On Fri, Apr 23, 2010 at 8:35 AM, Timo Schoeler
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi,
>
> I'm seeing declining traffic over the last few weeks, please see graph:
> It dropped from a sustainted 2,5Mbps (or more) to about a fifth, with a
> massive drop today.
>
> I'm runnin
2009/12/4 :
> "Weird shit:
>
> bloxortsipt
> supp...@truxton.com
> 74.240.51.79
> 74.238.241.32
> 74.238.240.47
> 69.40.11.93
> 68.90.41.105
> 64.90.29.217
> 209.169.89.26
> (and other IPs)
>
[snip]
Did you try emailing supp...@truxton.com, find out what the deal is?
--
Feel free to contact me
On Tue, Nov 24, 2009 at 4:04 PM, James Brown wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> The Livejournal has blocked access to that resource through the Tor.
> It is certainly the consequence of purshasing the LJ of Russian company
> "SUP" by order of Putin and FSB.
> That decisio
On Thu, Nov 19, 2009 at 11:46 AM, Erilenz wrote:
> * on the Thu, Nov 19, 2009 at 07:43:01AM -0500, Andrew Lewman wrote:
>
>>> That's fine, as long as you're assuming that people only use Tor when they
>>> need
>>> strong anonymity. As soon as you realise that people who don't need strong
>>> anon
On Tue, Nov 17, 2009 at 8:57 AM, Erilenz wrote:
> The following occured to me. Tor is designed to protect users from
> traffic analysis by very technical adversaries. There are many use
> cases where that level of protection isn't required. In those cases,
> if there was a config option to reduce
I thought quite a few people on this list might be interested in this
story, regarding privacy on networks. Maybe it will lead to more
people using Tor, or maybe it will lead to increased legal pressure on
Tor users and relay operators.
http://spectrum.ieee.org/blog/computing/it/riskfactor/british
he presumption of innocence was upheld:
> Reppe's Tor server only anonymizes and encrypts activity, it is not itself
> the source of illegal activities, and thus the court had to acquit him.
>
> Please send questions to t...@morphium.info and they will be promptly
> answer
On Sun, Oct 18, 2009 at 9:04 PM, John Case wrote:
>
> On Sun, 18 Oct 2009, Jacob Todd wrote:
[clip]
>>> I'd like to change the design of the Internet by introducing
>>> regulation--Internet passports, Internet police and international
>>> agreement--about following Internet standards. And if some
On Sat, Nov 7, 2009 at 1:24 PM, Juliusz Chroboczek
wrote:
>> And here is the german press release:
>>
>> http://klangbuero.net/2009/10/29/freispruch-fur-tor/
>
> Please publish an English translation, so it gets Googlified.
>
> Juliusz
> *
On Sun, Oct 4, 2009 at 8:32 AM, Roger Dingledine wrote:
> On Sun, Oct 04, 2009 at 08:30:01AM -0400, Brian Mearns wrote:
>> I discovered my relay had shut it's self off this morning, and I found
>> this log message: Received reload signal (hup). Reloading config and
>>
I discovered my relay had shut it's self off this morning, and I found
this log message: Received reload signal (hup). Reloading config and
resetting internal state.
This was followed by a bunch of errors about my config file that
apparently prevented it from restarting (but I think I can probably
On Fri, Oct 2, 2009 at 12:26 PM, Martin Fick wrote:
> --- On Fri, 10/2/09, Brian Mearns wrote:
>
>> > Perhaps I don't understand your suggestion, but how
>> > would a hash translate to a relay address? The
>> > maximum possible strength of a hash is related
On Thu, Oct 1, 2009 at 3:13 PM, Martin Fick wrote:
> --- On Thu, 10/1/09, Brian Mearns wrote:
>
>> My understanding is that Tor user's are responsible (via their client)
>> for creating their own circuit, and that this is typically
>> done at random. However, are the
My understanding is that Tor user's are responsible (via their client)
for creating their own circuit, and that this is typically done at
random. However, are there any safeguards in place to ensure that it
is random, and would this be desirable? I would imagine that attackers
might try to choose s
On Wed, Sep 23, 2009 at 3:38 AM, Nick Mathewson wrote:
> On Fri, Sep 18, 2009 at 10:19:17PM -0400, Ted Smith wrote:
>> On Fri, 2009-09-18 at 04:25 -0400, grarpamp wrote:
>> > Nodes usually have a max bandwitch set.
>> > Nodes often comsume less than this.
>> > All node to node traffic is encrypted
On Thu, Sep 17, 2009 at 3:49 PM, Eugen Leitl wrote:
> - Forwarded message from Ted Smith -
>
> From: Ted Smith
> Date: Thu, 17 Sep 2009 12:11:12 -0400
> To: Eugen Leitl
> Cc: cypherpu...@al-qaeda.net
> Subject: Re: good troll, intelligence psyops, or the genuine article? you
> de
On Wed, Sep 16, 2009 at 5:01 PM, Rich Jones wrote:
> http://www.reddit.com/r/IAmA/comments/9kwph/i_am_a_guy_who_writes_covert_software_that_runs/
>
> Thoughts?
>
> also, I realized that two of the posts I've made this this list have now
> been reddit-related. Sorry about that. But I'd really like
On Wed, Sep 16, 2009 at 1:23 PM, Flamsmark wrote:
> On Wed, Sep 16, 2009 at 10:02, Brian Mearns wrote:
>>
>> On Tue, Sep 15, 2009 at 7:26 PM, bao song
>> wrote:
>> >
>> > Some time ago (2008) I read about a Canadian who used Tor to view Hulu.
>>
On Tue, Sep 15, 2009 at 7:26 PM, bao song wrote:
>
> Some time ago (2008) I read about a Canadian who used Tor to view Hulu.
>
> I tried it from outside the US, and it worked, but the speed was too slow for
> me to use it regularly. Today, a clip from Hulu was highly recommended by the
> New Yor
On Fri, Sep 11, 2009 at 12:36 AM, Gitano
wrote:
> Brian Mearns wrote:
>
>> Is there a way to test that my relay is working? My logs indicate that
>> ORPort and DirPort are both "reachable from the outside", but several
>> different websites (such as https://tors
I have a relay running on the same system as several other services.
Some of these services only accept connections from the localhost (or
otherwise give special privileges to localhost) . If I allow my relay
to be an exit node, someone attempting to connect to these services
through Tor will appea
Is there a way to test that my relay is working? My logs indicate that
ORPort and DirPort are both "reachable from the outside", but several
different websites (such as https://torstat.xenobite.eu/) can't find
my relay (nicknamed "shallot").
Thanks,
-Brian
--
Feel free to contact me using PGP En
22 matches
Mail list logo