On Wed, Jan 19, 2011 at 12:00 PM, Matthew wrote:
> I am wondering if there is a way to select a specific US state when using
> StrictExitNodes?
>
> For example, if I wanted an exit node in Maryland or Virginia is there a way
> to locate one?
>
> Thanks.
>
I am not really sure where you can find i
Check your UUID's with the command 'blkid' and you will see that this number
has nothing to do with your UUID's!
Regards,
Michael
2011/1/8
> Oddly enough when I went to the Fastmail.fm website I found this in part
> of the Url-
>
> ;Uid=631627de6168acc511c
Maybe that link will be useful:
http://blog.nyxyn.com/2010/05/encrypted-ubuntu-104-on-dual-boot.html
2011/1/4
>
> --
>
> andr...@fastmail.fm
>
> On Tue, 04 Jan 2011 08:48 -0500, "Michael Gomboc" <
> michael.gom...@gmail.com> wrote:
>
> A new instal
h
> > unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
> >
>
> --
> http://www.fastmail.fm - mmm... Fastmail...
>
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>
--
Michael Gomboc
www.viajando.at
pgp-id: 0x5D41FDF8
Check that:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy
<https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TransparentProxy>
Regards,
Michael
2010/12/22 Praedor Atrebates
> I have always been disturbed by the fact that javascript or
Hi!
On 15:03 Sun 12 Dec , Bernd Kreuss wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> [sorry for eventual double post, gmail replied to the sender instead of
> the list]
>
> On Dec 12, 2010 8:26am, Michael Blizek
> wrote:
>
> > proof. Suppo
Hi!
On 19:57 Sat 11 Dec , Bernd Kreuss wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi,
>
> I found this message from February in the archives and since the
> original message ID is hidden I cannot write a follow up, so I start a
> new thread to comment on the topic:
...
>
troduced (smallish factor, 1 to 10 ms)
for all middle nodes, muddying the waters even more.
Like I mentioned before, I'm not really qualified to comment on
this. I use tor as an IT tool for security and offsite testing.
--
Michael C
ps and allow those same programs to access hidden services.
See also the question on
DNS
.
See also:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ
Regards,
Michael
2010/11/18
>
> hi
> Can someone tell me exactly what is the apparatus that resolves an oni
Hi
anyone with c++/Qt skills interested to build in Qt proxy for Tor for the
released new app
http://arado.sf.net Bookmark Database to Sync with your Devices.
It can contain as well .tor adresses for websites and services in tor.
Please test it and try to run it on your webserver 24/7
Use it for
Hi!
If there is no back-door or bug in your VM software, how you wanna break out
of the VM?
Even with root privileges you will be a prisoner within the VM.
Proof me wrong.
Michael
2010/10/7
> The title says it all:
>
> Several people recommend running a hidden service from within a
again the real mac address.
Regards,
Michael
2010/9/24 Robert Ransom
> On Fri, 24 Sep 2010 17:34:05 -0400
> hi...@safe-mail.net wrote:
>
> > Robert Ransom:
> >
> > > Also, if you haven't bothered to change your MAC address, an attacker
> > > with
66 MB |4200 MB |8366 MB
15.09. 3655 MB |3692 MB |7348 MB
16.09. 2905 MB |2929 MB |5835 MB
A part of my torrc:
*RelayBandwidthRate 150 KBytes
RelayBandwidthBurst 200 KBytes
AccountingStart day 00:00
AccountingMax 20 GB*
Thanx a lot!
--
Michael G
lo -j ACCEPT
iptables -A OUTPUT -m owner --uid-owner debian-tor -j ACCEPT
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
Is there more to think about?
Thanks a lot!
--
Michael Gomboc
pgp-id: 0x5D41FDF8
on the level of IP addresses. Actually it is
highly recommended to use tor with ssl secured services:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#CanexitnodeseavesdroponcommunicationsIsntthatbad
michael
--
Michael Scheinost
mich...@scheinost.org
Jabber: m.schein...@jabber.c
key you can try another keyserver like pgp.mit.edu or
pool.sks-keyservers.net.
If you prefer a Webbrowser you can try this link:
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xEE8CBC9E886DDD89
Michael
--
Michael Scheinost
mich...@scheinost.org
Jabber: m.schein...@jabber.ccc.de
GPG K
hey just want to offer another alternate search
engine. And perhaps they just think offering a tor enclave is a nice
addon. So perhaps in conclusion, they didn't think much about anonymity
and privacy. I don't know it.
But why was this ad posted to the tor mailinglist?
just my 2c, Michael
--
tant.
Perhaps someone can help me out of this.
Regards, Michael
--
Michael Scheinost
mich...@scheinost.org
Jabber: m.schein...@jabber.ccc.de
GPG Key ID 0x4FF8E93B
signature.asc
Description: OpenPGP digital signature
anonymity? excluding Freenet and cryptography apps.
>
> regards
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>
--
Michael Gomboc
pgp-id: 0x5D41FDF8
ng" and/or "networking" is everyone else's spam.
Cheers,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
companies
themselves) are intentionally injecting fake information into BitTorrent
like they used to do with Napster .. except that BitTorrent handles this
much better. The fallout from that is companies get a bunch of bogus
complaints.
My 0.02.
Cheers,
Mich
nswer
any questions about it.
> The response is probably then
> catalogued for some future court case.
>
>
As are all of the bogus notices and supporting documentation that
nothing has ever occupied that IP address.
Cheers,
Mic
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>
--
Michael Gomboc
www.viajando.at
pgp-id: 0x5D41FDF8
12:20 PM, emigrant wrote:
>
> > sony ericsson k530i
>
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>
very end of the accounting period
because of the 100kb/s limit.*
*
Is the limit of 100kb/s outgoing and incoming together?*
*regards,
Michael*
*
2010/5/14 DC
> for me it seems the graph is fine. though the node so seldom hits
> beyond 8bps
>
> before i experienced a flat line for
)
RelayBandwidthBurst 200 KBytes # But allow bursts up to 200KB/s (1600Kbps)
AccountingStart day 00:00
AccountingMax 10 GB
Why the traffic isn't linear at almost 100kb?
Thanx for your help!
--
Michael Gomboc
pgp-id: 0x5D41FDF8
re were others too. But I'm too old and salty to
remember them all.
Xerox sure got some mileage off of ethernet addressing huh? I'm
wondering if they made any money on it.
--
Michael Cozzi
***
To unsubscribe, se
I'm curious, what was the problem?
2010/3/15 Jon
> Thanks,, the key issue has been resolved. Appreciate all the help :)
>
> On Mon, Mar 15, 2010 at 5:50 PM, Michael Gomboc
> wrote:
> > For more help, please post the exact output of the first and the second
>
For more help, please post the exact output of the first and the second
command.
regards,
Michael
2010/3/12 Jon
> I followed the instructions on the Debian/Ubuntu web page.
>
> > Please show what you added to your sources.list.
> deb http://deb.torproject.org/torproject
00:00:54.024 [notice] Hibernation period ended. Resuming normal
activity.
Mar 09 00:00:54.024 [notice] Opening OR listener on 0.0.0.0:9001
Now I let cron check the Tor process to inform me when Tor has died. But I'm
not sure what happened to the process.
Did anybody see that before?
Regards,
-
:
OK
I tested it right now with Ubuntu and there is no problem.
Regards,
Michael
2010/3/12 Jon
> I am in the process now of wanting to move up to linux for my main
> relay OS. I have been running windows xp and 7. I have tried on 3
> different distros with the config for TOR and keep
Hi!
On 11:18 Sun 07 Mar , Stephen Williams wrote:
> I've been lurking for a while. Apologies that I've missed most of the
> conversation.
>
> Michael Blizek wrote:
...
> > - Do throttling the proper way and *not* by "usleep", but by setting
>
Hi!
On 16:35 Sun 07 Mar , Eugen Leitl wrote:
> - Forwarded message from Christian Grothoff -
>
> From: Christian Grothoff
> Date: Sun, 7 Mar 2010 12:30:53 +0100
> To: or-...@freehaven.net, or-...@seul.org, or-t...@seul.org,
> gnunet-develop...@gnu.org, help-gnu...@gnu.org
> Su
tely.
>>
> (snip)
>
> Epic win!
>
> --
> F. Fox
>
> ***
> To unsubscribe, send an e-mail to majord...@torproject.org with
> unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
>
--
Michael Gomboc
www.viajando.at
pgp-id: 0x5D41FDF8
Is it a good idea if one company hosts a lot of tor nodes? I don't think so.
If 100 persons run a tor node hosted and monitored by https://coldbot.com/ I
don't think that would be great for the tor network!
Correct me if I'm wrong.
Regards,
Michael
2010/2/20
> I would like
Thank you Andrew for the nice explication!
2010/2/19 Andrew Lewman
> On 02/15/2010 12:09 PM, Michael Gomboc wrote:
> > Why is polipo used and no longer privoxy?
>
> The first question is, "why a http proxy at all?"
>
> The answer is, because Firefox SOCKS lay
Hi,
Why is polipo used and no longer privoxy?
Could someone point me in the right direction.
Thanx
--
Michael Gomboc
pgp-id: 0x5D41FDF8
Perhaps the best choice would be the one used by the most people.
http://www.eff.org/deeplinks/2010/01/tracking-by-user-agent
Cheers,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord
laints, subpoenas, and various angry phone
calls were never a problem. It was the theft of academic journals (and
that doing so jeopardized our subscriptions) that did it in.
Cheers,
Michael Holstein
Cleveland State University
***
To
> Could you bind your exit traffic to IPs outside your University's
> primary block?
Not sure what you mean by "bind to outside IP", but our network is a
contiguous /16. We would have to register for extra /24s from ARIN, and
that costs money.
Cheers,
Michael Hol
> Why couldn't your exit policy just block the IPs of the journal sites?
Because there's > 1000 of them (and each would be a /32). It was
discussed in another thread at the time, and the developers led me to
the conclusion that such hugely long exit policies were a bad idea.
.. there simply wasn't an easy
way to block access to all of them without an overly-complex exit
policy, and all of our IP space is within a single /16.
Cheers,
Michael Holstein
Cleveland State University
***
To unsubs
> The main cause was the screen resolution.
>
Running TOR and leaving javascript enabled sort of defeats the point,
doesn't it?
Cheers,
Michael Holstein
Cleveland State University
***
To unsubscribe, send a
nsubscribe or-talkin the body. http://archives.seul.org/or/talk/
>
--
Michael Gomboc
pgp-id: 0x5D41FDF8
of those cases to drive up costs.
If you can justify the need for your own ASN (because you're
multi-homed, etc.) then you *become* the ISP. This is completely
impractical for an end-user, but it's how Universities (and the like)
get away with hosting the nodes .. there's nobody else to
partially funded by their respective states.
Cheers,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
st is known as a "Title III Order" AKA "wiretap".
These are quite rare by comparison.
Regards,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
est of us. The same is true for China, WikiLeaks, etc.
Cheers,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body. http://archives.seul.org/or/talk/
of the email you view/send.
>
And sniff/steal the session cookie.
Regards,
Michael Holstein
Cleveland State University
***
To unsubscribe, send an e-mail to majord...@torproject.org with
unsubscribe or-talkin the body.
crypto export that one should be
familiar with if thinking about this...).
-Michael
thomas.hluch...@netcologne.de wrote:
Hello altogether,
for my Sun Hosts I would like to have a Crypto Hardware Accelerator Card. At
ebay.com there are some. Especially this one is what I want to get:
http
r own ASICs to break DES when it
was en-vouge .. I'm sure our side of the pond actively does the same.
Sneakier mice, better mousetraps.
Lather, rinse, repeat.
while().
Cheers,
Michael Holstein
Cleveland State University
ate 10gbps
http://download.intel.com/design/network/ProdBrf/27905403.pdf
Cheers,
Michael Holstein
Cleveland State University
You are welcome! My server is only forwarding 300 gigs a month so it's not
a big deal.
Thank you very much for the information!
Michael
On Tue, Sep 15, 2009 at 8:33 PM, Andrew Lewman wrote:
> On 09/15/2009 01:21 PM, Michael Gomboc wrote:
> > I have a tor server running and i l
Hi,
I have a tor server running and i like to measure the traffic that goes over
it. (in&out)
I know there's a way do to that with iptables but I prefer to get this
information from TOR.
Does TOR store this information somewhere so i could read it with a script?
Thanx!
Noticed today that gmail is again requiring
new account creation to use SMS verification.
Tried with a number of exits. Anyone else?
There are email->SMS gateways .. do the reverse not exist?
What about SMS->SIP services? .. eg :
http://www.iptel.org/ser/doc/modules/sms
Scott Bennett wrote:
On Mon, 10 Aug 2009 17:42:56 -0400 Michael Cozzi
wrote:
Dan Collins wrote:
As was noted the last ten times (by my count) someone did this, and as
you were told when you registered, and as you are told in every email
sent by this list, and just like any other
a good amount of
"user class" subscriptions to this list. Try to remember that those
folks actually get attention from women, and have what we, the IT
People, only dream of: Lives.
Yes, I've had a bad day. But please... be nice.
Michael
ot;my system" - "middle node of someone" - "hidden service" ?
Thanx
Michael
For those who speak German. I think thats a nice solution!
http://wiki.ubuntuusers.de/VM_basierende_Anonymisierung?
regards,
Michael
On Mon, Aug 3, 2009 at 12:42 PM, Tom Hek wrote:
> Hello,
>
> Are the Tor check page https://check.torproject.org and the DNS
> exitlist.torproject.org down? I can't reach them over Tor and not over the
> normal internet. Is there something wrong with the servers behind them?
>
> Tom
>
Hi,
Seems
s and thank you,
Michael
Andrew Lewman wrote:
On 07/30/2009 06:14 AM, Michael Cozzi wrote:
Hello Tor Team.
I'm not sure who to thank, but I noticed my suggested text
regarding what "IT Professionals use Tor for" was included whole cloth
on the web page.
Thanks for the content. I di
Hello Tor Team.
I'm not sure who to thank, but I noticed my suggested text regarding
what "IT Professionals use Tor for" was included whole cloth on the web
page.
Thank you, that gave me geek-warm-fuzzies.
Michael
Hi,
I would like to do a bit of promotion for tor on a web page. Are there web
banners and / or logos which I'm allowed to use?
regards,
Michael
n: At what point is a relay marked "stable"?
Michael
Have you changed privoxy's config file for use with tor?
2009/7/23 Bob Williams
> Hi,
>
> My system is openSUSE 11.1 x86_64 with KDE4.2.4 desktop, using linux kernel
> 2.6.27.25-0.1-default, and Firefox 3.0.11.
>
> I've installed Privoxy and Tor, but I'm having difficulty with the setup. I
> can
ope for the DNS information,
and construct IP:port exit rules by hand.
Michael
about the people using Tor, but rather a tool
that admins can use to provide bandwidth in a less risky manner.
Thoughts or comments?
Michael
Michael wrote:
Kyle Williams wrote:
reject 0.0.0.0/8:* <http://0.0.0.0/8:*>
reject 169.254.0.0/16:* <http://169.254.0.0/16:*>
reject 127.0.0.0/8:* <http://127.0.0.0/8:*>
reject 192.168.0.0/16:* <http://192.168.0.0/16:*>
reject 10.0.0.0/8:* <http://10.0.0.0/8:*>
0.0/12:* <http://172.16.0.0/12:*>
reject 66.109.20.52:*
accept *:80
accept *:443
accept *:43
reject *:*
Kyle,
One more question if you would indulge my curiosity. What service
was the course of the "spam"?
Michael
e your exit policies?
Michael
Bill Weiss wrote:
Michael(co...@cozziconsulting.com)@Fri, Jun 26, 2009 at 11:44:03AM -0400:
Similar to all of these:
* To troubleshoot connectivity problems from the outside of their network
(i.e. to see what parts of the internet can or can't see their site).
Hi Bill,
ve privileges. You can guess where that can end up. It's
better (a bit) on server versions of Windows.
I can't comment on anything related to OSX, the last version I ran
was developer release one. But the principles are the same.
Michael
Roger Dingledine wrote:
On Fri, Jun 26, 2009 at 08:16:00AM -0400, Michael wrote:
What I *am* doing is deploying a couple of heavy iron closed relays
on OC3 or better bandwidth. The first is now deployed after a lot of up
and down testing, and I'll get to the second in due
maybe the last one isn't salvageable. I gave it my best shot.
Michael
e of Onion
Routing, two way traffic needs to be avoided in the most sensitive
sensitive situations. Forcing exit nodes is a bad idea for users. It
will also drive away anyone who cannot provide an exit node that's
chasing away bandwidth as non exit relays run for the hills.
Long post. Too much coffee and too much time staring at routing tables.
Michael
does anyone know about the legal situation in germany?
i'm running a middle node. that should be no problem, isn't it?
rg
michael
On Wed, Jun 17, 2009 at 4:42 PM, Eugen Leitl wrote:
> On Wed, Jun 17, 2009 at 08:28:47PM +0200, Sören Weber wrote:
> > On Wed, Jun 17, 2009
problems with regular TWC.
-Michael
On Fri, 13 Mar 2009, Matthew McCabe wrote:
|> Incidentally, Time Warner Cable's security department made it very clear
|> that they did not want to have me as a customer. I explained to them
|> that I paid extra for increased bandwidth whi
good reason. Just my $0.02.
-Michael
On Tue, 13 Jan 2009, Praedor Atrebates wrote:
|> On Tuesday 13 January 2009 14:58:19 Adlesshaven wrote:
|> > I was redirected on several slashdot pages I was trying to view.
|> >
|>
|> Wait...you anonymously browse slashdot?
|>
|> Why?
His tinfoil hat is obviously not good enough :)
-Michael
communications "network" that dealt entirely
in header-source forged UDP packets, but as best practices dictate (not
the everybody follows them) .. one should filter egress of packets with
a source address not within your netblock.
Cheers,
Michael Holstein
Cleveland State University
in the real you) and
TOR (as in traffic that appears to come from you, but isn't the real
you) .. all they care about is what comes out of your pipe.
Anyway .. good luck, and keep up the good fight!
Cheers,
Michael Holstein
Cleveland State University
?
Cheers,
Michael Holstein
Cleveland State University
On Mon, 29 Sep 2008, John Mosgrove wrote:
|> I dont have a clue how to do that. I signed into this list by
|> responding to it on a forum. I'm not even sure where its based.
Well the headers are always a good place to start:
X-To-Get-Off-This-List: mail [EMAIL PROTECTED], body unsubscribe or-talk
mic journals with it.
Michael Holstein
Cleveland State University
R anyway) I'd
suggest you take a look at what the friendly pirates at PRQ have come up
with (Relakks .. www.relakks.com).
Cheers,
Michael Holstein
Cleveland State University
e you
should turn off java script, flash, java applets etc ... Tor is only one
part of the deal ...
michael
--
Michael Scheinost
[EMAIL PROTECTED]
GPG Key ID 0x4FF8E93B
signature.asc
Description: OpenPGP digital signature
s
would like to hear it.
Cheers,
Michael
connection reversal
can't establish a connection between two firewalled nodes, so no circuit
could contain two consecutive firewalled nodes (I guess that might have
implications for anonymity as well). But if it allows more people to run
nodes then maybe it's a worthwhile tradeoff?
Cheers,
Michael
Hello Alexander, and list,
that is an essential idea, which is now discussed, and that start of that
development is still missing. So good to hear.
First, I agree (as posted earlier), that we need a tit-for-tat Tor:
Everyone who wants to surf with the IP of another peer, needs to give his IP
as w
x27;s a good idea to encourage non-technical users, who
might not understand the legal risks, to run exit nodes?
Cheers,
Michael
/CACM_From%20Fingerprint%20to%20Writeprint.pdf
http://portal.acm.org/citation.cfm?id=1121949.1121951
Cheers,
Michael
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
Lanthanaël wrote:
> Is it possible in Tor to exclude some domaines?
talking about the client side? The answer is yes. Take a look at
FoxyProxy. Other solutions might exist ...
michael
- --
Michael Scheinost
[EMAIL PROTECTED]
GPG Key
ve to use such a secure protocol.
michael
- --
Michael Scheinost
[EMAIL PROTECTED]
GPG Key ID 0x4FF8E93B
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHqAyCNJWy7U/46TsRAj1+AKDAlYUes9SC49f6p5fYEe2ZyHtm3ACggE45
OFnMPTDEcyRw3M8VgzXzS3o=
=04TI
-END PGP SIGNATURE-
Steven, i suggest to make it hardcoded default and a Must, that each user,
using this browser, is as well running an tor **exit** node,
tit for tat. like emule partials: upload is a MUST.
That would help a lot to have more tor-exit nodes.
Thanks.
On Jan 30, 2008 1:52 AM, Steven J. Murdoch <
[EMAIL
t clear whether social networks are good expanders [2][3], but
Shishir Nagaraja has looked at using social networks for mix networks
[4]; the LiveJournal social network appears to be suitable, although you
have to use more cover traffic than you would in an ideal expander graph.
Cheers,
Mi
d be used to associate the "non-TOR-you" with the
"TOR-you". So could your web-based email if you've EVER used it from an
identifiable location.
Cheers,
Michael Holstein CISSP GCIA
Cleveland State University
It reminds me of some of the stuff out of the Matrix... hackers casing
damage by manipulating the code of the Matrix, Machines moving in and
out of everything...
Greetings professor .. would you like to play a game?
services blacklists suck (just look at those
sorbs nazis). There is no way for a proper verification. And there is no
instance to trust.
just my 2c
- --
Michael Scheinost
[EMAIL PROTECTED]
GPG Key ID 0x4FF8E93B
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHmL3YNJWy7U/46TsRA
Hi Robert, see the update with source and (first) makefile-description here:
http://offsystem.sourceforge.net/download.html
On Jan 20, 2008 8:05 PM, Robert Hogan <[EMAIL PROTECTED]> wrote:
> On Sunday 20 January 2008 18:19:30 Michael Schmidt wrote:
> > Hi Robert,
> >
> &g
1 - 100 of 223 matches
Mail list logo