time, but I would like to one 
day make it available for Windows and OS X too. If anyone wants to 
volunteer :).


--
Micah Lee
@micahflee



signature.asc
Description: OpenPGP digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-26 Thread Bernard Tyers - ei8fdb

On 26 Sep 2013, at 00:59, Roger Dingledine  wrote:

> On Wed, Sep 25, 2013 at 11:17:20PM +0100, Bernard Tyers - ei8fdb wrote:
>> This is true, but people will use what they can if they have
>> difficulties. Anything that helps people installed TBB must be useful,
>> right?
> 
> No? As one example, if you're an activist in  you maybe
> shouldn't get TBB from your government's website.

From your government's website? You mean adding the repo ppa:upubuntu-com/tor? 

If so, then true, the user has no clue about where the install is coming from. 
But possibly, neither do they know..

Fair point, but to counter this the user needs education *before* they download 
TBB from *whereever*.

If the user is already at the point of already having it on their computer, 
they have downloaded it, and their intention is to install it.

They need education of the best place to get it from, as opposed to from some 
(potentially) dodgy youtube video.

If a video shows how to do it insecurely, but a well-written, but technical FAQ 
explains the same, some people will choose the nice and simple video.

I don't agree this is right, but this is what people do.


> Speaking of which, I don't think that youtube video had any mention of
> checking signatures or anything? (But I didn't watch it carefully and
> didn't listen to it at all.) I guess it has you adding a separate deb
> repository, and you fetch the keyring for that, so assuming you fetched it
> right you're likely to get the package it wanted you to get -- whatever
> that is.

There was no audio. Just some randomer hightlighting text in a textpad to show 
the step he/she was on.

If we could do some simple steps in the video for signature checking, they'd 
also help.


> As another example, until the TBB can update itself
> (which is actually coming pretty soon I hope:
> https://trac.torproject.org/projects/tor/ticket/4234 ), we need users
> to understand how and when to upgrade. We're doing a poor job of that
> now, but having even more ways that people install it could make the
> issue even worse.
> 
>> I've had a look around, but I haven't come across any "official Tor
>> Project videos" to help people get TBB installed on [insert OS]?
>> 
>> Are there any created? If not, I could try and do some short videos
>> for Debian, OS X. Just using the "official" steps direct from TP website.
> 
> I'd suggest checking out TBB 3.x and thinking about videos for that
> instead:
> https://blog.torproject.org/category/tags/tbb-30
> Since I'm hoping we can drop TBB 2.x real soon now.


Ok, I'll try that this weekend.

Incidentally, is anyone on the list going to Open ITP's CTS? If anyone is 
interested in meeting up, I'll be there. Let me know on/off-list.

Bernard

--
Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org



signature.asc
Description: Message signed with OpenPGP using GPGMail
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-26 Thread kjtrebor
Yall have been really informative thank you and ill look up more when I have 
time 

On Sep 25, 2013, at 6:59 PM, Roger Dingledine  wrote:

> On Wed, Sep 25, 2013 at 11:17:20PM +0100, Bernard Tyers - ei8fdb wrote:
>> This is true, but people will use what they can if they have
>> difficulties. Anything that helps people installed TBB must be useful,
>> right?
> 
> No? As one example, if you're an activist in  you maybe
> shouldn't get TBB from your government's website.
> 
> Speaking of which, I don't think that youtube video had any mention of
> checking signatures or anything? (But I didn't watch it carefully and
> didn't listen to it at all.) I guess it has you adding a separate deb
> repository, and you fetch the keyring for that, so assuming you fetched it
> right you're likely to get the package it wanted you to get -- whatever
> that is.
> 
> As another example, until the TBB can update itself
> (which is actually coming pretty soon I hope:
> https://trac.torproject.org/projects/tor/ticket/4234 ), we need users
> to understand how and when to upgrade. We're doing a poor job of that
> now, but having even more ways that people install it could make the
> issue even worse.
> 
>> I've had a look around, but I haven't come across any "official Tor
>> Project videos" to help people get TBB installed on [insert OS]?
>> 
>> Are there any created? If not, I could try and do some short videos
>> for Debian, OS X. Just using the "official" steps direct from TP website.
> 
> I'd suggest checking out TBB 3.x and thinking about videos for that
> instead:
> https://blog.torproject.org/category/tags/tbb-30
> Since I'm hoping we can drop TBB 2.x real soon now.
> 
> --Roger
> 
> -- 
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-25 Thread Roger Dingledine
On Wed, Sep 25, 2013 at 11:17:20PM +0100, Bernard Tyers - ei8fdb wrote:
> This is true, but people will use what they can if they have
>difficulties. Anything that helps people installed TBB must be useful,
>right?

No? As one example, if you're an activist in  you maybe
shouldn't get TBB from your government's website.

Speaking of which, I don't think that youtube video had any mention of
checking signatures or anything? (But I didn't watch it carefully and
didn't listen to it at all.) I guess it has you adding a separate deb
repository, and you fetch the keyring for that, so assuming you fetched it
right you're likely to get the package it wanted you to get -- whatever
that is.

As another example, until the TBB can update itself
(which is actually coming pretty soon I hope:
https://trac.torproject.org/projects/tor/ticket/4234 ), we need users
to understand how and when to upgrade. We're doing a poor job of that
now, but having even more ways that people install it could make the
issue even worse.

> I've had a look around, but I haven't come across any "official Tor
>Project videos" to help people get TBB installed on [insert OS]?
> 
> Are there any created? If not, I could try and do some short videos
>for Debian, OS X. Just using the "official" steps direct from TP website.

I'd suggest checking out TBB 3.x and thinking about videos for that
instead:
https://blog.torproject.org/category/tags/tbb-30
Since I'm hoping we can drop TBB 2.x real soon now.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-25 Thread Bernard Tyers - ei8fdb

On 25 Sep 2013, at 23:03, Roger Dingledine  wrote:
> 
> 
>> On Sep 25, 2013 4:31 PM, "Robert K"  wrote:
>>> http://www.youtube.com/watch?v=I1z2K1Izur4
> 
> But be careful following the instructions in the youtube video. It looks
> like they made some deb somewhere and stuck Tor Browser Bundle in it
> and want you to install that. A) Nobody's audited what exactly they're
> having you install, now or in the future,

This is true, but people will use what they can if they have difficulties. 
Anything that helps people installed TBB must be useful, right?

> and B) I have no idea how or
> whether they'll keep that deb up to date.

I've had a look around, but I haven't come across any "official Tor Project 
videos" to help people get TBB installed on [insert OS]?

Are there any created? If not, I could try and do some short videos for Debian, 
OS X. Just using the "official" steps direct from TP website.


Bernard
--
Bernard / bluboxthief / ei8fdb

IO91XM / www.ei8fdb.org



signature.asc
Description: Message signed with OpenPGP using GPGMail
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-25 Thread Roger Dingledine
On Wed, Sep 25, 2013 at 05:32:32PM -0400, Nathan Suchy wrote:
> Yes. You can download the Tor browser bundle which works fine on all major
> linux distributions...

Right.

https://www.torproject.org/projects/torbrowser.html.en#downloads

> On Sep 25, 2013 4:31 PM, "Robert K"  wrote:
> > http://www.youtube.com/watch?v=I1z2K1Izur4

But be careful following the instructions in the youtube video. It looks
like they made some deb somewhere and stuck Tor Browser Bundle in it
and want you to install that. A) Nobody's audited what exactly they're
having you install, now or in the future, and B) I have no idea how or
whether they'll keep that deb up to date.

It would be nice to make a deb that has Tor Browser in it. There are
a bunch of trac tickets on the topic. I think Micah from EFF has been
working on it as well; but I don't think this youtube video is pointing
to Micah's thing.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-09-25 Thread Nathan Suchy
Yes. You can download the Tor browser bundle which works fine on all major
linux distributions...

Sent from my Android so do not expect a fast, long, or perfect response...
On Sep 25, 2013 4:31 PM, "Robert K"  wrote:
>
> Does the tor project properly work on a Ubuntu operating system. I watched
> the video below and it looks like it would work well, but I figure I
> should ask here first anyway.
>
> http://www.youtube.com/watch?v=I1z2K1Izur4
>
> I have a ASUS 1015E-DS03 with Ubuntu if it matters.
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsusbscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-07-24 Thread David Huerta
On Wed, Jul 24, 2013 at 12:33 AM, Roman Mamedov  wrote:

> On Tue, 23 Jul 2013 17:47:37 -0400
> David Huerta  wrote:
>
> > based on GNU/Linux and thus compatible with the GNU/Linux Tor browser
> bundle.
>
> That's just beyond hilarious, mind pointing us to a download link of TBB
> for
> the ARM architecture? Or which of the two available ones should I try on
> the
> Raspberry Pi, the i686 one or the amd64 one?
>

Ah, right. I remember the architecture issue now. I ended up installing the
tor package and pointing Iceweasel to it, now that I recall.

-- 
david [.dh] huerta
davidhuerta.me

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=mmiq
-END PGP PUBLIC KEY BLOCK-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-07-24 Thread Roman Mamedov
On Wed, 24 Jul 2013 08:56:01 +0200
dope457  wrote:

> I am not sure what is the problem here but when using Raspian wouldn´t
> 
> sudo apt-get install tor

Tor will work. But there is no Tor Browser Bundle (TBB) for ARM.

> For TBB I think you have to compile it from the source...

Compiling TBB from source is a different story entirely, and couldn't be
further from the clueless statement "it's for GNU/Linux so sure it'll work".

The only howto that seems[1] to exist[2], is infested with instructions to
download Windows .exe files for this or that, and for some reason even
suggests to install WinRAR, of all things.

Not to mention you're probably going to be building Firefox on a Raspberry Pi,
where you only have 256 or 512 MB of RAM, slow CPU and slow and prone to
dying from wear-out SD card for storage. And this means you will need to do
cross-compiling on a different architecture machine, which drives the
complexity level of the task another order of magnitude upwards.

[1] https://www.torproject.org/projects/torbrowser-details.html.en#build
[2]
https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:/build-scripts/INSTALL

-- 
With respect,
Roman


signature.asc
Description: PGP signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2013-07-24 Thread dope457

On 24.7.2013 6:33, Roman Mamedov wrote:

On Tue, 23 Jul 2013 17:47:37 -0400
David Huerta  wrote:


based on GNU/Linux and thus compatible with the GNU/Linux Tor browser bundle.


That's just beyond hilarious, mind pointing us to a download link of TBB for
the ARM architecture? Or which of the two available ones should I try on the
Raspberry Pi, the i686 one or the amd64 one?




Hello,

I am not sure what is the problem here but when using Raspian wouldn´t

sudo apt-get install tor

do the thing? For TBB I think you have to compile it from the source...

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


  1   2   >