On Tue, 19 Aug 2008 11:45:52 +0700 Roy Lanek <[EMAIL PROTECTED]>
wrote, quoting me without attribution:
>> Why, to the administration at the university (or the bosses at the
>> company) one works for or to one's ISP, of course. Perhaps also to a judge.
>> Wasn't that obvious?
>
>No, it wa
> Why, to the administration at the university (or the bosses at the
> company) one works for or to one's ISP, of course. Perhaps also to a judge.
> Wasn't that obvious?
No, it was not obvious. And it STILL is not.
Besides, what are you trying to say, that one--example--as a soldier [I have
When a server publishes its descriptor, it includes a "bandwidth" line
that has three fields. The first two can be set by lines in torrc, and the
third is set by the server's recorded traffic levels in the preceding 24
hours or since the server started relaying traffic. My questions are as
f
> We offer free service for journalists in areas where there are significant
> restrictions on free speech and free press.
And why should you offer free [I am guessing: free as in free beer] service
for journalists--are you recruiting, looking for PR? Detail free speech and
free press [who knows,
> It seems that they are knees-down to german law-enforcement, opening
> their nodes servers to them when required (?), probably even without
> required nor informative request, as they seem to have set up a backdoor
> system for law-enforcement.
Thinking in advance at the Argentina-Brazil [
On Tue, 19 Aug 2008 09:04:25 +0700 Roy Lanek <[EMAIL PROTECTED]>
wrote, improperly quoting without attribution:
>> It's also a lot easier to sell the idea of exposing yourself to endless
>> abuse complaints if you can use the "...but we're helping Chinese
>> dissidents..." angle.
>
Why, t
> As per privacyinternational.org (link below), Germany, once a top privacy
> rights bastion country, is deceiving progressively.
Top privacy rights bastion country?! ... Yes?!, "once" when?
On the other hand, and focusing on an other topic slightly, though on the
"bastion" theme still: Swiss ban
> It's also a lot easier to sell the idea of exposing yourself to endless
> abuse complaints if you can use the "...but we're helping Chinese
> dissidents..." angle.
A lot easier to sell to WHOM? (Let's say you are Novartis ... who are those
which you are--implicitly or not, and slip of the tongue
Because the patch is annoyingly large, I put it here:
http://pastebin.com/m569e5833
This patch should update the vc7 project files so that they work with
the most recent version of Tor. It also contains a README in
Win32Build/vc7that gives instructions on how to download and compile
the two packa
On Mon, Aug 18, 2008 at 02:01:41PM +0200, anonym wrote:
> In addition, Torbutton does all sorts of other stuff with Firefox that
> otherwise could leak information or otherwise weaken anonymity.
Right. This is important to remember -- using Tor without the new
Torbutton can expose you to anonymity
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ringo Kamens wrote:
> Ok, so as long as I don't whitelist anything, those attacks are pretty
> much nullified right?
not true: NoScript has a default whitelist with popular domains like
google.com or yahoo.com
> What specifically gets disabled in Tor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Marco Bonetti wrote:
> Ringo Kamens wrote:
>> So just to confirm, if I install TorButton, that's all the protection I
>> need and I don't need to worry about NoScript?
> define "protection that you need" :)
> if you "just" want to browse the tor networ
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ringo Kamens wrote:
> So just to confirm, if I install TorButton, that's all the protection I
> need and I don't need to worry about NoScript?
define "protection that you need" :)
if you "just" want to browse the tor network leaving less traces behind
On Mon, 18 Aug 2008 12:44:44 -0600 macintoshzoom
<[EMAIL PROTECTED]> wrote:
>Thank you for your post.
>
>Michael Holstein wrote:
>>
>>> [much text deleted --SB]
>
>TOR from the coffee shop's wifi
>> is a lot harder to trace.
>
>Probably most if not all coffe shop's wifi are at this time unde
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Scott Bennett wrote:
> On Mon, 18 Aug 2008 14:57:42 +0200 sigi <[EMAIL PROTECTED]> wrote:
>> On Mon, Aug 18, 2008 at 11:17:57AM +0200, Karsten N. wrote:
>>> Ringo Kamens schrieb:
I'm working on a presentation where I teach people how to insta
I recently tried upgrading Tor 0.2.13-alpha (which occasionally crashed
on startup) to 0.2.14-alpha. While 0.2.14-alpha no longer crashes, it
also fails to connect to Tor :-(
The error-message is
"[Warning] Problem bootstrapping. Stuck at 15%: Establishing an
encrypted directory connection. (Sock
Hi Michael Holstein,
Thank you for your post.
Michael Holstein wrote:
If tor is incompetent to find HUGE funding for free, it may be time to
setup an international tor paid option.
Many of TORs current high-bandwidth nodes are run by universities .. who
would be legally prohibited from par
On Mon, Aug 18, 2008 at 10:53:51AM -0600, [EMAIL PROTECTED] wrote 2.8K bytes in
55 lines about:
> Summary of this thread: Is currently tor able to easily let users to
> chose a setup as to always set different (user chose-able)
> countries/areas combinations for entry/exit chain, to lower the
On Mon, Aug 18, 2008 at 08:20:09AM -0600, [EMAIL PROTECTED] wrote 1.7K bytes in
46 lines about:
> BUT, I have read somewhere that bad exit nodes can revert your call to
> ssl gmail to plain http gmail after thet first gmail ssl login (gmail
> seems to allow this) ...
gmail has an option to fo
Mac,
I'm actually the operations advisor for XeroBank, which
is incorporated in Panama. Servers are located in the
US, Canada, Netherlands, Germany, Switzerland, Malaysia,
Denmark, and the UK. The network is fully operational, with
some users reporting speeds of >25Mbps of international traffic
th
Hi folks,
I've written a a short project report about my Summer of Code project to
improve the performance of hidden services.
It can be found under http://www.ununoctium.de/gsoc08/gsoc_report.pdf
The directory also includes related files.
If you have questions and/or suggestions, feel free to
Mac,
For high bandwidth in addition to low latency, you are correct
that commercial anonymity is the only option. However there are a
lot of issues with commercial anonymity, and anonymity that is
not purely P2P designed. These issues can result in worse privacy
if you don't pay attention to the c
Thanks for your email.
Dudes:
Is this service really running, or it's a joke?
How long are your running this?
At what jurisdiction do you have set your servers and your corporation-s?
Are you using the tor network?
How do you compares with anonymizer.com?
Do you allow fully untraceable anonymous
> Sorry, just re-reading my post, I am partially wrong, JONDONYM (formerly
> JAP) is still running its main nodes from "compromised" countries.
You're right - but it seems they are accepting node operators from any other
country. So, maybe it pays off being in an different country and then
con
Vidalia or tork on OpenBSD-KDE?
Any of you succeeded on this?
Thanks.
nac
Hi tor gurus, please note that even if I am a tor tester and user from
log years ago, I am still to be considered a newbie.
Summary of this thread: Is currently tor able to easily let users to
chose a setup as to always set different (user chose-able)
countries/areas combinations for entry/exi
If tor is incompetent to find HUGE funding for free, it may be time to
setup an international tor paid option.
Many of TORs current high-bandwidth nodes are run by universities .. who
would be legally prohibited from participating in a for-profit system
(even if the model was just cost recov
Sorry, just re-reading my post, I am partially wrong, JONDONYM (formerly
JAP) is still running its main nodes from "compromised" countries.
As per privacyinternational.org (link below), Germany, once a top
privacy rights bastion country, is deceiving progressively.
http://www.privacyinternati
Since you've come to your own conclusions please go see Xerobank
http://www.xerobank.com or one of those other services available.
On Mon, Aug 18, 2008 at 11:20 AM, macintoshzoom
<[EMAIL PROTECTED]>wrote:
> PERFORMANCE and freeness from big-bro-s influent area is a must for tor and
> for the worl
PERFORMANCE and freeness from big-bro-s influent area is a must for tor
and for the world benefiting tor.
JONDONYM, formerly JAP, have just established this.
( https://www.jondos.de/en/ )
If tor is incompetent to find HUGE funding for free, it may be time to
setup an international tor paid opt
It seems that german jondonym network (formerly JAP) (
https://www.jondos.de/en/ ) is going strong, and that they have recently
enabled a paid option for better performance.
I like this option.
PERFORMANCE and freeness from big-bro-s influency area is a must for tor
and for the world benefitin
I have read somewhere that there is already about +half-a-million tor users.
Is this true?
Mac.
What are the real risks about this?
.. when the adversary could be also a big-bro-s ...
I am testing my tor client enabling AllowInvalidNodes
entry,middle,introduction,rendezvous, as I think this is the way we have
to go for a global tor network privacy/security, as I don't trust (till
some
Hi all tor gurus,
From some time ago I am losing some gmail mails (sent or probably also
when receiving, via socksified Thunderbird (delete mesasges from
server), ssl to pop.gmail.com and smtp.gmail.com) .
I'm testing this on OpenBSD 4.4 -current, tor v0.2.1.1-alpha (r15195),
dsocks and Thun
On Mon, 18 Aug 2008 14:57:42 +0200 sigi <[EMAIL PROTECTED]> wrote:
>On Mon, Aug 18, 2008 at 11:17:57AM +0200, Karsten N. wrote:
>> Ringo Kamens schrieb:
>> > I'm working on a presentation where I teach people how to install Tor. I
>> > have always heard it is best practice to use NoScript and
Noiano ha scritto:
> is it possible to use
> tor as a "proxy" to access the tracker and get the data connections not
> passing through tor?
It should be possible with Azureus:
http://azureus.sourceforge.net/doc/AnonBT/Tor/howto_0.5.htm
Blau
On Mon, Aug 18, 2008 at 11:17:57AM +0200, Karsten N. wrote:
> Ringo Kamens schrieb:
> > I'm working on a presentation where I teach people how to install Tor. I
> > have always heard it is best practice to use NoScript and TorButton, but
> > TorButton automatically hooks "dangerous javascript". Is
On Mon, August 18, 2008 09:57, Marco Bonetti wrote:
> What do you think? (maybe we should also invite Maone on this topic)
I wrote to Maone about this issue, pointing him to the or-talk archives.
He replied with some interesting ideas, I'll report them here:
1) user actions
The user can enable/di
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 18/08/08 11:17, Karsten N. wrote:
> NoScript blocks other "dangerous content" like Java applets, flash,
> siverlight... too. And it discover cross site scripting. So I prefer
> NoScript and FoxyProxy.
Me too (FoxyProxy pattern matching rules!). I a
Hello !
About the signals sent by Tor-Control-Port, according to the manual:
::RELOAD-- Reload: reload config items, refetch directory. (like HUP)
I wonder what's the exact meaning of HUP signal, is it exactly the same as
RELOAD signal or there is a little difference ? Refetch directory me
Ringo Kamens schrieb:
> I'm working on a presentation where I teach people how to install Tor. I
> have always heard it is best practice to use NoScript and TorButton, but
> TorButton automatically hooks "dangerous javascript". Is there any
> reason to have noscript installed after that?
NoScript
On Mon, August 18, 2008 09:32, anonym wrote:
> So, you should _not_ use them together. That's a shame, though.
This is something I was thinking about for some times now, thanks someone
has bring it back up to my attention :)
I completely agree with anonym: it's a shame. However I prefer having both
For JS, Noscript is the top.
I use Noscript and an old version of Torbutton (1.0.4.01) that perfectly does
the job for what it is for: enable/disabble Tor. Newer versions of Torbutton
made trouble with noscript.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 18/08/08 06:35, Ringo Kamens wrote:
> I have always heard it is best practice to use NoScript and TorButton
I've heard just the opposite. I suggest you read the section on which
Firefox extensions to avoid in the Torbutton FAQ:
https://www.torproj
I added a number of ExitPolicy statements to torrc recently that take
the full form of
ExitPolicy accept w.x.y.z:80
or
ExitPolicy accept w.x.y.z/m:80
However, when I try to fetch a web page from a www.somedomain.topdomain
that resolves to w.x.y.z (web server on port 80) by
45 matches
Mail list logo