I don't know the technicals of DNS but it sounds like a great idea to
me. One of the major problems tor faces (IMHO) is DNS resolution which
isn't perfect.
On 1/9/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
Hello,
for reasons that are not relevant to the question, my tor-node 'cannot'
func
e progress. Solidarity is the best way to defeat
ignorance and oppression. Perhaps it would be smart to set up a legal
fund for tor operators in Germany?
Ringo Kamens
On 1/8/07, Roger Dingledine <[EMAIL PROTECTED]> wrote:
On Mon, Jan 08, 2007 at 12:18:10PM +0100, Eugen Leitl wrote:
> Is t
It might be possible that you are viewing pages with Java,ActiveX, or
some other scripting language that is changing it. Get firefox (if you
don't already have it at getfirefox.com) and the noscript add-on
(google it) for browsing with tor.
On 1/6/07, jed c <[EMAIL PROTECTED]> wrote:
In order fo
different drive. Then just use the cp command to copy everything.
Complicated? Yes. Security isn't free.
Ringo Kamens
On 1/4/07, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
On Wed, Jan 03, 2007 at 06:35:21AM +, [EMAIL PROTECTED] wrote
2.3K bytes in 61 lines about:
: I have just rec
I'm not sure if regmechanic does these keys specifically because I
don't know which keys we're talking about and I don't have experience
with regmechanic, but it might.
On 1/3/07, Job <[EMAIL PROTECTED]> wrote:
cant you just use a program like registry mechanic? it deletes unused
keys in the reg
but users
need to be aware it is a risk (as it is with ALL anonymity programs).
If endorsing illegal activities in China is illegal, please report me
to the police.
Ringo Kamens
On 1/3/07, Job <[EMAIL PROTECTED]> wrote:
Hello George,
I understand your point of view. Indeed, I am not a
es about 20 min to backup/restore an image.
Ringo Kamens
On 1/2/07, Vincent BTinternet <[EMAIL PROTECTED]> wrote:
No disrespect to TOR users and all those who put in all the hard work to
make a reliable program (free more importantly) that innocent people can
use and I myself have enjoyed the
Wouldn't constantly changing ssh keys make it more secure?
On 1/2/07, Mike Perry <[EMAIL PROTECTED]> wrote:
Deliberately breaking threading so this doesn't fall through the
cracks.
Thus spake Robert Hogan ([EMAIL PROTECTED]):
>
> Got this when testing an ssh connection:
>
> WARNING: DSA key fo
addition, you referenced the such and such act which
doesn't really have enough power (unless you harassed the president or
something) to execute a search through tor in the first place. I'm not
condoning illegal activities, but it's just how I see it.
Ringo Kamens
On 1/2/07, GeorgeDS &l
I think there are some tormail services, but another one would
certainly be appreciated. If you have a webmail login, please NO
JAVASCRIPT/JAVA/FLASH/ACTIVEX/etc. Perhaps you could also offer
forwarding for people who just want to use your service as a gateway.
That way, you could save space on th
email through tor, find out the exit node and
specify it in your proxy settings. That way, mail will always get sent
through that proxy. That might hamper your anonymity a bit, but you
can always rotate it.
Ringo Kamens
On 1/2/07, Job <[EMAIL PROTECTED]> wrote:
Thanks Mike,
Ill go check th
You could probably set a firewall rule to reject unauthed packets.
On 1/2/07, Mike Perry <[EMAIL PROTECTED]> wrote:
Thus spake Michael Holstein ([EMAIL PROTECTED]):
> Here's another idea ... gmail allows SMTP via SSL (smtps on tcp/465).
>
> You've got to authenticate for in/out (meaning google
Just set thunderbird under preferences not to use tor. The problem
with this is that you won't be anonymizing your email. Have you
thought about using the web client? There are no problems with sending
mail there.
On 12/25/06, Artem Litvinov <[EMAIL PROTECTED]> wrote:
I have a problem with sendi
This message got filtered as 'spam' by gmail for some reason so I wanted to
post it here for those who don't check their spam filters:
Am Sonntag, den 17.12.2006, 11:41 +0100 schrieb Florian Lohoff:
Hi,
i won an appointment with the local police on monday because someone
abused the tor network fo
rated. There's a
chance that some governments may be subtly making tor hard to use or that
some network routers have problems with certain sequences of connections or
something.
Ringo
On 12/17/06, Mike Perry <[EMAIL PROTECTED]> wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
> Th
Thanks for that. It's interesting to have that data visualized.
On 12/16/06, Mike Perry <[EMAIL PROTECTED]> wrote:
While testing the latest relese of my Tor scanner, I decided to do a
study on circuit reliability and how long it takes to construct a
circuit then fetch the html of http://tor.eff
Again, I wouldnt trust zour anonymity or privacy to zonealarm. It doesnt
obey its own rules and it phones home. Not something to be trusted.
On 12/3/06, Kees Vonk <[EMAIL PROTECTED]> wrote:
Hideki Saito wrote:
> For those of your experiencing the problem with ZoneAlarm, you might
> want partici
find a solution. Perhaps there is a way that
tor clients to calculate a checksum of the server files?
Ringo Kamens
On 12/2/06, Total Privacy <[EMAIL PROTECTED]> wrote:
"Tim Warren" <[EMAIL PROTECTED]> said:
> Maybe you could answer a question for me. Should I NOT login
am. If
you have multiple tor programs runnning, you will have to edit their listen
port.
On 11/17/06, gabrix <[EMAIL PROTECTED]> wrote:
Ringo Kamens wrote:
> I have used lots of different programs to chain tor connections and
> proxies. Socks chain has recieved kudos from the proxy
ng happened, Tor
would error.
Tor tries to start, the error dialog popsup stating Tor needs to quit, but
it is shown to keep running in Task Manager.
Appriciate ANY ideas.
Thanks,
TW
*
*
On 11/16/06, Ringo Kamens < [EMAIL PROTECTED]> wrote:
>
> What version of tor are you using? Wha
I have used lots of different programs to chain tor connections and proxies.
Socks chain has recieved kudos from the proxy industry but I don't use it
because it isn't open source. Proxyrama is a nice HTTP proxy chainer and you
can use sockscap to chain it though tor. Charon is a nice proxy
finder
What version of tor are you using? What processes are running in the
background? What service packs do you have installed?
Ringo
On 11/15/06, Tim Warren <[EMAIL PROTECTED]> wrote:
Greetings. I am new here. What brought me here is the inability to run Tor
on my main WinXP pro system. While loadi
Also, make sure you have an application firewall to stop DNS leaks and plugins from taking your anonymity away.On 11/15/06, Jeffrey F. Bloss <
[EMAIL PROTECTED]> wrote:RMS wrote:> > > If you don't enable hide-forwarded-for-headers you are sending
> > > your client's IP address to the web server. If
Also, it would be more logical instead of having this convoluted camera
setup (which can be defeated by editing the contents of the tape) to
get a very cheap laptop to do all your questionable work on. Then, you
can always have it with you to ensure that the data isn't modified. I
would also like t
I also think freenet would be best for this kind of project. You can
probably find some people to help you set up a freesite on the freenet
frost boards. For publishing banned files, the obvious choice is
freenet due to its security and the fact that it was designed to do it.On 11/15/06, WikiLeaks
I had asked that question before and somebody provided a script, search
the archives. I would also like to add that the "great firewall of
China" is not very centralized and as a result such an attack would
prove fatal. Does anybody have any information about how censorship in
other countries works
it
doesn't obey it's rules and it's closed-source so there's no way of
knowing wether it's an honest program or not.On 9/17/06, Taka Khumbartha <[EMAIL PROTECTED]> wrote:
On 9/17/06, Ringo Kamens <[EMAIL PROTECTED]
> wrote:> While I think it is important to c
While I think it is important to correct the problem of tor-zonealarm
incompatibility I don't think anybody who uses tor should use
zonealarm. Tor is an anonymity and privacy tool and zone-alarm doesn't
respect either of these fundementals. When installed+run, zone-alarm
"phones-home" (check for yo
Thanks. I've been looking for something like this.On 7/17/06, Marcel <[EMAIL PROTECTED]> wrote:
Hi fellow tor users.I made a little script to exclude the tor routers in some countries.Either choose the countries you want, or those you don't. You can put thisscript anywhere but in your torrc direct
The hidden wiki has been down for a while. I think it got hit by a bad spider but I'm not sure.On 6/25/06, Vito Catozzo <
[EMAIL PROTECTED]> wrote:-BEGIN PGP SIGNED MESSAGE-Hash: SHA256
thalunil ha scritto:> Hi!>> I have a connection problem with hidden services.> E.g. I try to connect to t
Just a quick note on checking wether or not port x is open. If they
choose port 80 then it could be that the port is really blocked but
appears open because the NAT/Firewall recognizes that port connection
as part of the "conversation".
On 6/15/06, Nick Mathewson <[EMAIL PROTECTED]> wrote:
On Th
As long as you use the default configuration and set your browser to use a HTTP proxy, then DNS leaks shouldn't be a problem. The problem occurs when you tell programs to use tor as a socks proxy and they decide to resolve their own DNS names. If you block DNS resolving with your firewall the progr
a tor server which I (for obvious reasons) deny tor
access to througgh my firewall.
On 6/13/06, Fabian Keil <[EMAIL PROTECTED]> wrote:
"Ringo Kamens" <[EMAIL PROTECTED]> wrote:
> I was wondering if anybody has a solution to the problem I currently
> have. Is it possib
I was wondering if anybody has a solution to the problem I currently have. Is it possible to stop tor from connecting to servers in the US or servers on my blacklist? I have peerguardian, but that only prevents it from connecting to honeypots etc. on the first bounce.
Any help is appreciated,
Ring
You should have a firewall set up that only lets firefox/privoxy connect to 127.0.0.1, that way you can be sure it isn't leaking anything.
On 6/13/06, Fabian Keil <[EMAIL PROTECTED]> wrote:
[EMAIL PROTECTED] wrote:> Does that mean one theoretically had to deinstall
> Flash before surfing with Tor?N
For non-script email, you could use safe-mail.net. The noscript extension for firefox kills flash. The operating system obsfucation through virtual machines is a waste of CPU power. Just spoof the information using something like privoxy. Besides, the OS isn't really that bad. You should be more co
I really like that there is an HTML only version. That's awesome. The map itself is also really cool.
On 6/12/06, robert schade <[EMAIL PROTECTED]> wrote:
Please take a look at http://www.mitglied.lycos.de/tormap
, where youcan find the location of all TOR-Servers on a map.In order to create this
Perhaps we should get list readers to send letters to AVG. I'm happy to send a letter if people think it would help.
On 6/7/06, Arrakistor <[EMAIL PROTECTED]> wrote:
Andrew et al,I have recently been getting tons of emails about AVG finding the same"virus" in torpark.
I wrote them about their
Yes, all tor servers have publicly known IPs and as a result, a query of the directory servers by the police could reveal you are a tor server. Also, they could check your ISP logs.
On 6/7/06, Matej Kovacic <[EMAIL PROTECTED]> wrote:
Hi,I have a question regarding Tor directory. How often is it ref
Instead of blocking tor IPs (people will just use other proxies) why not make your site secure to begin with? Put up an IDS?
Ringo
On 6/3/06, Nick Mathewson <[EMAIL PROTECTED]> wrote:
On Sat, Jun 03, 2006 at 12:23:15AM -0400, y0himba wrote:> Item of interest?I'm not sure this is something we need
Alright, I've gone over the source using the little knowledge I have about C*. For all the paranoid people on the list, it doesn't seem to have any backdoors for the feds unless they are called stenographically. I'm sorry that my message came across the wrong way, I completely support a new tor gui
nt.
Ringo
On 6/1/06, Anothony Georgeo <[EMAIL PROTECTED]> wrote:
--- Ringo Kamens <[EMAIL PROTECTED]> wrote:
> I have to say that the torcp doesn't seem at all> unstable in the windows xp home service pack one> world. Despite reassurances, I still have doubts> about the
I have to say that the torcp doesn't seem at all unstable in the windows xp home service pack one world. Despite reassurances, I still have doubts about the true intentions of vidalia but it could be that my paranoia has gotten the best of me. Look at it this way:
1. Implemented into tor without
I was just wondering when we switched from the old torcp to vidalia. I didn't really see any discussion about it.Ringo Kamens
I'd certainly be interested in this as a feature, although it doesn't bother me to restart tor.
On 5/24/06, Michael Holstein <[EMAIL PROTECTED]> wrote:
New circuits can be forced by manually selecting an exit (eg:
http://some.website.ROUTERNAME.exit)Also .. the 10-minute lifetime dosen't apply to e
I don't think blocking HTTPS is a very good idea (although it has it's
benefits). If you connect via https then you make all your tor nodes
blind including the exit node which could curb abuse and attacks.
On 5/22/06, Anothony Georgeo <[EMAIL PROTECTED]> wrote:
--- Ring
If you are up an adversary such as the government, then you will
always end up on the "it could be this person list". If you are
referring to a situation where the person runs the first node and end
site it probably wouldn't help.
On 5/22/06, Helge Preuss <[EMAIL PROTECTED]> wrote:
Seth David Sc
If you are visiting an HTTPS site, so extensions like noscript and the
firefox settings to disable java still work?
On 5/22/06, Anothony Georgeo <[EMAIL PROTECTED]> wrote:
--- Fabian Keil <[EMAIL PROTECTED]> wrote:
> Anothony Georgeo <[EMAIL PROTECTED]> wrote:
> [snip]
> How do you convince you
Perhaps the tor site could have a little javascript/web form that
would generate a "custom" privoxy config/actions/etc. based on what
the user asked for?
On 5/21/06, Fabian Keil <[EMAIL PROTECTED]> wrote:
Anothony Georgeo <[EMAIL PROTECTED]> wrote:
> I think it is wise to note that Privoxy can
Has this always been a problem? Just this version? etc.
On 5/21/06, Simon Callow <[EMAIL PROTECTED]> wrote:
I'm on Windows XP Pro, v 2002, SP 2
__
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
't have been me because I'm not on linux.
On 5/21/06, Fabian Keil <[EMAIL PROTECTED]> wrote:
"Ringo Kamens" <[EMAIL PROTECTED]> top posted:
> On 5/20/06, Fabian Keil <[EMAIL PROTECTED]> wrote:> > Kai Raven <[EMAIL PROTECTED]> wrote:
> >> &g
Are you on XP Pro or Home? What service pack?
On 5/21/06, Simon Callow <[EMAIL PROTECTED]> wrote:
I'm using TorCP v 0.0.4 with Tor v 0.1.0.16 from theTor-Privoxy-TorCP bundle on Windows XP. TorCP crashes
every now and then. It doesn't seem to happen whenI've got a live connection to Tor and I can
quot;
On 5/20/06, Watson Ladd <[EMAIL PROTECTED]> wrote:
On May 20, 2006, at 2:39 PM, Ringo Kamens wrote:> I'm not sure if you all know this, but on most of the large
> filesharing forums, they are reccomending people use tor for> filesharing (gnutella,ed2k, etc.) in order to inc
Perhaps you should look into the Secret Service v Jackson case and
FBI/SS/Swiss SS v Indymedia Case as well as FBI? v Rackspace.
On 5/20/06, Watson Ladd <[EMAIL PROTECTED]> wrote:
Civil cases can be discarded if the government gets the judge to
agree that secrecy requirements are hampering the g
I'm not sure if you all know this, but on most of the large
filesharing forums, they are reccomending people use tor for
filesharing (gnutella,ed2k, etc.) in order to increase anonymity which
creates a HUGE network load. Can an exit node owner please tell us
approx. how much traffic he gets on the
nd my user-agent field isn't spoofed.
As far as referrers goes, you can either use referrer blocking or
spoofing (Always make the referrer the root of the site) and blend in
with the crowd well.
Ringo Kamens
On 5/20/06, Fabian Keil <[EMAIL PROTECTED]> wrote:
Kai Raven <[EMAIL
Supply does not equal demand with child porn. Regardless if people
WATCH cp, the creators will still be making it and children will still
be "violated". What you have to consider is that lots of the kids
(especially above 12) are doing it willfully with webcams etc. In
addition, there have been pl
Perhaps tor could generate like 100 keys when it starts, before it
starts making connections. That way, it can cycle through those keys
for all the different connections.
On 5/16/06, glymr <[EMAIL PROTECTED]> wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Matej Kovacic wrote:
> OK, t
uot; but it's just a joke. (Similar to how RIAA is suing
filesharers)
On 5/15/06, Mike Perry <[EMAIL PROTECTED]> wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
> I want to add my two cents about child porn. Censorship is censorship, it
> doesn't matter what you censor or
In addition, censoring child porn, death threats, etc. is impossible and you're dedicating yourself to a job that you will have to do 24/7 and never finish. You block a site, they make a new one. You block a file hash, they modify a file. You block a keyword, they use encryption. You block message
While this seems good for lots of circumstances, you have to realise that this does stop people from using sites that use IP address authentication or require you to re-login every time you change your IP. Perhaps this could be an option provided in a checkbox?
On 5/15/06, glymr <[EMAIL PROTECTED]
So far in US laws, proxy owners can't be held responsibile for enabling illegal activities unless they endorse or encourage them. For instance, if you started a CGI proxy for a fee that offered "complete protection" and "easy way to trade credit cards" you would end up in jail.
On 5/15/06, Jonatha
Perhaps servers should generate new private keys upon starting and store them in ram?
On 5/15/06, Lionel Elie Mamane <[EMAIL PROTECTED]> wrote:
On Mon, May 15, 2006 at 08:30:49AM -0400, Michael Holstein wrote:>> Flash is writable, so can be tampered. The critical secret (the
>> server's key) is in
I want to add my two cents about child porn. Censorship is censorship, it doesn't matter what you censor or by what logic you censor. Banning child porn is censorship, copyright is censorship, and stopping people from speaking who have opposing political views is censrorship. It seems to be a well
Also, they can put you on grand jury and give you obstruction of justice for refusing to talk.
On 5/14/06, Eric H. Jung <[EMAIL PROTECTED]> wrote:
Mike,I don't have the time to respond to all the points of your email exceptthe first/
Federal Contempt of Courthttp://www.bafirm.com/articles/federalco
so said as much to me in person, as has Peter Biddle.AdamOn Sun, May 14, 2006 at 10:43:22AM -0700, Ringo Kamens wrote:| I'm not saying the AES is weak. I'm saying that Microsoft might have
| implemented a back-door for governments. They could store the private keys and| passwords in videoca
Some angry users aren't going to stop Microsoft from obeying the government. When the government orders something to be done, it gets done, regardless of how many people ask for it. I know the win2k source got leaked a while back, did anybody conduct a formal review of it?
On 5/14/06, glymr <[EMAI
I agree with you about the hops. Thanks for posting the info about hard drives. I had no idea.
On Sun May 14 21:58:42 2006, [EMAIL PROTECTED] <[EMAIL PROTECTED]
> wrote:
FYI.Hard Disks.. (so abou the length)It is possible to find old data on "scrubbed" disks even with 100's of cycles of writeover.
d. Here
are some comments on a similar accusation a few years ago:
http://www.cnn.com/TECH/computing/9909/13/backdoor.idg/
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:43
To: or-talk@freehaven.net
Subject: Re:
re your system hasn't been tampered with, the computer hardware could have a defense system against that such as trusted computing.
Ringo Kamens
On 5/14/06, Mike Zanker <
[EMAIL PROTECTED]> wrote:
On 14/5/06 15:10, Tony wrote:> Nb- failure to disclose keys is up to two years i
nse system against that such as trusted computing.
Ringo Kamens
On 5/14/06, Mike Zanker <[EMAIL PROTECTED]> wrote:
On 14/5/06 15:10, Tony wrote:> Nb- failure to disclose keys is up to two years in prison. Not 10.
>> (5) A person guilty of an offence under this section shall be liable-
He has a good point. They surely have a clone of your drive which means they have the private keys to the server which could destroy the user's anonymity.
On 5/13/06, Joe Knall <[EMAIL PROTECTED]> wrote:
On Sonntag, 14. Mai 2006 00:03 Ringo Kamens wrote:> Well burning it doesn'
more to ensure all old data is lost)?>> Sincerely,> Landorin>>> Eric H. Jung schrieb:
> > If you can't afford a new hard drive, be sure to wipe it using DBAN> > http://dban.sourceforge.net/> > (open-source, free)> >> >
> > --- Ringo Kamens <[
rwrite existing files and itdoes it for 10 times or more to ensure all old data is lost)?
Sincerely,LandorinEric H. Jung schrieb:> If you can't afford a new hard drive, be sure to wipe it using DBAN> http://dban.sourceforge.net/
> (open-source, free)>>> --- Ringo Kamens <[E
Chances are it would be internal and couldn't hold much data. I really think you should sell your rig and buy a used one that's comprable and cut the losses. It's too risky to keep it.
On 5/13/06, Olivier Barbut <[EMAIL PROTECTED]> wrote:
thanks for the advice. I will for shure reformat everything
If it's the JAP I'm thinking of, you shouldn't trust it. The german government ordered JAP top put in a backdoor to the program to catch one solitary JAP user even though it was against german law. The backdoor was released as an urgent security update and the guy was nabbed.
As for the tor serv
Thanks. I'm also giving out gmail invites to whoever wants them. Their rules should be posted on the main page or about us page under one of these names:Terms Of Service (TOS)Abuse policy
Acceptable Use Policy (AUP)
Subscriber Agreement
On 5/11/06, Christopher W. <[EMAIL PROTECTED]
> wrote:
He
I read the changes and I didn't notice any security updates. Is there any reason for non-server owners or people without errors to update?
On 5/10/06, Matt Edman <[EMAIL PROTECTED]> wrote:
On May 10, 2006, at 4:36 AM, Landorin wrote:> However, where do I send feedback to? Will it do> sending it to
Thanks for the explanation of the DNS requests. Perhaps this could be put in a sort of "technical details" section on the wiki.
On 5/4/06, Joseph B Kowalski <[EMAIL PROTECTED]> wrote:
-BEGIN PGP SIGNED MESSAGE-Hash: SHA1On Thu, 04 May 2006 15:41:34 -0700 Roger Dingledine <
[EMAIL PROTECTED]
I'm also interested to know those answers.
On 5/4/06, Joseph B Kowalski <[EMAIL PROTECTED]> wrote:
-BEGIN PGP SIGNED MESSAGE-Hash: SHA1Hello everyone,I have a few questions about how the Tor network handles DNS lookup
requests that I couldn't find answers to in any of thedocumentation I wen
Well, by default (I'm not sure about the torCP bundle config) privoxy stores cookies and visited URLs. For those who don't know about it, all their anonymity could be destroyed with two files.
On 4/29/06, ygrek <[EMAIL PROTECTED]> wrote:
Hello Ringo,> I think adblocker and adblocker plus for firefo
I think adblocker and adblocker plus for firefox are WAY easier to use than privoxy. Plus, you can update your list in real time. With privoxy, you have to restart it every time you change the settings.
On 4/29/06, ygrek <[EMAIL PROTECTED]> wrote:
Hello Mike,> I regularly purge tons of cookies from
Perhaps you could have a foxy proxy frame (this might be what they were talking about) that routes all the traffic in that frame through tor in order to protect users from insecure images etc.
On 4/28/06, Eric H. Jung <[EMAIL PROTECTED]> wrote:
Hello Michaels,I apologize for the delayed reply. Plea
Perhaps you can do this:
firefox-->privoxy-->SOCKS proxy 1-->SOCKS proxy 2-->tor-->internet
This way, even if they could determine "your" ip, they would get the IPs of your proxy which is re-routing encrypted tor traffic.
On 4/28/06, Paul Syverson <[EMAIL PROTECTED]> wrote:
On Fri, Apr 28, 2006 at
Here's an example where cover traffic is good. If somebody has access to servers and is trying to correlate users to traffic, and some users have cover traffic then those users will ALWAYS show up as the users who are using traffic at the same time and thus it is harder to track them down.
On 4/28
believe 5 is a good amount, and I'm interested on how to change it.
On 4/28/06, glymr <[EMAIL PROTECTED]> wrote:
-BEGIN PGP SIGNED MESSAGE-Hash: RIPEMD160Anthony DiPierro wrote:> On 4/27/06, Ringo Kamens <
[EMAIL PROTECTED]> wrote:>> I don't really see anyth
r1. tor2 has no special configuration changes and is NOT run through FreeCap.
On a related note, if you have any comments on this thread, they would be appreciated:
http://archives.seul.org/or/talk/Apr-2006/msg00156.html
Ringo Kamens <[EMAIL PROTECTED]
> wrote:
Well, I'm fine with
so, why do you say it doesn't increase anonynimity?
re:4) I had just that idea, and started a thread on this list about it a few hours ago:
http://archives.seul.org/or/talk/Apr-2006/msg00156.html
Thanks for your input :)
Ringo Kamens <[EMAIL PROTECTED]
> wrote:
I don't think re
I don't think re-routing users through tor is good because:
1. It increases network load
2. They could end up in a very long loop with you as the exit point several times
3. It doesn't increase anonymity (perhaps generating cover traffic would be better)
4. Why don't you have your server fetch some
The reply worked.
On 4/24/06, Landorin (GPG 4096R/E9FD5518) <[EMAIL PROTECTED]> wrote:
Hello,I just joined this mailing list and sadly the welcome mail did notindicate how exactly I can respond to another posting, so hopefully I
did it the right way now.I'm studying laws right now (but don't believ
How does tor test wether the port it reachable or not? It could be
that your computer doesn't allow loopback connections?
On 4/23/06, Todd A. Jacobs <[EMAIL PROTECTED]> wrote:
> I'm still seeing errors like this:
>
> Apr 23 19:37:34.250 [warn] Your server (24.182.53.20:9001) has not
> mana
Perhaps your modem/router has bandwidth limiting options in it? You could then specify it to limit upstream bandwidth on specific ports to cut down on the server bandwidth. Also, couldn't you change the source to have a lower limit and then recompile it?
On 4/23/06, torrified <[EMAIL PROTECTED]> w
Well, we certainly don't want you to use an icon without the permission of the copyright owner.
On 4/23/06, Michael Biech <[EMAIL PROTECTED]> wrote:
Hey there!I just wanted to say that I took the freedom to make 2 nice(r) icon for Tor (CP). I didn't like how the icon of the TorCP overall and how it
If you're NATed with a dynamic IP, get a subdomain redirect (dyndys.org?) and just edit the subdomain redirect when your IP changed. Then put the subdomain address in your tor config. Some dynamic dns services even have programs that run on your computer that will automatically update the DNS listi
Why don't you put p2p links (magnet, ed2k, etc.), have a torrent, or put it on sites like rapidshare.de or megaupload.com?
On 4/17/06, Arrakistor <[EMAIL PROTECTED]> wrote:
Howdy,For all who are Torpark mirrors or wish to be, here is the tarball forTopark 1.5.0.2b.
We have included a new indian lan
Unless a site exploits a security flaw in firefox to generate cookies based on hardware, or has a nasty Java applet or activex script, then cookies can't be used to track you if you clear them often.
On 4/16/06, Arrakistor <[EMAIL PROTECTED]> wrote:
Hello Mike,Regarding the cookies, in that perspe
201 - 296 of 296 matches
Mail list logo