On Fri, Feb 11, 2011 at 6:58 AM, John Case wrote:
> No, there is no _technical_ reason to operate an exit in this fashion. There
> is no reason, from a myopic, borderline autistic view of the externalities
> involved, to run an exit in this fashion.
>
> However, I can think of many, many reasons t
On Sun, Jan 9, 2011 at 7:37 AM, wrote:
> Original Message
> From: Orionjur Tor-admin
>
>> Is it a bad idea to use an apache for a hidden serice?
>
> Not at all. I'm actually recommending it over any other because it's complex
> and has a lot of traps for you to fall into. That
On Fri, Dec 31, 2010 at 2:18 PM, Jordi Espasa Clofent
wrote:
> 2010-12-31 13:55, and...@torproject.org skrev:
>
> Do you allow IRC, torrents?
>
> We do not allow IRC servers, bittorrent, open proxies, or any other software
> that can degrade our network performance or allow for abuse.
>
On Mon, Oct 11, 2010 at 11:16 PM, Jacob Appelbaum wrote:
> On 10/11/2010 10:52 AM, Anthony G. Basile wrote:
>>
>> Hi everyone
>>
>> I want to announce to the list that a new release of tor-ramdisk is out.
>> Tor-ramdisk is an i686, x86_64 or MIPS uClibc-based micro Linux
>> distribution whose only
Unfortunately I
> cannot publish source codes because attackers can adapt own techniques
> (though it would be very difficult).
Yummy. Security through obscurity. Let's hope the bad guys doesn't
find out. Or do they already know?..
**
On Sun, Jun 13, 2010 at 7:19 PM, wrote:
> On Sun, Jun 13, 2010 at 05:54:41AM +0200, t...@wiredwings.com wrote 3.0K
> bytes in 57 lines about:
> : determine the ISP, in the Internet today it is trivial. Regardless of
> : that, in the end I am just an ISP. If they put so much work in finding
>
> Y
Yes, people have tried, there are working webdav stores out in onionland.
For linux you can use the davfs2 filesystem. It can be used through a
proxy, and work with Tor. It was very slow when I tried it though,
slower than usable because proxies, tunnels and sockets keep timing
out, so the filesys
On Thu, May 20, 2010 at 1:31 PM, Moritz Bartl wrote:
> On 20.05.2010 13:28, Oguz wrote:
>> I too do not understand this. Already an evil entry node can list all
>> nodes that it does _not_ control in its family option to try to force
>> circuit through the nodes it controls, though it would obviou
> Just wondering if anybody from the Tor Project has contacted the author to
> express the concerns with tortunnel. Particularly about it being
> detrimental to the Tor network.
>
> Jim
The author is a security researcher, the tool is ages old and
abandoned, as far as I know it doesn't work right
Qualified guess: These might be so-called BitTorrent trackers.
These tracker URLs are embedded in torrent files that you download.
You can download these torrent files from various sources, not
necessarily (even rarely) from the site itself. When you load these
torrents into a BitTorrent client, t
On Sun, May 16, 2010 at 2:45 PM, wrote:
> On Sat, May 15, 2010 at 11:23:15PM -0400, waterwai...@gmx.com wrote 0.4K
> bytes in 16 lines about:
> : In this case, purposely 'shaping' the traffic so that it looks like
> something other than what it actually is (ie, not Tor traffic).
>
> I call that
>> The way
>> to do better at that one is to teach users and service providers about
>> end-to-end authentication and encryption.
>
> From what I've seen I don't think there is any realistic hope for any
> significant number of web pages to be served with end-to-end encryption (not
> sure what your
On Wed, May 12, 2010 at 6:20 PM, Moritz Bartl wrote:
> I would also like theoretically to accept anonymous donations for a node
> (not for the VPN/webspace stuff of course), but the problem there is not
> so much accepting it (PSC, Ukash, Liberty Reserve etc), but making sure
> that the money com
.
// pipe
From d557fc9bc2ec749d4743e3e918289e55c4b9e459 Mon Sep 17 00:00:00 2001
From: Anders Andersson
Date: Tue, 23 Mar 2010 02:07:37 +0100
Subject: [PATCH] Added a new GETINFO item 'bytes'
---
src/or/control.c |7 +++
src/or/main.c|4 ++--
src/or/or.h |
14 matches
Mail list logo