On Wed, 02 Jan 2008 11:24:11 +0100 <[EMAIL PROTECTED]> wrote:
>On 11:09:09 2008-01-02 kazaam <[EMAIL PROTECTED]> wrote:
>> On Tue, 01 Jan 2008 11:48:59 -0800
>> "F. Fox" <[EMAIL PROTECTED]> wrote:
>>
>> > Sadly, my experience with Google offering CAPTCHAs, is that it's
>> > hit-and-miss; some
On Wed, 2 Jan 2008 09:36:40 +1100 "Cameorn Burns"
<[EMAIL PROTECTED]> wrote:
>Ta for that Drake
>
Sigh. From the freebsd-questions list, please read first:
-> Date: Fri, 23 Nov 2007 08:05:59 -0500
-> From: Bill Moran <[EMAIL PROTECTED]>
-> Subject: Re: top posting (off-topic)
->
On Tue, 01 Jan 2008 12:25:35 -0800 "F. Fox" <[EMAIL PROTECTED]> wrote:
>Alexander W. Janssen wrote:
>> F. Fox schrieb:
>>> [I was going to leave your quoted message in... but my Lord, is your
>>> monitor as wide as a football field?! =xoD ]
>>
>> Since you're using Icedove, a little hint: If
On Tue, 1 Jan 2008 19:41:00 +0100 kazaam <[EMAIL PROTECTED]> wrote:
>On Tue, 01 Jan 2008 19:13:31 +0100
>"Ben Stover" <[EMAIL PROTECTED]> wrote:
>> On the left side there are the available Tor servers.
>
>correct
>
>> But what connections are in the mid column (below the worldmap) ?
>
>These a
I have a bare-minimum linux box, much like a planetlab node that I'd
like to use to deploy a Tor relay. In installing Tor, I am having
trouble satisfying the dependencies for the latest stable tor linux
source tarball (tor-0.1.2.18.tar.gz). I (believe I) have successfully
installed the latest
At the risk of jumping into a conversation I barely skimmed, it sounds
like you're talking about something Nicko van Someren described at the
rump session at CRYPTO 98 and expanded on in "Playing 'Hide and Seek'
with Stored Keys", a paper with Adi Shamir at FC 99. My remembered
impression of the pr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Thus spake Ringo Kamens, on 1/2/2008 8:51 PM:
> A new vista service pack just "upgraded" to that "backdoored" random
> number algorithm. Suit yourself in believing Microsoft.
I'm not defending Microsoft, I'm just trying to see things from both
sides
A new vista service pack just "upgraded" to that "backdoored" random number
algorithm. Suit yourself in believing Microsoft.
Comade Ringo Kamens
On Jan 2, 2008 9:42 PM, Eugene Y. Vasserman <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Thus spake Ringo Kamens,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Thus spake Ringo Kamens, on 1/2/2008 4:17 PM:
> Also, see http://www.schneier.com/essay-198.html
> And yeah, I was talking about the NSA key.
Personally (and god help me), I believe Microsoft when they say the key
is not a key back door key. If it w
On Jan 2, 2008 2:10 PM, Eugen Leitl <[EMAIL PROTECTED]> wrote:
> ...
> Don't tell me AES is the bottleneck on a Padlock system. VIA C7
> can process way more AES blocks than the (typically crappy) NIC
> can handle.
compression (zlib) is the Tor bottleneck on a 1.5Ghz C7. crypto
throughput with pa
Thanks for the response. It sounds like torify and tsocks may not be the
best solution. Are there any other good *nix applications/workarounds that
people have been using?
Comrade Ringo Kamens
On Jan 2, 2008 4:52 PM, Nick Mathewson <[EMAIL PROTECTED]> wrote:
> On Wed, Jan 02, 2008 at 04:41:32PM -
Also, see http://www.schneier.com/essay-198.html
And yeah, I was talking about the NSA key.
Comrade Ringo Kamens
On Jan 2, 2008 4:24 PM, Nick Mathewson <[EMAIL PROTECTED]> wrote:
> On Wed, Jan 02, 2008 at 02:47:11PM -0600, Eugene Y. Vasserman wrote:
> > Thus spake Ringo Kamens on Sun, 23 Dec 2007
On Wed, Jan 02, 2008 at 05:08:32PM -0500, Nick Mathewson wrote:
> Yeah, this _is_ a problem. I'd like to get it so that AES is also
> parallelized (since AES is where a well-behaved Tor spends most of its
Don't tell me AES is the bottleneck on a Padlock system. VIA C7
can process way more AES bl
On Wed, Dec 26, 2007 at 10:43:32PM +0100, Olaf Selke wrote:
> morphium wrote:
> >
> > Tor is only using about 80 MBits, so that aren't even 10% of the Bandwith I
> > want to give for tor.
>
> eeh? Wanna give Tor 800 MBits/s?
>
> Tor is a cpu hog efficiently using one core only. On my Debian box
On Wed, Jan 02, 2008 at 04:41:32PM -0500, Nick Mathewson wrote:
[...]
> They don't say what license their code is distributed under.
I spoke too soon. tsocks is under GPLv2, and they distribute a
patched tsocks with the license in place.
Honestly, I don't want to make it sound like there's any
On Sat, Dec 29, 2007 at 07:54:28PM -0500, Ringo Kamens wrote:
> I have a question regarding tsocks. According to
> http://wiki.noreply.org/noreply/TheOnionRouter/TorifyHOWTO#DNSNote, tsocks
> leaks DNS requests and it suggests I either use tor-resolve or apply the
> patch at http://www.totalinfosec
On Wed, Jan 02, 2008 at 02:47:11PM -0600, Eugene Y. Vasserman wrote:
> Thus spake Ringo Kamens on Sun, 23 Dec 2007:
>
> (snip)
> >Also, we know the NSA and DoJ have engaged in
> >this type of activity in the past such as "working" with Microsoft to
> >secure vista and having their priv
On 02.01.2008, at 15:52, Hans Schnehl wrote:
I assume Germany is seen as before the new laws came into force.
No, the new (data retention) laws were already taken into account.
Don't make it worse than it is ;)
"Fingerprints have been included in ID cards, although not for storage
on a
Thus spake Ringo Kamens on Sun, 23 Dec 2007:
(snip)
>Also, we know the NSA and DoJ have engaged in
>this type of activity in the past such as "working" with Microsoft to
>secure vista and having their private key inserted into windows
>versions so they could decrypt things.
I've h
--- anonym <[EMAIL PROTECTED]> wrote:
> On 02/01/08 09:16, anon ymous wrote:
> But I'm more interested in smtp on the "open"
> Internet currently as I don't want to push too many
> new concepts on the people I try to help,
> _and_ I need a solution fast (+ I don't have any
> resources for putting
Hi!
Am 02.01.2008 um 15:52 schrieb Hans Schnehl:
just in case someone wishes to move servers around, see the map
for where to avoid:
http://www.privacyinternational.org/article.shtml?cmd%5B347%
5D=x-347-559597
Or build a trustworthy alliance of lawyers and experts. The
Humanistische Unio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 02/01/08 09:16, anon ymous wrote:
>
> On 12/25/07, anonym <[EMAIL PROTECTED]> wrote:
>> So I'm investigating the possibility of using SMTPS (i.e. SMTP over SSL)
>> on Thunderbird with Torbutton. In fact, this email should have been sent
>> over Tor
Thx for the fast replies, I wasn't really scared but rather curious about what
the logs were saying.
On Wed, Jan 02, 2008 at 05:22:36PM +0100, Csaba Kiraly wrote:
> Hi,
> As far as I can tell (I'm not a developer) the error message you see is
> normal behavior, just logged in a way that scar
Hi,
As far as I can tell (I'm not a developer) the error message you see is
normal behavior, just logged in a way that scares people ;)
Of course it can also be something else, but you can find a possible
explanation in my previous mail in the "no traffic?" thread:
http://archives.seul.org/or/
On Sun, Dec 09, 2007 at 11:42:22PM -0600, Scott Bennett wrote:
> This afternoon my tor server began logging the following messages:
>
> Dec 09 15:10:18.474 [notice] We're missing a certificate from authority tor26
> with signing key : launching request
just in case someone wishes to move servers around, see the map
for where to avoid:
http://www.privacyinternational.org/article.shtml?cmd%5B347%5D=x-347-559597
Interesting.
I assume Germany is seen as before the new laws came into force.
Regards
Hans
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hans Schnehl wrote:
> Hi,
Hi!
> Jan 02 12:46:06.204 [debug] TLS error:
> (errno=54: Connection reset by peer) Jan 02 12:46:06.204 [info]
> connection_read_to_buf(): tls error [connection reset]. breaking
> (nickname NoNickNode, address 111.112.113.1
Hi,
I do have a lot of reoccurring entries as following with Tor logging on debug
level.
This is Tor v0.2.0.15-alpha-dev (r13006) but same was happening before with
lower versions.
Here is an excerpt:
%tail -f /usr/local/etc/tor/debug.log | grep error
Jan 02 12:45:57.965 [info] TLS e
hi,
I've exported my awstat full country list accessing
http://torstatus.blutmagie.de during November and December 2007 into a
pdf file. I don't wanna provide the whole world with direct awstat cgi
access. Data collection started not until beginning November 2007. Maybe
somebody out there find it
On 11:09:09 2008-01-02 kazaam <[EMAIL PROTECTED]> wrote:
> On Tue, 01 Jan 2008 11:48:59 -0800
> "F. Fox" <[EMAIL PROTECTED]> wrote:
>
> > Sadly, my experience with Google offering CAPTCHAs, is that it's
> > hit-and-miss; sometimes they'll give a CAPTCHA, more often they won't.
>
> Yes I also figu
On Tue, 01 Jan 2008 11:48:59 -0800
"F. Fox" <[EMAIL PROTECTED]> wrote:
> Sadly, my experience with Google offering CAPTCHAs, is that it's
> hit-and-miss; sometimes they'll give a CAPTCHA, more often they won't.
Yes I also figured this out now. But makes this sense? When do we get a captcha
and w
Thank you for the update Eugen. I will be tracking what becomes of us here in
the USA. Right now street level biometric scanning, and multiple database
interconnection, are becoming more widespread. I am already wondering what will
become of us all when, (IF..) "legitimate" street CCTV databases
Andrew Del Vecchio wrote:
> Gitano, you rock. It finally works without any error messages! Now one
> final thing: It seems that iptables configs are lost when the computer
> is shut down.
I don't remember you mentioned a reboot between populating the nat
iptable and querying :-)
Olaf
On 12/29/07, Eugen Leitl <[EMAIL PROTECTED]> wrote:
>
> The Tor network so far is largely seen only as an anonymizing
> layer, to access the "real" Internet.
>
> However, it is fully capable of becoming a real Darknet,
> provided hidden services achieve a critical mass, and there
> will be a search
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/25/07, anonym <[EMAIL PROTECTED]> wrote:
> So I'm investigating the possibility of using SMTPS (i.e. SMTP over SSL)
> on Thunderbird with Torbutton. In fact, this email should have been sent
> over Tor. But as we know, there are several issues
35 matches
Mail list logo