accept yearly cash in advance,
as Hetzner.co.za does.
> defense in depth++
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD
he criminal investigator is clueful, or actually Tor-hostile.
>
> I already had a raid due to my Exit Node... so, I'm not worried :)
Good luck, here's your cojones de latón award, and I hope you'll get your
hardware back soon!
then, and for the better. Wait until you
got hit by DDoS or a couple, and then see whether Hetzner is still
cooperative.
Another major, personal nuisance is if you're in the wrong Bundesland, or
whether the criminal investigator i
o himself, repeatedly), so they're
effectively accepting of a Tor middleman, but Tor exits are
probably going to be pretty short-lived in Hetzner space.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
learn before you can effectively stay anonymous.
> > And for the last time, LEARN BASIC LINUX NETWORKING *BEFORE* you ask
> > anything else.
> >
>
> --
> Economics is not practised as a science. Rather, it is a pretentious way to
> covertly promote political prejudi
hat is good to know. Unfortunately, finding an exit-sympathetic
hoster will be more of a problem. Hetzner e.g. seems to tolerate
middlemen but not exits, as they're abuse-driven.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
(via arsetechnica)
http://arstechnica.com/tech-policy/news/2010/12/flaws-in-tor-anonymity-network-spotlighted.ars
Flaws in Tor anonymity network spotlighted
By John Borland, wired.com | Last updated about 4 hours ago
At the Chaos Computer Club Congress in Berlin, Germany on Monday, researchers
http://www.technologyreview.com/printer_friendly_article.aspx?id=26981
Home Internet with Anonymity Built In
A router that runs the Tor software prevents Web tracking.
By Tom Simonite
Many political activists, nonprofits, and businesses use an anonymity system
called Tor to encrypt and obscure
s like random delay distribution, amount
of chaff injected, and number of hops. This is definitely a nontrivial
problem, and I'm definitely not the person to answer this.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
On Wed, Dec 08, 2010 at 03:15:24PM +0100, Mitar wrote:
> Hi!
>
> On Wed, Dec 8, 2010 at 2:17 PM, Eugen Leitl wrote:
> > It should default to a much larger number of hops,
>
> Why? Is this really necessary?
Tor as is wasn't designed to resist TLA-level adversa
r, so why not go with it?
Publishing via SMTP is a good idea, actually. Access is not
critical, publishing is.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postb
hould come with
a hidden service to Tahoe-LAFS or similar. A version should come
as a convenient and containable virtual appliance, or packaged as
plug computers.
Comments, other suggestions?
--
Eugen* Leitl http://leitl.org";>leitl htt
> list, though...
I think it is an excellent idea (I've suggested that much in the past
IIRC).
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiot
http://dee.su/liberte
Summary
Liberté Linux is a secure, reliable, lightweight, and easy to use
Gentoo-based LiveUSB Linux distribution intended as a communication aid in
hostile environments. Liberté installs as a regular directory on a USB/SD
key, and after a single-click setup, boots on any d
hem just by processing traffic?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779
http://www.bitcoinblogger.com/2010/11/bitcoin-gains-legal-protection-through.html
SATURDAY, NOVEMBER 13, 2010
Bitcoin And The Electronic Frontier Foundation
There are many legal implications when utilizing Bitcoin. Users of Bitcoin
who conduct business with the wrong people could face charges
mediate ISPs (and even a conglomeration of several of them) can't see
it.
And it looks like this is a fairly cheap thing to put together in 2010...
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
On Fri, Oct 15, 2010 at 02:44:59PM -0700, Mike Perry wrote:
> Thus spake Eugen Leitl (eu...@leitl.org):
>
> > https://www.privacy-cd.org/index.php?option=com_content&view=article&id=66&Itemid=89
>
> https://www.privacy-cd.org/en/no-network
>
> I suppose that
https://www.privacy-cd.org/index.php?option=com_content&view=article&id=66&Itemid=89
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
m/search?aq=f&q=break+out+of+VM
> pgp-id: 0x5D41FDF8
> Proof me wrong.
Lack of professional paranoia detected.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.
On Sun, Sep 26, 2010 at 09:16:12PM -0700, coderman wrote:
> Chrome only has a prayer as live browser instance (which it does well
> by the way!).
This means you discourage use of Chrome for Tor-related issues, did
I get that correct?
--
Eugen* Leitl http://leitl.org";>leitl ht
http://www.gabrielweinberg.com/blog/2010/08/duckduckgo-now-operates-a-tor-exit-enclave.html
DuckDuckGo now operates a Tor exit enclave
By Gabriel Weinberg on August 13, 2010 9:30 AM
Tor enables Internet anonymity by routing your traffic through a series of
encrypted relays.
DuckDuckGo now
On Sat, Jun 19, 2010 at 07:52:56PM +0530, emigrant wrote:
> when i give a keyword to search, in most cases, i get results in
> languages i cannot read.
> is there any way to keep it always to english?
>
> thank you very much.
Make http://google.com/ncr your home page.
--
Eu
Roland Dobbins // <http://www.arbornetworks.com>
Injustice is relatively easy to bear; what stings is justice.
-- H.L. Mencken
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://le
On Thu, Mar 11, 2010 at 01:39:26PM -0500, Andrew Lewman wrote:
> On Thu, 11 Mar 2010 17:38:25 +0100, Eugen Leitl wrote:
> :Any suggestions for making Tor filling up 2-3 /24 networks,
> :so that it doesn't break anything for the users?
>
>
> Do you mean traffic from
k anything for the users? Unfortunately,
at this time I can't throw more than a couple TByte traffic
on this.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http:/
customer data. Otherwise without own address space
> an isp would point with their finger on me being the bad guy. This
> certainly would lead to police knocking on my door.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
list
bitcoin-l...@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bitcoin-list
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.at
and determine if
> it's weaponized or innocent, but it's quite the dichotomy that's being
Easy, just check whether the evil header bit is set.
http://tools.ietf.org/html/rfc3514
> created. Interestingly, most of these people don't think tor is
> weaponized. For what
Anyone using http://openpogo.com/repo/torsocks_1.0-gamma-1_arm.ipk
on your Pogoplug? Experiences?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
mobile nodes, whether on
foot, car, balloon, plane or birds in LEO.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014
teers free of charge who must promise to run
Tor nodes (or at least middle-men) for a couple years.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
ages come from a trusted source.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75
http://openideals.com/2009/10/22/orbot-proxy/
Orbot: An Anonymous Proxy for Android using Tor
Posted in Announcing..., Emerging Tech, Guardian, Mobile Mobile - Comments -
October 22, 2009
Tags: android, guardianphone, proxies, tor
I’d like to make this post without much fanfare. Just looking t
ground organisation)?
Spoken as a Pirate Party member, that's pure slander.
Among its many goals, Pirate Party does not want to abolish copyright
altogether.
However, it definitely wants to change the current status quo, which is
unacceptable, and hurts both the artists/content producers and
Netgear just launched a reasonably powerful 802.11n router
with open firmware:
http://www.netgear.com/Products/RoutersandGateways/RangeMaxWirelessNRoutersandGateways/WNR3500L.aspx
At 99 EUR, it looks like a good host for these MIPS
tor packages.
--
Eugen* Leitl http://leitl.org";>le
cky. Apparently, my firewall (pfSense 1.2) was wedged in
a funny state, now after reboot no more funny message.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postb
On Mon, Oct 05, 2009 at 06:46:47PM -0500, Scott Bennett wrote:
> Clock failures are truly rare events. Internet connection transmission
> holdups are not.
I suspect my dear provider (Kabel Deutschland) has started throttling my
connection.
--
Eugen* Leitl http://leitl.org";
this problem, but
nothing conclusive. What is going on here?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 7
s require manual intervention, making
compromise slower, and easier to detect.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD
nyone knows how badly Atom N270 virtualizes? I should probably
take that to a different list.
If I don't configure a relay, I will be low-traffic, correct?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 4
I've gotten used to connecting to my middleman node on the home LAN
so that I don't even know what's the current proper way to run
a tor/browser bundle or a browsing appliance on Ubuntu on a netbook
(Atom N270) on the road.
Which packages to you people use for that? Why?
-
h welcome any documentation. We should publish everthing
in the open to make it easily replicable by anybody anywhere, so
just to make the annoyance mutual.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100,
A good first way to start would be to dump http://www.reddit.com/user/Grobbage
into a wiki, and annotate the heck out of it.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
- Forwarded message from Ted Smith -
From: Ted Smith
Date: Thu, 17 Sep 2009 12:11:12 -0400
To: Eugen Leitl
Cc: cypherpu...@al-qaeda.net
Subject: Re: good troll, intelligence psyops, or the genuine article? you
decide
X-Mailer: Evolution 2.8.0 (2.8.0-61.el4)
On Thu, 2009-09-17
http://www.cl.cam.ac.uk/research/dtg/android/tor/
TorProxy and Shadow
Summer placement project, written by Connell Gauld.
TorProxy is an Android application that makes it possible to use Internet sites
and services anonymously from a mobile device. This is possible thanks to the
Tor network a
http://calumog.wordpress.com/2009/03/18/why-you-need-balls-of-steel-to-operate-a-tor-exit-node/
Why you need balls of steel to operate a Tor exit node
By calumog
I became interested in Tor in the spring of 2007 after reading about the
situation in Burma and felt that I would like to do somethin
On Wed, Sep 02, 2009 at 03:47:25PM +0200, Eugen Leitl wrote:
> On Wed, Sep 02, 2009 at 09:37:25AM -0400, Praedor Atrebates wrote:
>
> > If you use a mailserver outside the USA and you are IN the USA then you can
> > be absolutely certain that all your comms will be reco
nd StartTLS.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Tue, Sep 01, 2009 at 11:20:58PM -0400, Ted Smith wrote:
> > Don't use Gmail.
> >
> Instead, use...
Are we having one of these lack of imagination moments?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
rovocation. As will any other vendor. Caveat emptor.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
to smoke
what you've been smoking.
If you want to do something against bot nets (operators
of which don't give a damn about Tor, since they can form their
own communication networks -- afaik they haven't even bothered
building private Tor networks) then you try contacting somebody
rewall.
> you. (But you need obligatly disable the java in your browser because
> the java-applications can steal you external ip-address.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 h
ript for these sites can be OK?
Who knows? Have you considered the ads, or that you might get a custom
version when detected you're coming from a Tor exit?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
___
ility) and how it handles flash
> cookies.
I think if you use flash with Tor you should be using a hardened virtual
appliance.
Preferrably, reverting to a clean snapshot thereof when you're done.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
ar with your police office, the police database contains enough
> entries about you and you can solve your trouble by a short phone call. ;-)
In the north, maybe. I'm not sure this works that way in Bavaria.
> At the moment, a police-search is not the main way used by authorities.
ot spent making it easier for clients to use. There's a feeling
> > that it's currently 'good enough' that those who really need to use Tor will
> > be able to follow the instructions and get it working. If you don't agree
> > with that emphasis, again
between 0.01 KByte and your line
> limit (~750 KByte/s).
Are there any 10/50 VDSL T-Com Tor operators here? Your experiences?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ative
n't for the weak of heart.
If anonymous access is made illegal I don't expect more than 1-5%
of the population of using it.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http:/
iffed but also accountable, and hence less prone to abuse.
On top of that you can have a network that anonymous/pseudonymous,
unaccountable, and slightly abusive.
There's a place for both of them to exist.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
what they need to do.
> Being opaque, they work on other things first.
> I suspect this is possible, so I started a wiki page that could, in a
> future form, be useful to this class:
> https://wiki.torproject.org/noreply/TheOnionRouter/EmbeddedTips
That is an excellent idea.
> It would
with
suitable directional aerials) wireless cloud.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
No complaints so far.
> The problem remains: No exit nodes, no reliable/fast/stable/anonymous
> TOR. This has to be fixed, and the urgency to fix this gets stronger
> every day (see geopolitical stuff, yallayalla).
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
them forwarded (I'd be happy if they
> would just throw them away. Same effect).
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Wed, Jun 03, 2009 at 09:07:49AM -0500, Scott Bennett wrote:
> This may seem to some like beating a dead horse, but SCTP really is
> coming to the Internet. It just looks too useful to die like OSI did. The
> more I find out about it, the more it looks like a really good match for
> tor.
On Wed, May 13, 2009 at 08:56:22AM +0200, Benjamin S. wrote:
> > At least not directly, but their operators could be more prone to be
> > implicated in some police investigation, because an exit-node IP may
> > repeatedly appear in the log files of the pages where blocked requests
> > will b
http://www.technologyreview.com/printer_friendly_article.aspx?id=22427&channel=computing§ion=
May/June 2009
Dissent Made Safer
How anonymity technology could save free speech on the Internet.
By David Talbot
"Sokwanele" means "enough is enough" in a certain Bantu dialect. It is also
the nam
the parliament.
Given the track record so far, Germany is finished.
I suggest emigration (while it is still possible), or getting
ready for armed resistance. Nothing else is going to help.
I wish I was kidding.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
So they've been logging connection info for 3+ months already,
and now there's censorship (currently implemented via DNS, but this
will change, of course), logging of the blocked connections, and
all kind of ominous language and promises to extend the censorship
list (secret, of course, and you'l
http://news.bbc.co.uk/2/hi/technology/7967648.stm
Social sites dent privacy efforts
Greater use of social sites makes it harder to hide
Greater use of social network sites is making it harder to maintain true
anonymity, suggests research.
By analysing links between users of social sites, resea
m0n0wall and use your
WL-153
just as an access point henceforth.
http://pfsense.com/
http://www.pcengines.ch/alix.htm
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www
ome 50-70 m outside my window. Elsewhere 100 MBit/s
or GBit/s fiber to the home is being rolled out, and that's symmetric
bandwidth. I think we'll see the network getting a lot speedier as
the residential broadband improves.
--
Eugen* Leitl http://leitl.org";>leitl http://lei
it/s
cable modem.
>just waiting on first call from my ISP ;). 300GB of traffic is far
>over any "normal" usage of home internet, especially in contry of
> former CCCP :-D:
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
choices around here are distressingly poor.
There's not much point running Tor on capped residential broadband.
Rent a server with a decent traffic plan and throttle your Tor so
you're within limits.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
Developer: http://workaround.ch/
>
> don' t waste your time in Slackintosh. Become a tor developer and write
> a module that helps to ban all bittorent traffic from the tor network.
> --
> Germershausen
> germershau...@fastmail.fm
>
> --
>
On Tue, Feb 17, 2009 at 12:46:41AM -0800, Germershausen wrote:
> You should not use the tor network for bittorrent. If you live in china
> or maybe the iran i would say ok, but you are living in Germany, People
> like you make tor sick.
If Tor is not abuseproof it will die. Anything starting with
improvement.
The problem with JAP is that they are complying with the data
retention laws.
http://blog.pozimski.eu/?p=564=1
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http:/
t; anyone - there will be people who abuse it.
>
> It might also have legal implications. Receiving money for a service
> might render it a 'business', to which other rules (like keeping
> logfiles of forwarded connections or something) might apply that will
> bring in yet oth
On Wed, Feb 04, 2009 at 03:37:05PM -0500, tor-opera...@sky-haven.net wrote:
> Incidentally, I work at a (different) hosting provider. We aren't
> particularly interested in being defenders of people's rights. If
> someone cost us money or time in proportions we find to be excessive, we
> assert
fake abuse. I'm not sure whether this is being done or needed,
since the idiot background is pretty high already.
I think just having an exit with port 22 and 443 open would be valuable
already, force some users to use end-to-end encryption
and somewhat limit abuse.
--
Eugen* Le
e node, not an exit node.
> >
> > Cheers,
> >
> > Xinwen Fu
>
> Yes, and one pertty nice day we have 1 middlemen and no exit node anymore.
1 middlemen with hidden services and no exits wouldn't be all that bad,
actually.
> than that it seems that my Tor client is working perfectly.
>
> Can somebody help me to understand why is this happening and how to fix it?
How many exit servers are out there total? What's the ratio of exit/middlemen?
--
Eugen* Leitl
ed hardware base, have you considered ALIX?
http://www.pcengines.ch/alix.htm
They might not be as small as Gumstix, but fairly small at 6x6".
I've ordered an alix2d3 + case + DC adapter for ~100 EUR sans VAT the
other day.
A SLC CF goes a long time with these, if mounted noatime.
On Fri, Dec 19, 2008 at 02:32:57PM +0100, Sven Anderson wrote:
> Since you seem to talk about Germany: Again, data retention does and
> will not happen on a per-packet basis and especially not on the
> transport layer (TCP/UDP) with the current law. There will "only" be
Thanks for the point
On Fri, Dec 19, 2008 at 08:23:40AM -0500, pho...@rootme.org wrote:
> On Fri, Dec 19, 2008 at 11:24:01AM +0100, eu...@leitl.org wrote 0.1K bytes in
> 3 lines about:
> :
> : This is off-topic, but isn't UDP making data retention more difficult
> : than TCP/IP.
>
> How would UDP make data retention
On Fri, Dec 19, 2008 at 12:23:25PM +0100, slush wrote:
>
>No.
This monosyllabic answer no doubt comes from in-depth knowledge
of legal requirements in regards to data retention for ISPs in Germany?
>2008/12/19 Eugen Leitl <[1]eu...@leitl.org>
>
> This is off
This is off-topic, but isn't UDP making data retention more difficult
than TCP/IP.
vices as a stopgap measure, until the next-generation distributed
cryptographic filesystems etc. become widespread.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://post
tp://www.google.com/search?hl=en&q=caching+DNS+server
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
On Thu, Nov 13, 2008 at 11:58:51AM -0500, Praedor Atrebates wrote:
> Thanks for the link. I had switched to OpenDNS to avoid some of the critical
> problems recently with "normal" DNS servers.
Have you considered running your own (caching) DNS server?
--
Eugen* Leitl
Can someone please explain to me how?
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
> to avoid a bug with my dynamic IP (I posted previously under thread
> 'Problem with dynamic IP').
> Thanks,
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ww
re manual flushes.
http://eugen.leitl.org/status_rrd_graph_img.php.png
The server sees some 25 GBytes/day traffic.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://post
On Fri, Nov 07, 2008 at 02:10:32PM +0100, Olaf Selke wrote:
> Eugen Leitl wrote:
> > I've seen continuous table state increase since about >3.5 hours.
> > It went up from 1 k baseline to 5 k.
> >
> > Anyone else seeing this?
>
> yes, the same here
Anyon
I've seen continuous table state increase since about >3.5 hours.
It went up from 1 k baseline to 5 k.
Anyone else seeing this? Any alternative explanation to DoS? (ISP
throttling?).
Thanks.
--
Eugen* Leitl http://leitl.org";>leitl
mind -- both are not bargain options.
There are of course several other, illegal possibilities.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B2
ured. (squid-in)
4. Havp, with squid-in as parent. (Anti-virus proxy, using clamav :) )
5. Second squid, that will use havp as parent (squid-out). Users will connect
to this one.
etc.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
g exit
> nodes in their network, they even list Tor as possible application in
> their offers.
This smells. Caveat emptor. Use EUServ as middleman at best, if you must.
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
___
I have tor/privoxy running on one host on the network, and connect
from another machine using Opera (9.52).
How much does Opera leak in comparison with a tightly configured
Firefox?
--
Eugen* Leitl http://leitl.org";>leitl http://l
On Mon, Sep 22, 2008 at 05:42:14PM +0200, Eugen Leitl wrote:
>
> Howdy,
>
> finally gotten around to try getting Tor (nonbundle) up on a sacrificial
> G4 Mac Mini (Leopard).
>
> Unfortunately my crappy ISP does DNS hijacking:
>
> Sep 22 17:18:25.266 [notice] Your
1 - 100 of 208 matches
Mail list logo