-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Can't remember if I posted this already so here we go...
I received a phone call from my ISP a couple of weeks ago. They told me
that cert.fi had contacted them with an abuse report. One of my
Tor-servers had been an exit node when someone had contact
Hi
this exit-node problem you may have with Google and some DNSBL (SORBS
and others?) too. Your exit node contacts several IRC channels. That is
why your node is listed as "trojan hacked".
Some times ago we have a thread about SORBS and many exit nodes were
listed in this DNSBL with the attribut
K.N.([EMAIL PROTECTED])@Mon, Aug 27, 2007 at 02:42:04PM +0200:
> Hi
>
> this exit-node problem you may have with Google and some DNSBL (SORBS
> and others?) too. Your exit node contacts several IRC channels. That is
> why your node is listed as "trojan hacked".
>
> Some times ago we have a thread
Some times ago we have a thread about SORBS and many exit nodes were
listed in this DNSBL with the attribut "trojan hacked". Conclusion of
the thread was: "They have no glue!"
Yeah .. well SORBS is to be taken with a grain of salt.
Google sometimes does not work with several exit nodes and
Just curious, up to date has anyone been caught while using Tor?
-
Park yourself in front of a world of choices in alternative vehicles.
Visit the Yahoo! Auto Green Center.
On Mon, Aug 27, 2007 at 01:37:55PM -0700, Rouslan Nabioullin wrote:
> Just curious, up to date has anyone been caught while using Tor?
That's a very vague question.
Suppose I'm using Tor to hide my current IP address, since I don't want
people to know that I'm actually posting something from a se
It is trivial for global passive adversaries, like the government or
large telcom companies, to link true sources and true destinations of
Tor traffic.
Tor aims to provide anonymity against weaker, local adversaries - and
even then, adversaries can win, as investigated in these papers.
Read,
> Some times ago we have a thread about SORBS and many exit nodes were
> listed in this DNSBL with the attribut "trojan hacked". Conclusion of
> the thread was: "They have no glue!"
They still have no clue.
> Google sometimes does not work with several exit nodes and give you the
> message "You m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> this exit-node problem you may have with Google and some DNSBL (SORBS
> and others?) too. Your exit node contacts several IRC channels. That is
> why your node is listed as "trojan hacked".
Mmm.. I did not mention any DNSBL's. I'm familiar with them
Hi!
So, for a long time, Tor servers put information in server descriptors
that Tor clients didn't actually use. The biggest offenders were the
read-history and write-history lines: they account for around 60% of
the size of a big set of compressed servers. By removing these lines,
we can save a
Hello Nick Mathewson,
Thank you very much for letting me know about this upcoming change.
I will get TorStatus to work with this new version, and release an
update, within the next few days.
2-4 weeks should be enough time to get most of the servers running the
new version of Tor and TorStatus.
On Mon, Aug 27, 2007 at 05:11:53PM -0600, Kasimir Gabert wrote:
> Hello Nick Mathewson,
>
> Thank you very much for letting me know about this upcoming change.
>
> I will get TorStatus to work with this new version, and release an
> update, within the next few days.
>
> 2-4 weeks should be enoug
On 8/28/07, M <[EMAIL PROTECTED]> wrote:
>
>
> The problem is that my ISP called me that some botnet had been
> controlled from my ip. Cert.fi had contacted my ISP when they we're
> investigating some DDOS or something like that. I think that they
> thought that my server is cracked.
I had the sa
13 matches
Mail list logo