I currently cannot reach https://ssl.scroogle.org:443/ via Tor. I can
reach it going directly to the Internet. In the past Scroogle has
seemed tor-friendly. Is anybody else having this problem?
Jim
***
To unsubscribe, send
On 2011-02-12 11:01, Jim wrote:
I currently cannot reach https://ssl.scroogle.org:443/ via Tor.
Me too.
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body.
Il 08/02/2011 23:08, Praedor Atrebates ha scritto:
The video is from Silent Hill 2 OST. You MAY be able to play it if 1) you
enable flash in your firefox browser and 2) you select an exit from a country
not restricted (like Romania). I say MAY because if they use flash to check
your
Thus spake M (moeedsa...@gmail.com):
It would be helpful if you can add information such as your
- Operating system version
- Tor version
- Polipo or Privoxy version
- Torbutton version
- Firefox version
- Torbrowser or Vidalia bundle version.
ok
It sounds like you're describing
Am 12.02.2011 13:27, schrieb Martino Papesso:
I say MAY because if they use flash to check your location, sidestepping
tor, then you will get the same restricted message.
If you location was checked with Flash you can use a proxifier like
ProxyCap or Widecap to redirect all traffic from the
Il 12/02/2011 15:32, Karsten N. ha scritto:
Am 12.02.2011 13:27, schrieb Martino Papesso:
I say MAY because if they use flash to check your location, sidestepping
tor, then you will get the same restricted message.
If you location was checked with Flash you can use a proxifier like
ProxyCap
Il 07/02/2011 09:47, Marco Predicatori ha scritto:
morphium, on 02/04/2011 03:08 PM, wrote:
Oh and yes, they took only my hardware @ home, not the Server in
the data center that actually DID run Tor and that the bad IP
belonged to.
That's interesting, because it means that running the node
Hi Geoff,
On Sat, 12 Feb 2011, Geoff Down wrote:
There are a small number of easily identifiable cons to letting an exit
run like this, and there are an unlimited number of unknown pros to
letting an exit run like this. You should know this.
Leaving aside the original question of whether
On Mon, 31 Jan 2011, Andrew Lewman wrote:
In my opinion, judging a relay based on exit policy is a slippery slope
we don't want to go down. We never claim to make using Tor alone safer
than using the Internet at large. Whether the creep is at Starbucks
sniffing the wifi or running a relay is
On Sat, Feb 12, 2011 at 5:35 PM, John Case c...@sdf.lonestar.org wrote:
That's fair.
Instead of stressing the boundless set of pros, I will discuss a single,
specific pro, and that is the idea that open, arbitrary systems provide a
foundation upon which to build surprising and unexpected
On 02/12/2011 05:30 AM, Tomasz Moskal wrote:
I was reading Transparently Routing Traffic Through Tor
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
and although I don't need to run Tor as transparent proxy I like the
idea of routing the UDP/DNS requests to
On 09/02/11 09:06, Karsten N. wrote:
Am 07.02.2011 20:00, schrieb Matthew:
I am wondering to what degree people on this list have problems with
e-mails going into spam folders because they are using tor nodes.
Many Tor nodes are listet in some anti-spam DNSBL. We have had a
discussion here
12 matches
Mail list logo