y can learn more about how these
important issues of privacy, anonymity, security etc are evolving before us.
It takes courage and conviction, to both believe and to act according to
your beliefs. Making intelligent choices fits in there somewhere too. But in
the end we all define our own lives in our own ways.
--
Wesley Kenzie
gpg 0x4C945266
On Tue, Sep 29, 2009 at 1:06 PM, grarpamp wrote:
> > > They took the machine running Tor exit node called "nami".
>
> > Well, sorry to hear that.
> > Good luck with the police. :-(
>
> Actually, I think people will be just fine if their systems are
> free/encrypted of 'interesting' content, and t
>
> --- On Wed, 9/9/09, Eugen Leitl wrote:
>
> Perhaps this should be reason enough TO run a tor node? Not for
> Burma/Iran... but for those of us in the "first world" who are threatened by
> police states ourselves? It sometimes takes an unfortunate rude awakening
> to realize this, but unfortu
On Tue, Aug 18, 2009 at 8:26 PM, Andrew Lewman wrote:
> [snip]
>
> The summary of results:
>
> 1) Native polipo is 54.5% faster on average than native privoxy. This
> could be due to polipo's caching, http 1.1 pipelining, and it can serve
> bits as fast as they come in from the network. Privoxy
In a similar vein, I used to wonder how google would send out probes to all
the web sites that I visited - usually within a few minutes of my going to
these web sites. I eventually realized it was the google toolbar watching my
hopping habits and telling the master google bots to chase along after
, 0 cmpAll
--29798-- errormgr: 11 supplist searches, 363 comparisons during search
--29798-- errormgr: 11 errlist searches, 55 comparisons during search
. . . . .
Wesley
On Wed, May 6, 2009 at 2:50 PM, Christopher Davis wrote:
> On Tue, May 05, 2009 at 08:37:28AM -0700, Wesley Kenzie wrote
Hi, Christopher. If you could also solve the known instability issues with
polipo that Juliusz has not had time to resolve in the past year, then many
would be grateful. I cannot get polipo to run for more than about an hour
without it crashing.
. . . . .
Wesley
On Tue, May 5, 2009 at 12:10 AM,
I see that the Tor client settings for DNSPort and DNSListenAddress (as are
SocksPort and SocksListenAddress) are subject to the SocksPolicy setting,
but this is only an entrance policy. What is the default exit policy then?
Is it the same as the ExitPolicy setting? And do the ExitNodes,
StrictEx
don't know PHP so well, but maybe you should specify 'rb'
>>instead of 'r'.
I do not see that 'rb' is an option in php for the fopen() function ...
. . . . .
Wesley
On Tue, Oct 21, 2008 at 2:57 PM, Nick Mathewson <[EMAIL PROTECTED]> wrote:
> On Tue
per 5.1 Authentication in control-spec.txt: "To authenticate, the controller
must send the contents of this file, encoded in hexadecimal."
Fine, but when using the following in PHP:
$ch = fopen('cookiefilename', 'r');
$auth_value = fread($ch, 128);
$send_auth_value = "AUTHENTICATE \"". bin2hex($a
>
> Can sombody beat this system :) :) ->
> http://wgeostreaming.zdf.de/encoder/livestream15_h.asx
>
>
I just set my proxy to de.pickaproxy.com:8133 and it worked (slowly) from my
Windows Vista machine. I reside in Canada.
Wesley
I think you could make a case for trusting 1 or a handful of exit nodes, and
use ExitNodes abc and StrictExitNodes 1 to make sure you only use those for
sensitive authentication connections like you are asking about.
For example, do you think blutmagie is sniffing? When it is trusted as a V2
and
Is anyone running Tor on OpenSolaris? I'm investigating using Amazon EC2
and OpenSolaris on my server to address scalability.
http://www.sun.com/third-party/global/amazon/index.jsp
Wesley
> If I believe that the majority of POP3 traffic over tor is
> performed by
> unauthorised parties, and as an exit node admin I'm someway
> helping this
> access, then is there not a moral argument for exit node admins to
> detect the abuse of tor and alert the people affected? to go
> fur
> > If I set "BridgeRelay" for my Tor server to 1, then must I have an
> > "ExitPolicy" to accept at least 1 port or 1 IP address/range? If
> > ExitPolicy is reject *:* does this mean the bridge relay will not
> > work?
>
> No, you're confusing ExitPolicy with ExtendPolicy. (And
> ExtendPolic
I am having problems fully understanding bridges and would appreciate some
guidance or pointers to where I can learn more.
If I set "UseBridges" for my Tor client to 1, can I specify any relay(s) in
the "Bridge" configuration setting, or must I only specify a relay that is
expecting to be used as
> On Tue, May 27, 2008 at 02:19:22PM -0700, Wesley Kenzie wrote:
> > >"where does the data originate from when the controller GETINFO
> > >command is used? Does it just grab data out of the
> cached* files on
> > >disk? Or poll one of the direct
pickaproxy.com has today started flagging the Tor network as either Ok, Use
With Caution or Not Considered Safe. "Ok" is initially defined to mean that
there are at least 525 running, not hibernating, valid, not bad exit nodes;
500 running, not hibernating, valid relays; 300 running, valid, not
hi
>
> On Tue, May 27, 2008 at 02:19:22PM -0700, Wesley Kenzie wrote:
> > >"where does the data originate from when the controller GETINFO
> > >command is used? Does it just grab data out of the
> cached* files on
> > >disk? Or poll one of the dir
> On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote:
> > > What is the criteria for getting listed as an "Exit" node in the "s"
> > > record for the controller interface's GETINFO /ns/id/fingerprint?
> >
> > You need to have two of these three ports wide open: 80, 443, 6667.
> > No, I don't
> On Sat, May 17, 2008 at 09:57:41AM -0700, Wesley Kenzie wrote:
> > > Answer two: moria2 isn't a v3 directory authority (though it
> > > is a v1, v2, and hidserv directory authority).
> >
> > GETINFO ns/name/moria2 shows the following:
> > r moria2 c
>
> On Wed, May 21, 2008 at 09:21:20PM -0400, BarkerJr wrote:
> > > What is the criteria for getting listed as an "Exit" node
> in the "s"
> > > record for the controller interface's GETINFO /ns/id/fingerprint?
> >
> > You need to have two of these three ports wide open: 80, 443, 6667.
> > No,
What is the criteria for getting listed as an "Exit" node in the "s" record
for the controller interface's GETINFO /ns/id/fingerprint?
I recently added accept *:443 to my ExitPolicy setting in torrc but it is
not listed as an Exit node, and am wondering why not. The new ExitPolicy
setting does sh
etween 7am EST and 3pm EST today?
Wesley
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Wesley Kenzie
> Sent: May 19, 2008 1:05 PM
> To: or-talk@freehaven.net
> Subject: RE: most nodes now "not running" ?
>
>
ECTED] On Behalf Of Roger Dingledine
> Sent: May 19, 2008 12:24 PM
> To: or-talk@freehaven.net
> Subject: Re: most nodes now "not running" ?
>
>
> On Mon, May 19, 2008 at 12:19:46PM -0700, Wesley Kenzie wrote:
> > Anyone know why of the nearly 2,000 current
Anyone know why of the nearly 2,000 current nodes, only 407 are flagged as
"running" and the others are not? This does not seem normal to me.
Wesley
<>
I would rather not get involved in this spat, but I believe that we are all
better off if bullying behaviour is outed. And yes it is bullying to assume
you know another person's motivations and behave in a demeaning, derogatory
way towards them.
Whoever is administering this list, can you please
With regards to the pickaproxy.com service we are setting up, I am
interested in feedback from current Tor users and developers on the
possibility of sharing earned subscription revenues with both the Tor
project and exit node operators. There are costs associated with operating
our service and se
Alec, we have setup pickaproxy.com specifically for this purpose - to
geospoof your location and to eliminate the need to install and maintain Tor
and Vidalia. Check it out. Essentially we run (at present) a bunch of Tor
clients on our server that have strict exit nodes for a specific country, so
>On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
>
> www.pickaproxy.com
>
> So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In
> other words users do not have any protection from your server.
>
&
Fyi, what you are asking for is exactly what we are working towards with
http://pickaproxy.com - allowing you to pick or exclude exit nodes by
Country - where Tor is setup on our server as a client to your workstation.
We are calling this "geospoofing".
. . .
Wesley
-Original Message-
Fr
@freehaven.net
Subject: Re: tor 0.1.2.17 server died after only a few hours
On Tue, Sep 04, 2007 at 08:27:08PM -0700, Wesley Kenzie wrote:
> I am not, but I fail the "make test" on 0.1.2.17 as follows:
>
> v3_networkstatus
> ...
&g
I am not, but I fail the "make test" on 0.1.2.17 as follows:
v3_networkstatus
...
File test.c: line 2548 (test_v3_networkstatus): Assertion failed:
(v1->published==vote->published)
1188938513!=1188938536
Because of this I have not yet done a "make inst
to run all of the user traffic through your server, and then
through the Tor network?
A comment on the implications of using a caching web proxy for Tor users on
your server would be interesting as well.
cheers!
On Wed, 4 Jul 2007, Wesley Kenzie wrote:
> pickaproxy.com and geospoofing.com wi
server
(your proxy). And we're looking at using polipo (on the server) to speed
things up.
We have multiple sources of geolocation data so they will be more accurate
than the open source GeoIP library - we pay for them where the license
requires us to.
. . .
Wesley Kenzie
WebMaster, showmyi
up
and running any server operators wanting to participate could go to
something like http://www.pickaproxy.com/tor/servermonitoring/optin/ and let
me know. Will that work, do you think?
. . .
Wesley Kenzie
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of
is - maybe something like http://www.showmyip.com/torstatus/
> > with just the relevant data for new Tor users.
> >
> > . . .
> > Wesley Kenzie
> > WebMaster
> > http://www.showmyip.com/
> > http://www.privacy-ecosystem.com/
>
> Sounds great, looking fo
Good idea. We will work on getting a page available on showmyip.com to do
this - maybe something like http://www.showmyip.com/torstatus/ with just the
relevant data for new Tor users.
. . .
Wesley Kenzie
WebMaster
http://www.showmyip.com/
http://www.privacy-ecosystem.com/
-Original
here 123.456.789.001 is the IP address of your visitor. We
will have a simple text and SOAP interface available soon. You can add
other &get= parameter values besides "tor" such as country, host, isp, org,
state, reverse_host, etc.
. . . . .
Wesley Kenzie
WebMaster
https://www.ippages
39 matches
Mail list logo