Jon wrote:
> On Wed, Dec 29, 2010 at 10:38 AM, The Doctor wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
>>
>>> I heard that many times from differen people but I cannot creat any
>>> gmail account without asking sms-verification
On Wed, 29 Dec 2010 21:12:36 +
Orionjur Tor-admin wrote:
> I usually connect to my servers through the Tor.
> When I connecting with them through ssh or sffp I don't find any serious
> in logs of my server except ip--addresses or names of apropriate
> exit-nodes of the Tor.
> But when I conne
On Wed, Dec 29, 2010 at 10:38 AM, The Doctor wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
>
>> I heard that many times from differen people but I cannot creat any
>> gmail account without asking sms-verification about 2 or 3 years..
On Wed, Dec 29, 2010 at 11:34 AM, Moritz Bartl wrote:
> Hi,
>
> The Tor Hidden Wiki lists a few other free email services offering HTTPS at:
> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
>
> --
> Moritz
> ***
> To unsubscri
I usually connect to my servers through the Tor.
When I connecting with them through ssh or sffp I don't find any serious
in logs of my server except ip--addresses or names of apropriate
exit-nodes of the Tor.
But when I connect with them through ftp immediate (without ssh) I can
see real ip-addres
Within last two hour, I tested these four exits, all failed to create
new accounts. FF 3.6.1x, proxy set, dead common agent string. All
form fields randomly generated for each exit. No recovery address
supplied.
2bce68f1f3a84fb5986a09e6c2645f66ceb072d8
0ee6c3888c40a82a5bdc47d6e4d12edc41f4247f
c1b7
Bjarni RĂșnar Einarsson wrote:
> On Wed, Dec 29, 2010 at 7:37 PM, Orionjur Tor-admin <
> tor-ad...@orionjurinform.com> wrote:
>
>> Aleksandr wrote:
>>> On 12/29/2010 12:34 PM, Moritz Bartl wrote:
Hi,
The Tor Hidden Wiki lists a few other free email services offering
>>> HTTPS at:
htt
Andrew Lewman wrote:
> On Wed, 29 Dec 2010 14:02:34 -0500
> grarpamp wrote:
>
>>> We've generally suggested gmail because their bulk account creation
>>> process was good. It seems this is not the case any more.
>> What is this bulk account creation you speak of?
>
> Gmail used to have the abili
On Wed, Dec 29, 2010 at 7:37 PM, Orionjur Tor-admin <
tor-ad...@orionjurinform.com> wrote:
> Aleksandr wrote:
> >
> > On 12/29/2010 12:34 PM, Moritz Bartl wrote:
> >> Hi,
> >
> >> The Tor Hidden Wiki lists a few other free email services offering
> > HTTPS at:
> >> http://kpvz7ki2v5agwt35.onion/wi
Aleksandr wrote:
>
>
> On 12/29/2010 12:34 PM, Moritz Bartl wrote:
>> Hi,
>
>> The Tor Hidden Wiki lists a few other free email services offering
> HTTPS at:
>> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
>
>
> The link above returns nothing.
It opens on my machine. It seems that it c
Praedor Atrebates wrote:
> Interesting. I have a fully anonymous email from gmail (about 1 yr old) that
> I created via tor and it required no call, no text message, nothing, just a
> captcha. I have had several other accounts created at gmail previous to
> this, also created via tor, and have
The Doctor wrote:
> On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
>
>> I heard that many times from differen people but I cannot creat any
>> gmail account without asking sms-verification about 2 or 3 years... And
>> tried do it many times
>
> For what it is worth, I just tried, and was unsuc
On Wed, 29 Dec 2010 14:02:34 -0500
grarpamp wrote:
> > We've generally suggested gmail because their bulk account creation
> > process was good. It seems this is not the case any more.
>
> What is this bulk account creation you speak of?
Gmail used to have the ability to stop bots from creating
> We've generally suggested gmail because their bulk account creation
> process was good. It seems this is not the case any more.
What is this bulk account creation you speak of?
The session leak occurs with the non-https intro/splash/welcome
screen that appears right after new account creation.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/29/2010 12:34 PM, Moritz Bartl wrote:
> Hi,
>
> The Tor Hidden Wiki lists a few other free email services offering
HTTPS at:
> http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
>
The link above returns nothing.
-BEGIN PGP SIGNATURE-
On Wed, 29 Dec 2010 03:42:00 -0500, grarpamp wrote:
> >> The only recommended way to use email with Tor is to use web mail,
> >> e.g. https connections to gmail.
>
> Keep in mind that google does not allow new accounts to be
> created via Tor. Unless you are willing to give up your phone
> number
Hi,
The Tor Hidden Wiki lists a few other free email services offering HTTPS at:
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Email
--
Moritz
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-tal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/29/2010 08:38 AM, Orionjur Tor-admin wrote:
> I heard that many times from differen people but I cannot creat any
> gmail account without asking sms-verification about 2 or 3 years... And
> tried do it many times
For what it is worth, I just tr
and...@torproject.org wrote:
> On Wed, Dec 29, 2010 at 03:42:00AM -0500, grarp...@gmail.com wrote 0.9K bytes
> in 15 lines about:
> : Keep in mind that google does not allow new accounts to be
> : created via Tor. Unless you are willing to give up your phone
>
> This is false. I just created a g
Without any details it's hard to say. I can only guess that it's
using a list of fast exit nodes that its verified. And if that's the
case, it seems basically like the social engineering attack that Nick
Matthewson talked about at Defcon17 where an attacker tricks a user
into using a partition of
On Dec 29, 2010, at 5:12 AM, Orionjur Tor-admin wrote:
Runa A. Sandvik wrote:
On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
wrote:
I had set up a tor exit-node on my vds. It worked about 5 month
but now
I have received a messages about blocking my vds on the grounds of
receiving an a
On Wed, Dec 29, 2010 at 09:02:57AM +0100, klaus.la...@gmx.de wrote 1.1K bytes
in 39 lines about:
: I am looking for updated debian sqeeze packages. Currently only Tor 0.2.1.26
: packages seems to be available. Any ideas where to find the 0.2.1.28 packages?
It is updated in squeeze, labelled as 0
On Wed, Dec 29, 2010 at 03:42:00AM -0500, grarp...@gmail.com wrote 0.9K bytes
in 15 lines about:
: Keep in mind that google does not allow new accounts to be
: created via Tor. Unless you are willing to give up your phone
This is false. I just created a gmail account via tor without needing a
ph
Hi,
Tor-BlackBelt Privacy wants to seed up Tor with a special configuration:
http://sourceforge.net/projects/blackbeltpriv/
The project says, the original code of tor is used with some
improvements in configuration to speed up the tor client.
I have done a small test. It seems, high performa
On Wed, Dec 29, 2010 at 10:32:41AM +, Orionjur Tor-admin wrote:
> As I know sometimes ago there were plans of the Tor developers to make
> TB for Thunderbird, am I wrong?
It's still in the plans, but we don't have anybody to work on it
currently, so don't hold your breath.
Perhaps some nice p
Hek,
> Based on
> http://www-wiwi.uni-regensburg.de/Forschung/Publikationen/Dominik-Herrmann.html.en
> I'm guessing they're basing the talk on their CCSW 2009 paper:
> http://epub.uni-regensburg.de/11919/
Actually, the talk is based on the PhD thesis of Andriy Panchenko. He'll publish
the detaile
Roger Dingledine wrote:
> On Tue, Dec 28, 2010 at 08:57:24PM -0500, Alek wrote:
>> I'm curious- in what way can Tor be used for emailing? When someone is
>> connected to the Tor network is there email routed along the Tor network
>> too? Or, does it go through their the normal connection with the
> Users themselves can guard against this type of fingerprint-based
> eavesdropping relatively easily, Herrmann noted. Downloading or requesting
> more than one site at a time through the network will muddy the pattern
> enough that certainty will be very difficult for the eavesdropper to
> establi
Runa A. Sandvik wrote:
> On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
> wrote:
>> I had set up a tor exit-node on my vds. It worked about 5 month but now
>> I have received a messages about blocking my vds on the grounds of
>> receiving an abuse report (attached).
>> My vds-provider is one
Runa A. Sandvik wrote:
> On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
> wrote:
>> I had set up a tor exit-node on my vds. It worked about 5 month but now
>> I have received a messages about blocking my vds on the grounds of
>> receiving an abuse report (attached).
>> My vds-provider is one
On Wed, Dec 29, 2010 at 9:40 AM, Orionjur Tor-admin
wrote:
> I had set up a tor exit-node on my vds. It worked about 5 month but now
> I have received a messages about blocking my vds on the grounds of
> receiving an abuse report (attached).
> My vds-provider is one from the list of "good" provide
I had set up a tor exit-node on my vds. It worked about 5 month but now
I have received a messages about blocking my vds on the grounds of
receiving an abuse report (attached).
My vds-provider is one from the list of "good" providers from the list
published on the tor blogs.
What do you, people, ca
>> The only recommended way to use email with Tor is to use web mail,
>> e.g. https connections to gmail.
Keep in mind that google does not allow new accounts to be
created via Tor. Unless you are willing to give up your phone
number. Also they expose the GX session key and other cookies during
th
Hi,
I am looking for updated debian sqeeze packages. Currently only Tor 0.2.1.26
packages seems to be available. Any ideas where to find the 0.2.1.28 packages?
Thanks,
Klaus
--
Klaus Layer
Walldorf, Germany
GPG Fingerprint: 466D 12F8 28A3 D137 A77E FC3B 271C 2D79 6F5E 94C9
signature.asc
Des
34 matches
Mail list logo