In my opinion, more often then not DMCA takedown requests center around
file-sharing and also more often then not the takedown requests actually
have validity to them.
There are certainly instances where takedown requests are incorrect but
the frequency of them isn't high (again, my opinion).
My
Hi Roger,
Thanks for the detailed explanation. It's always interesting to hear
about how other go into the verification route when a compromise happens.
Do you know the nature of the compromise? Was it against Tor itself or
one of the other services running on the Directory Authorities?
Thanks Roger,
I should have been taking better care of this box but have been super busy.
My bridge is back up and running :-)
Cheers,
Harry
Roger Dingledine wrote:
On Wed, Jan 20, 2010 at 03:11:01PM -0500, Harry Hoffman wrote:
So, at some point in time the apt url I was using for tor
isn't email (i.e. tcp/25) blocked by default as a exit policy?
Programmer In Training wrote:
As part of my attempts to write an article about using GPG and Tor with
Outlook I set up a test email account. O says it connects just fine and
sends/receives a test message, but when I attempt to send
oh, sure this has been known for a long time. In fact, the CIA will even
pay you (much like google adsense) per MB that you allow them to
intercept upon exit.
At $0.20USD/MB I was able to supplement my regular income. Soon I'll be
able to quit my regular job. It's like all of those emails
wrote:
Could someone post the contact addresses for cashing in?
And perhaps some proof that they do (or do not) pay?
On Tue, Jun 23, 2009 at 03:55:57PM +0200, Timo Schoeler wrote:
thus Tom Hek spake:
On Jun 23, 2009, at 15:01 PM, Harry Hoffman wrote:
At $0.20USD/MB I was able to supplement my
Hi Brent,
At the very least the src ip (although this would be another tor
server), src port, dst ip, dst port, protocol (tcp), timestamp.
If the traffic is unencrypted (i.e. you browse to www.google.com) then
you can also add application protocol (i.e. HTTP) and payload (i.e. GET
/
Just came across this:
http://hosted.ap.org/dynamic/stories/T/TEC_PUNISHING_PROXIES?SITE=ILEDWSECTION=HOMETEMPLATE=DEFAULT
Cheers,
Harry
Interesting, it works with Open Office on Linux revealing the true ip
addr.
There's a option in OO to use a proxy, it was set to system at the time
and I tried just using foxyproxy.
But yeah, like someone else mentioned, using iptables to redirect all
attempts so that you don't have to worry
Hi,
Just curious to get some expert opinions from the tor maintainers about
how to deal with the new DNS vulnerabilities being discussed[1].
Is anyone testing whether or not the DNS servers available via exit
nodes are patched?
Cheers,
Harry
[1] http://isc.sans.org/diary.html?storyid=4765
Why do you think it would be embarrassing? I'm fairly certain that some
exit nodes have been setup as research projects.
On Thu, 2008-06-05 at 21:49 -0700, Wesley Kenzie wrote:
snip
Or BostonUCompSci? It would be kind of embarrassing to Boston
University wouldn't it, if they were found to
11 matches
Mail list logo