Hi,
I am not sure if this was on this list, but it is an interesting
information:
http://www.wired.com/epicenter/2009/08/you-deleted-your-cookies-think-again/
it seems cookies could be "respawned"...
And there is a plugin to remove this LSO's:
https://addons.mozilla.org/en-US/firefox/addon/6623
>>Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely
> The above is not a valid identifier. It appears to be missing one
I'm sure anyone interested would look up a substring in the
descriptors, tack on an A and be done with it.
Hmmm...I'm not too sure that I should be blamed for this, but
nevertheless...
On Tue, 18 Aug 2009 23:26:44 -0400 Andrew Lewman
wrote:
>A while ago there was a thread that devolved into "why does Tor still
>ship ancient privoxy?" and "why are you shipping polipo with the Tor
>Browser Bund
On 08/01/2009 02:03 PM, grarpamp wrote:
> For this and other purposes, all the files under that directory should
> also be signed with the release or other suitable key.
Good idea. It's done.
--
Andrew Lewman
The Tor Project
pgp 0x31B0974B
Website: https://torproject.org/
Blog: https://blog.t
On Wed, 19 Aug 2009 23:54:01 +0100 KT wrote:
>Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites
The above is not a valid identifier. It appears to be missing one
character.
>response body [2] when UA is IE. FYI.
>
>KT
>
>[1] http://tinyurl.com/nxfvux
>[2] http://p
Tor Browser Bundle 1.2.8 is released. The big changes are the inclusion
of statically linked openssl dlls to resolve a few geoip lookup and
functionality issues with Vidalia, and the upgrade to the new Vidalia 0.2.2.
Available at https://torproject.org/torbrowser
The full list of updates and fixe
I believe if you just remove --dport, then everything (all ports) are
assumed.
On Wed, Aug 19, 2009 at 1:01 PM, Ringo <2600den...@gmail.com> wrote:
> "I prevent all users other than root from connecting to the Tor Control
> port with an
> > iptables rule which looks like this:
> >
> > iptables -A
Node 446E29C6F3D47C315B78EBB1BAC62C241C9F992 [1] completely overwrites
response body [2] when UA is IE. FYI.
KT
[1] http://tinyurl.com/nxfvux
[2] http://paste.ubuntu.com/255997/
Well given this, I've added a few other trackers, file at the same spot:
http://www.johntowery.com/har2009_Why_Tor_is_slow.mp4.torrent
Ringo
The Hidden Tracker wrote:
>> It uses the hidden tracker and should work for Tor users and non-tor
>> users. It actually appears to be down right now but it'
> It uses the hidden tracker and should work for Tor users and non-tor
> users. It actually appears to be down right now but it'll come up
> eventually. It has both the regular .onion and the tor2web url in it.
Yep, we're down right now. Sorry about the inconvenience. We're
expecting to be up and
On Wed, Aug 19, 2009 at 05:19:20PM -0400, Ringo wrote:
> Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last
> week in The Netherlands. I did a talk on Tor performance challenges ?
> basically walking through the key pieces of the "Why Tor is Slow"
> document that we wrote in Marc
>From Tor Blog
|
Jake, Mike, Karsten, Sebastian, and I attended Hacking at Random last
week in The Netherlands. I did a talk on Tor performance challenges —
basically walking through the key pieces of the "Why Tor is Slow"
document that we wrote in March.
As usual with European hacking cons, the
"I prevent all users other than root from connecting to the Tor Control
port with an
> iptables rule which looks like this:
>
> iptables -A OUTPUT -o lo -p tcp --dport 9051 -m owner ! --uid-owner
root -j REJECT"
Thanks! That should work perfectly. Is there any way to make dport a
wildcard?
Ringo
* on the Wed, Aug 19, 2009 at 02:00:01AM -0400, Ringo wrote:
> One problem I've continually run into while trying to setup a secure tor
> virtual machine for browsing is that I have to allow it access to
> localhost (to connect to Tor). Is there a way in iptables to say "deny
> localhost access to
Andrew Lewman schrieb:
> I tested a few scenarios:
The access to hidden service is important too (in my opinion). I have
good experience using privoxy with:
forwarded-connect-retries 3
Access to hidden services with socks5 in Firefox gives sometimes a
timeout first. After 1-2 retries, the page
When I started working on this, I knew that projects like TorVM and
incognito existed, but I wanted to try something different. The problem
being that if an attacker is able to compromise the browser, the http
proxy, or Tor, the user could have their IP revealed, or at least that
was my understandi
16 matches
Mail list logo