On Mon, 21 Aug 2006 19:47:32 -0700 Roger Dingledine <[EMAIL PROTECTED]>
wrote:
>On Sat, Aug 19, 2006 at 05:04:05PM -0700, Tor question wrote:
>> Is there a reason why tor would try and POP mail from random IPs
>while
>>running in Windows? I have a log from AVG Antivirus that shows
>tor is
>>t
On Sat, Aug 19, 2006 at 05:04:05PM -0700, Tor question wrote:
> Is there a reason why tor would try and POP mail from random IPs while
>running in Windows? I have a log from AVG Antivirus that shows tor is
>trying to POP mail. The process number is tor's process id number at
>the time that it hap
Hi,I thought someone might be interested in an Eepsite that routes traffic as so:Broswer > I2P > Privoxy > Tor > InternetHere is the post about this Eepsite: Please note I'm not endorsing this Eepsite or the chaining of Tor at all. I havn't used this and I don't plan to as I think it is unnecessar
On Monday 21 August 2006 19:05, Chris Palmer wrote:
> Robert Hogan writes:
> > It's not a matter of speculation. Using Tor expands the number of
> > potential eavesdroppers by at least the number of exit nodes in the
> > Tor network.
>
> I understood the question to be something like, "Are Tor oper
On Monday 21 August 2006 18:20, Jay Goodman Tamboli wrote:
> (moving back to or-talk)
>
> On 2006.08.21, at 13:06, Robert Hogan wrote:
> > On Sunday 20 August 2006 23:19, Chris Palmer wrote:
> >> Jay Goodman Tamboli writes:
> >>> Is it true that your traffic is more likely to be eavesdropped upon?
Thus spake Matej Kovacic ([EMAIL PROTECTED]):
> Hi,
>
> > A handful of hosts could run this thing and publish their results,
> > perhaps along with some other manually created list of undesirable
> > exits.
>
> Great, that could be an interesting research. However, if someone is
> doing this (in
(moving back to or-talk)
On 2006.08.21, at 13:06, Robert Hogan wrote:
On Sunday 20 August 2006 23:19, Chris Palmer wrote:
Jay Goodman Tamboli writes:
Is it true that your traffic is more likely to be eavesdropped upon?
We can only speculate. End-to-end encryption...
It's not a matter of s
On 8/21/06, Michael Holstein <[EMAIL PROTECTED]> wrote:
If you're using TOR, you shouldn't be
using your name in the first place (what's the point of *anonymously*
identifying yourself?).
I know there are other arguments for TOR like defeating geolocation, but
if that's all you're after, there a
On Mon, Aug 21, 2006 at 08:32:23PM +0800, Pei Hanru wrote:
> Hi,
>
> I complied Tor in Cygwin successfully, but when trying to start Tor, I
> got the following messages and Tor exits.
>
> Aug 21 20:23:55.890 [notice] Tor v0.1.2.0-alpha-cvs. This is
> experimental software. Do not rely on it for s
On Fri, Aug 18, 2006 at 08:49:07PM -0700, Anothony Georgeo wrote:
> Hi,
>
> I have been thinking about the issue of exit node
> operators and/or adversaries sniffing clear-text
> ingress/egress traffic locally and/or remotly on an
> exit node. I have a possible solution but I would
> like the Tor
Hi John,
I'm sending my reply to the or-talk list, since that is the
place from which this exchange springs.
On Mon, Aug 21, 2006 at 02:09:50AM -0400, [EMAIL PROTECTED] wrote:
> Hi Paul,
>
> I was reading a discussion about how you said that combining Tor with Jap
> would hurt the functionalit
> 4. A couple dozen _fast_ 24x7 exit nodes are run by
> trusted operators (read: known personally by Nick or
> Roger) on a local machine the operators control.
The $3_letter_agency would just *love* to have a dozen places (or 2
people) they already know about to serve the subpoenas.
> 7. All Tor
Hi,
I complied Tor in Cygwin successfully, but when trying to start Tor, I
got the following messages and Tor exits.
Aug 21 20:23:55.890 [notice] Tor v0.1.2.0-alpha-cvs. This is
experimental software. Do not rely on it for strong anonymity.
Aug 21 20:23:55.905 [notice] Initialized libevent versio
13 matches
Mail list logo