On Sat, 13 Jan 2007 19:41:57 +0800, Kevin Smith [EMAIL PROTECTED] said:
Why hasn't Tor been blocked in China already? Torpark is redirecting
Two explanations:
1 - They need it for own use, field agents inside china to field agents in
foreign countries. An easy way to not have to go by embassy
On Thu, 11 Jan 2007 00:39:01 +0100, sigi [EMAIL PROTECTED] said:
On Wed, Jan 10, 2007 at 03:14:27PM -0800, Total Privacy wrote:
Where to find a list of exit nodes to have in the
ExitNodes nickname,nickname,...
https://tns.nighteffect.com/
https://torstat.xenobite.eu/
Thanks
Where to find a list of exit nodes to have in the
ExitNodes nickname,nickname,...
?
--
http://www.fastmail.fm - Faster than the air-speed velocity of an
unladen european swallow
Hi, is there anyone having the same problem, or only for me?
My setup is now a Torpark with disabled images, cookies and
javascript. I somebody wanna test this, please do the same.
To check the new Torpark (my is pretty old by now), I´m trying
download it, but faile to success. At one time I
Tim Warren [EMAIL PROTECTED] said:
Maybe you could answer a question for me. Should I NOT login in to
a site, such as a bank, when using Tor? Or do I need to make sure
it is https:?
Appreciate any clarification.
Thanks,
I´ll put it this way, if you are registered as your real identity
Fergie [EMAIL PROTECTED] said:
For what its worth, I forwarded your message to a colleague
at F-Secure. He may contact you directly, but in any case, I'll
et the list know what becomes of it if possible...
- ferg
For your knowledgement, after my last F-Secure update, the warnings
not
covertly installs a keylogger on
your
computer do you, legally at least because I'm going to do it anyway, have
the right to remove it?
- Original Message -
From: Total Privacy [EMAIL PROTECTED]
To: or-talk@freehaven.net
Sent: Tuesday, November 14, 2006 9:33 PM
Subject: Re
Thanks for all your feedback, and that dead cow stuff sounds really creepy.
Someone have a good explanation?
I´ll test that alternative .bat start Tor later on reformatted drive in
resetted computer on clean Win XP install, to see how it goes.
Concerning my original malware warning problem,
On Mon, 13 Nov 2006 10:09:39 +0100, xiando [EMAIL PROTECTED] said:
But I'm GCHQ (look them up, if you traffic is going through UK then they see
it) and I run two fast Tor-servers and you select my servers for both Entry
Do you mean the UK´ers had modified Tor to see everything, not only the
Arrakistor [EMAIL PROTECTED] said:
If the problem is being caused by the killprocdll, you can download
and verify it from here:
http://nsis.sourceforge.net/mediawiki/images/1/12/KillProcDLL-bin.zip
Yup, it didd da trick!
Now I´ve added it to the F-secure exclude list (quite lonely there).
Keep cool men, I don´t think you put trojans in Torpark, Tor or Portable
Firefox,
however since I last week updated the antivirus and antispyware database in my
F-Secure firewall, I always get this warning when closing Torpark 1.5 (build on
Tor v0.1.1.12) but never when I start the Torpark.
Maybe slightly off topic (btw, is OT = Off Topic or On Topic?)
but because I newer had anything to do with eBay and still get this,
perhaps other on this list also received it as some strange effect
of being into this list, where any member see all others addresses?
The following email
Maybe a different approach, but how about this scenario. Real life practise,
far beyond regulations and bureaukracy...
Somebody contact his old fellow (out on a walk whit no bug mics around) saying:
Howdoyoudo my friend, hear you was in some company with access to a storage of
very secret
On Wed, 20 Sep 2006 18:43:41 +1000, glymr [EMAIL PROTECTED] said:
yes, port 25 is blocked by most tor exit nodes. however, some webmail
services (notably gmail) use different ports and are usable from tor.
How about this;
Using PGP or similar to make an encrypted file (txt or word or
On Tue, 10 Oct 2006 23:27:09 -0400, Roger Dingledine [EMAIL PROTECTED] said:
Unfortunately, both of those answers use the old version 1 directory
protocol (from Tor 0.1.0.x), which is deprecated at this point. So both
of those techniques will be somewhat inaccurate.
My version of Torpark
Maybe somebody already had a look on this problem?
I´d like to know where and how to put in wich packetlogger
to get as close as possible to the border of encryption at
my user computer side of Tor, to watch exactly what´s going
in and out (not only what´s visible in the browser).
My
As for the DNS leaks, I think more is being made of this than it
Was´nt this solved several months ago, in Torpark (Windows)?
BUT your ISP already has total control of all your traffic between your
Even if it's encrypted Tor traffic, they still know at a minimum the Tor
entry node it's
Thank you very much, that will do the trick I think, but still; have to
get an email accout somewhere to put into it, to serv.
Then to use my standard ISP supplied account would spoil the idea with
anonymity and Tor usage, so the second trick will be to find an very
best to use free account
Hello or-talkers!
I see your activity had gone up rapidly since last time.
Probably good, I suppose.
Well... what I´m up to right now, is looking for the very
ultimate secure email system that´s fully compatible with
Tor and don´t require cookies, javascript and other things
that somehow
Hi or-talkers,
yet another issue concerning without Tor vs with Tor.
Two hypothetical examples:
1.
I´m using the normal Firefox (without Tor) with cookies enabled
to log in on Yahoo email to make some stuff as my real identity.
Then I close the normal Firefox and start Torpark Firefox
20 matches
Mail list logo