This is a great extension. Tested so far and works fine.
May I suggest that localized google search engine pages (such as
google.it) could be added?
Jan
***
To unsubscribe, send an e-mail to majord...@torproject.org with
Il 11/02/2010 22:17, Michael Holstein ha scritto:
.. but the above problem is ultimately what forced us to do the same
thing (although we just prohibit the operation of an exit).
My university's department of computer sciences stopped an exit node
because both a) some DMCA notices for alleged
Il 03/02/2010 16:51, Stephen Carpenter ha scritto:
How does that help? If the machine is compromised, the disk will be
mounted and unencrypted.
Encrypted drives are really only helpfu if A) physical security/theft
is the major concern
I am referring to an attacker having a physical access to
Il 28/09/2009 15:02, Eugen Leitl ha scritto:
I've gotten used to connecting to my middleman node on the home LAN
so that I don't even know what's the current proper way to run
a tor/browser bundle or a browsing appliance on Ubuntu on a netbook
(Atom N270) on the road.
Which packages to
Il 28/09/2009 15:25, Eugen Leitl ha scritto:
Why the switch to Polipo from Privoxy? Is Privoxy officially
deprecated now?
I just found out today and am wondering myself. From hearsay, Polipo
should perform faster and better.
There are no tor/browser appliances for Ubuntu out yet, right?
I'm
Il 16/09/2009 06:11, Roger Dingledine ha scritto:
Peter (our Debian guy) plans to
continue updating the debs at noreply.org for a while. The current plan
is to do it until the current signing subkey for the noreply repository
expires (another year or so).
At that point users will think it's
Il 05/06/2009 12:42, Karsten N. ha scritto:
In Germany nearly 80% of important websites using Google stuff like
advertisements or google analytics.
[...]
German text about Google: https://www.awxcnx.de/handbuch_12.htm
Sorry for off-topic post.
Not at all, Karsten. Your post is very
Is gettor having troubles? I got this response using a gmail web account.
Jan
This is the mail system at host moria.seul.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail
Il 02/05/2009 15:18, Andrew Lewman ha scritto:
1) Tunneled TOR
Interesting. I'm not sure I fully understand the ramifications to
people's tcp traffic in this scenario.
Tunneled Tor is, as Andrea built it, a Tor exit relay inside a NAT network.
The relay has two network interfaces: the
Il 11/11/2008 15:23, Geoff Down ha scritto:
Crashed again after only 2 hours:
I had to shut down my node temporarily due to high load.
Jan
Il 29/10/2008 22:18, slush ha scritto:
I know it is solution, but I prefer exit node, because I think it is
more universal (it can be used as middleman and also as exit).
[...] It is only about
people on university, which are against porn and other non-legal
activities.
Cant't you just
Il 13/07/2008 17:54, [EMAIL PROTECTED] ha scritto:
I set up a statistics script creating a list of the top 100 hosts each day to
which Tor users connect to over my node (only for ports 80 and 443).
I decided to make this accessible through a hidden service only,
You should add your relay nick
Il 30/04/2008 05:50, krishna e bera ha scritto:
i run Tor exit node cyblings01 which is in Canada.
i got a notice of copyright infringement from my ISP Rogers:
http://cyblings.homelinux.net/tor/rogers-abuse-email.txt
i have drafted a reply as follows:
http://pastebin.ca/1001809
any comments
Il 29/04/2008 02:13, Roger Dingledine ha scritto:
This is one option -- force them to officially commit to something.
[...]
Another option is to not demand that they make any official statement, and
just try to educate the fellow you're talking to and slowly win advocates
A third option is
Il 29/04/2008 09:30, Marco Bonetti ha scritto:
ExitPolicy reject *:6881-6999
http://www.azureuswiki.com/index.php/Port_is_blacklisted
With that line you cut off a lot of bt traffic but not all.
That's neat, thanks Marco.
Jan
Il 18/04/2008 10:12, Vlad SATtva Miller ha scritto:
One way is to use machine translators: translate your English text to
another language, and then back to English.
Typing habits are also patterns. Switch the keyboard layout, or use a
software keyboard with your mouse, or type with the
Il 18/03/2008 11:31, bao song ha scritto:
I downloaded the Tor all-in-one Tor/Privoxy/Torbutton
package from torproject.org, but when I checked, I had
torbutton 1.04.01
From http://torbutton.torproject.org/
The stable version is: 1.0.4 (01 Jun 2006)
From http://torbutton.torproject.org/dev/
The Tor Browser Bundle web page could be more explicitly saying that
it's a MS Windows application.
http://www.torproject.org/torbrowser/
For example, see the diff.
Jan
Index: index.wml
===
--- index.wml (revision 13851)
+++
Il 14/02/2008 13:36, Anon Mus ha scritto:
A. Attacker obtains genuine private keys by,
1. Attacker sets up a number of genuine tor servers
2. Attacker infects genuine tor nodes with spyware
Setting up rogue (or compromised) nodes won't work for getting the
directory authority private keys.
. Non essendo tale assunzione reale sarebbe errato utilizzare TOR
per la protezione di comunicazioni realmente riservate.
[end]
--
Jan Reister
tel 02 50315307 [EMAIL PROTECTED]
NOC - Divisione Telecomunicazioni - Università di Milano
http://www.divtlc.unimi.it
http://www.divtlc.unimi.it/Docs/UNIMI
Il 13/02/2008 20:55, Marco Bonetti ha scritto:
that's the whole point of encrypting the communications and sharing the
public keys fingerprints inside tor sources.
a man in the middle can reroute traffic through his nodes but it will be
useless (except for sending your connections to /dev/null)
Il 30/12/2007 04:31, F. Fox ha scritto:
blau wrote:
(snip)
If you run a service on the public net, say a website, it
makes sense to run a Tor middleman node on the same host. This way users
can reach your service anonymously - without the risks of passing
through an exit relay.
(snip)
Il 14/11/2007 15:22, Mirko Thiesen ha scritto:
In June the local police informed me about preliminary proceedings against
me by asking me (by mail) to visit them. The letter mentioned computer
fraud (actually it was Computerbetrug in Tateinheit mit Faelschung
beweiserheblicher Daten gemaess
On 31/10/2006 03:53, Fergie wrote:
I found it interesting that Cisco added this their most recent IDS
signatures:
Bleedingsnort has the following signatures:
2001728 || BLEEDING-EDGE POLICY TOR 1.0 Client Circuit Traffic ||
url,tor.eff.org
2002950 || BLEEDING-EDGE POLICY TOR 1.0 Server Key
On 13/06/2006 02:56, [EMAIL PROTECTED] wrote:
I have not found the appropriate way to quickly kill Flash, neither in
Firefox
Hi Abacus, have you tried the Firefox extension Flashblock?
http://flashblock.mozdev.org/
if I want to create an email-account with any of the big free webbased
On 13/06/2006 01:39, robert schade wrote:
Please take a look at http://www.mitglied.lycos.de/tormap , where you
can find the location of all TOR-Servers on a map.
Great map! The Tor website has an open request about geolocation:
http://tor.eff.org/volunteer.html.en
4. Speaking of
On 13/06/2006 11:24, [EMAIL PROTECTED] wrote:
Well, I just installed it, and guess what? In the config box, I read
Javascript must be enabled for FlashBlock to work !!!
Uninstalled it... IMO better is to have Flash than JS enabled!
Oh well, you're right! The Flashblock faq recommends
On 11/05/2006 09:42, Christopher W. wrote:
I'm wondering if anyone has any experience with BellSouth (the
FastAccess DSL service) and their policy towards running an intermediate
(non-exit) node.
Perhaps you could check the Policy Considerations for Choosing an ISP
(also the subject line
On 07/04/2006 09:37, vukki starborn wrote:
3. Though the people running server is in their rights to refuse any
connection (as mentioned in their disclaimer), to what consequences
may lead widespreading of such policies? If owners of the popular
services will refuse torified users, how one can
29 matches
Mail list logo