Re: tor trying to pop mail from random IPs on win32

2006-08-21 Thread Joseph B Kowalski
On Mon, 21 Aug 2006 19:47:32 -0700 Roger Dingledine <[EMAIL PROTECTED]> wrote: >On Sat, Aug 19, 2006 at 05:04:05PM -0700, Tor question wrote: >> Is there a reason why tor would try and POP mail from random IPs >while >>running in Windows? I have a log from AVG Antivirus that shows >tor is >>t

Re: tor trying to pop mail from random IPs on win32

2006-08-21 Thread Roger Dingledine
On Sat, Aug 19, 2006 at 05:04:05PM -0700, Tor question wrote: > Is there a reason why tor would try and POP mail from random IPs while >running in Windows? I have a log from AVG Antivirus that shows tor is >trying to POP mail. The process number is tor's process id number at >the time that it hap

Info: Eepsite that chains I2P and Tor

2006-08-21 Thread Anothony Georgeo
Hi,I thought someone might be interested in an Eepsite that routes traffic as so:Broswer > I2P > Privoxy > Tor > InternetHere is the post about this Eepsite: Please note I'm not endorsing this Eepsite or the chaining of Tor at all.  I havn't used this and I don't plan to as I think it is unnecessar

Re: following on from today's discussion

2006-08-21 Thread Robert Hogan
On Monday 21 August 2006 19:05, Chris Palmer wrote: > Robert Hogan writes: > > It's not a matter of speculation. Using Tor expands the number of > > potential eavesdroppers by at least the number of exit nodes in the > > Tor network. > > I understood the question to be something like, "Are Tor oper

Re: following on from today's discussion

2006-08-21 Thread Robert Hogan
On Monday 21 August 2006 18:20, Jay Goodman Tamboli wrote: > (moving back to or-talk) > > On 2006.08.21, at 13:06, Robert Hogan wrote: > > On Sunday 20 August 2006 23:19, Chris Palmer wrote: > >> Jay Goodman Tamboli writes: > >>> Is it true that your traffic is more likely to be eavesdropped upon?

Re: following on from today's discussion

2006-08-21 Thread Mike Perry
Thus spake Matej Kovacic ([EMAIL PROTECTED]): > Hi, > > > A handful of hosts could run this thing and publish their results, > > perhaps along with some other manually created list of undesirable > > exits. > > Great, that could be an interesting research. However, if someone is > doing this (in

Re: following on from today's discussion

2006-08-21 Thread Jay Goodman Tamboli
(moving back to or-talk) On 2006.08.21, at 13:06, Robert Hogan wrote: On Sunday 20 August 2006 23:19, Chris Palmer wrote: Jay Goodman Tamboli writes: Is it true that your traffic is more likely to be eavesdropped upon? We can only speculate. End-to-end encryption... It's not a matter of s

Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Anthony DiPierro
On 8/21/06, Michael Holstein <[EMAIL PROTECTED]> wrote: If you're using TOR, you shouldn't be using your name in the first place (what's the point of *anonymously* identifying yourself?). I know there are other arguments for TOR like defeating geolocation, but if that's all you're after, there a

Re: Unable to start Tor in Cygwin

2006-08-21 Thread Nick Mathewson
On Mon, Aug 21, 2006 at 08:32:23PM +0800, Pei Hanru wrote: > Hi, > > I complied Tor in Cygwin successfully, but when trying to start Tor, I > got the following messages and Tor exits. > > Aug 21 20:23:55.890 [notice] Tor v0.1.2.0-alpha-cvs. This is > experimental software. Do not rely on it for s

Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Nick Mathewson
On Fri, Aug 18, 2006 at 08:49:07PM -0700, Anothony Georgeo wrote: > Hi, > > I have been thinking about the issue of exit node > operators and/or adversaries sniffing clear-text > ingress/egress traffic locally and/or remotly on an > exit node. I have a possible solution but I would > like the Tor

Re: Tor and chained web based proxy sites?

2006-08-21 Thread Paul Syverson
Hi John, I'm sending my reply to the or-talk list, since that is the place from which this exchange springs. On Mon, Aug 21, 2006 at 02:09:50AM -0400, [EMAIL PROTECTED] wrote: > Hi Paul, > > I was reading a discussion about how you said that combining Tor with Jap > would hurt the functionalit

Re: Exit Node sniffing solution...an idea...

2006-08-21 Thread Michael Holstein
> 4. A couple dozen _fast_ 24x7 exit nodes are run by > trusted operators (read: known personally by Nick or > Roger) on a local machine the operators control. The $3_letter_agency would just *love* to have a dozen places (or 2 people) they already know about to serve the subpoenas. > 7. All Tor

Unable to start Tor in Cygwin

2006-08-21 Thread Pei Hanru
Hi, I complied Tor in Cygwin successfully, but when trying to start Tor, I got the following messages and Tor exits. Aug 21 20:23:55.890 [notice] Tor v0.1.2.0-alpha-cvs. This is experimental software. Do not rely on it for strong anonymity. Aug 21 20:23:55.905 [notice] Initialized libevent versio