--- On Wed, 2/18/09, slush wrote:
...rate limiting ... prioritization...
> I think it is very similar view to the same problem and it
> depends on ease of possible implementation.
I don't quite agree, they really are two very different
solutions to address two different problems. Prioritizati
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
* firing troll-seeking missiles in 9,001 milliseconds. *
Germershausen wrote:
> Who do you think you are, Mr. Bonetti from Italy?
>
>> Marco Bonetti
>> BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
>> Slackintosh Linux Project Develope
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ted Smith wrote:
(snip)
> Yes, I believe the proper way to do so is to use Tor as the tracker
> proxy, but conduct actual data transfer "in the clear". Or at least,
> that's what I've seen on this list in the past. Would anyone like to
> correct me?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Fran Litterio wrote:
(snip)
> I asked this earlier, but didn't see a response ... Wouldn't moving Tor
> away from TCP connections impact the client's ability to connect out
> through draconian firewalls (i.e., those that block all outbound
> connect
>
> please, reply to my email from 8 or 9 months ago and help friends in the
> Iran to use tor riskless. You find my or-talk mail via google. Thanks.
>
He needs to get arround the exclemation mark problem.
> I asked him to use a proxy. But it seems that all
> known proxys - fast proxys - are more
Sorry, but the bittorrent stuff (remember that fuckin japanese magazine that
told japanese girls and boys to use tor for bittorrent, wasn' t that two years
ago?) breaks tor. Not the big servers with 40 MB u/d or so but the smaller
servers.
Yes Scott Benett i agree with you, use tor to connect t
Another good reason to keep ExcludeNodes.
praedor
On Thursday 19 February 2009 07:15:47 Scott Bennett wrote:
> On Thu, 19 Feb 2009 07:17:04 -0500 Erilenz wrote:
> >http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html
> >
> >There's nothing in there that we didn't
http://www.sinfest.net/archive_page.php?comicID=3089
enjoy ;-)
--
Marco Bonetti
BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
Slackintosh Linux Project Developer: http://workaround.ch/
Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
My webstuff: http://sidbox.ho
On Thu, 19 Feb 2009 07:17:04 -0500 Erilenz wrote:
>http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html
>
>There's nothing in there that we didn't already know was possible, and I
>realise
>it's not a Tor specific flaw. I just read this paragraph and thought I'd p
http://blog.internetnews.com/skerner/2009/02/black-hat-hacking-ssl-with-ssl.html
There's nothing in there that we didn't already know was possible, and I realise
it's not a Tor specific flaw. I just read this paragraph and thought I'd pass it
on here:
"Marlinspike also claimed that in a limited 2
On Thu, 19 Feb 2009 10:44:04 +0100 Olaf Selke
wrote:
>Germershausen wrote:
>
>> Become a tor developer and write
>> a module that helps to ban all bittorent traffic from the tor network.
>
>I'm strongly against equipping Tor with the ability to filter exit
>traffic based on the content. That'
>
> > Marco Bonetti
> > BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
> > Slackintosh Linux Project Developer: http://workaround.ch/
> > Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
> > My webstuff: http://sidbox.homelinux.org/
>
> People like you should be ban
Germershausen wrote:
> Become a tor developer and write
> a module that helps to ban all bittorent traffic from the tor network.
I'm strongly against equipping Tor with the ability to filter exit
traffic based on the content. That's exactly what governments and
Hollywood lobbyists nowadays are tr
On Thu, 19 Feb 2009 01:24:40 -0800 "Germershausen"
wrote:
>Who do you think you are, Mr. Bonetti from Italy?
>
>> Marco Bonetti
>> BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
>> Slackintosh Linux Project Developer: http://workaround.ch/
>> Linux-live for powerpc: http://workaro
- Original Message -
From: "Roger Dingledine" mailto:a...@mit.edu>>
To: mailto:or-talk@freehaven.net>>
Sent: Tuesday, February 17, 2009 8:04 PM
Subject: Re: another reason to keep ExcludeNodes
On Tue, Feb 17, 2009 at 08:08:19PM +0100, Lexi Pimenidis wrote:
> > > little bit of investiga
*PLONK*
On Thu, Feb 19, 2009 at 01:24:40AM -0800, Germershausen wrote:
> Who do you think you are, Mr. Bonetti from Italy?
>
> > Marco Bonetti
> > BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
> > Slackintosh Linux Project Developer: http://workaround.ch/
> > Linux-live for powerpc:
Who do you think you are, Mr. Bonetti from Italy?
> Marco Bonetti
> BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
> Slackintosh Linux Project Developer: http://workaround.ch/
> Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
> My webstuff: http://sidbox.homelinux
On Thu, 19 Feb 2009 02:41:10 +0100 slush wrote:
>> >Disagree. I wrote _port_ oriented QoS, not _content_. There can be config
>>
>> is encrypted between the client and the exit
>
>
>But not between exit and target (well, we are not speaking about tunelling
>any kind of SSL connection).
>
>
18 matches
Mail list logo