Hi,
only few countries are on the list at opennet.
An example is finland:
http://lapsiporno.info/suodatuslista/?lang=en
An interesting point is that finland censors some GB
and many US sites, because of child porn.
Regards,
Rolf
> -Ursprüngliche Nachricht-
> Von: "Curious Kid" <[EM
Hi,
i think the main problem is that via java/javacript the browser can do direct
connections, bypassing your proxy and only using your default gateway!
You can see this bypassing with test sites like
https://www.jondos.de/de/anontest .
That's why i am not using a default gateway on the PC i am
Hi,
a solution can be using a cgi-proxy like daveproxy.co.uk or anonymouse.org
or other nets like JAP: http://anon.inf.tu-dresden.de/index_en.html .
If it fails, you can use open WLANs, open proxies or an internet cafe.
Regards,
Rolf
> -Ursprüngliche Nachricht-
> Von: "gregery" <[EMA
Hi,
> Tor exitnodes are found on several blacklists where these public
> proxy's are also found on. It seems very likely to me that they just
> check the IP your connection is originating from on several blacklists..
yes, but this method has two bugs:
a) Tor exitnodes with dynamic IPs do chan
Hi,
you should simply install Ubuntu on an USB stick, because it's
simply a mass storage device like a HDD.
I've done it with an 2 GB stick and SuSE Linux some time ago
without problems.
The USB sticks have a size of up to 64 GB, which is enough for a
huge installation.
Regards,
Rolf
> -
Hi,
> I renamed (with 'mv') the file I was sending Tor logs to whilst Tor was
> running.
> I actually moved it to a different directory.
> The log data kept being written to that file. How?
unixoid OSes use file pointers which remain even when you do rm or unlink.
So mv does not change writing t
Hi,
yes, i started my TOR exit node with port 25 open (default is close)
and half a year later my provide sent me a letter that my PC is
sending many spam mails permanent and that i should check my PC
for malware.
Because i could not find an email relay i could forward the mails to,
i closed port
Hi,
> > is there any documented case of a DDoS attack via TOR or is
> > a DDoS attack via TOR only an urban legend?
>
> It doesn't make any sense to DDoS people over Tor. It wouldn't work.
>
> See also https://www.torproject.org/faq-abuse#DDoS
i know, but i have the problem that a government ag
Hi,
is there any documented case of a DDoS attack via TOR or is
a DDoS attack via TOR only an urban legend?
Regards,
Rolf
Hi,
> There's also the possibility (at leat for some versions of linux and
> newer Windows versions, not sure about other OSs) to spoof (change/hide)
> your MAC address.
> Be advised that such applications might be illegal in some countries.
If that' illegal, it would mean that you can't produc
Hi,
you forgot the censorship simply by DNS: I tested in several companies like
Siemens and
countries like Qatar with URLs like sex.com and found that censorship is done
only by DNS
server censorship.
With an online nslookup or not censored DNS server you can avoid it.
By the way: Is there an e
Hi,
> >> Sometimes, when a Tor user does something illegal with Tor, the exit
> >> node operator of the exit node the Tor user was using is blamed.
> >
> > if you use a transparent proxy plus a provider proxy as parent proxy
> > for your TOR server, you can simply avoid that ;-)
> (snip)
>
> Whi
Hi,
i know that there's a RIPA act in UK, but some laws are illegal,
e. g. the Nuremberg Laws, http://en.wikipedia.org/wiki/Nuremberg_Laws,
and they doe not affect the international laws and do not impress
international courts like the European Court of Justice,
http://en.wikipedia.org/wiki/Euro
Hi,
> [EMAIL PROTECTED] wrote:
> (snip)
> > If someone would ask me for a password, i would spam, tell wrong
> > passwords, to waste his time, which could be used to ask others for
> > passwords ;-)
> (snip)
>
> If the authorities tried to get encryption passphrases out of me - and I
> didn't wan
Hi,
> ... As "dr no" pointed out,
> many sites log only the IP address, not any Forwarded-For or similar
> headers. So while those proxies cannot be *trusted* to provide any level
> of obscurity or anonymity, they *might* with luck proove to be a dead
> end (or at least a serious obstacle) for
Hi,
> > if you use a transparent proxy plus a provider proxy as parent proxy for
> > your TOR server, you can simply avoid that ;-) To be absolutely sure, you
> > can restrict the TOR output to port 80 and and use transparent http
> > proxying to port 80, plus a provider proxy as parent proxy.
> I
Hi,
> Sometimes, when a Tor user does something illegal with Tor, the exit
> node operator of the exit node the Tor user was using is blamed.
if you use a transparent proxy plus a provider proxy as parent proxy
for your TOR server, you can simply avoid that ;-)
To be absolutely sure, you can res
> Hello
>
> I'm not sure if my last email reached the list but just wanted to let
> you know.
>
> Tor exit-node SpongeBob was raided by local police two days ago. Very
> rude and ignorant cops, the usual. They took all my computers and tried
> to take my UPS before I convinced them that it's not
> As far as I know tor operators have been raided in Germany and Finland
> by ignorant cops who does not know anything about proxies or that one ip
> does not mean "one person" (ever heard of NAT, proxying or routing for
> example). How about other countries?
>From germany i know that an anonymous
> maillist wrote:
> (snip)
> > They took all my computers and tried
> > to take my UPS before I convinced them that it's not a computer.
>
> No offense, but... LMAO! That's just sad; they can't tell a computer
> from a UPS...
Hi,
i also thought about it and it's possible to e. g. to hide a WLAN
Hi,
> >it's possible to use e. g. an open WLAN from a neighbor for your
> >TOR server and in most countries that's be legal, e. g. in=20
> >Germany.
> >But for working behind NAT the program has to be optimized, like skype,
> >and as far as i know, TOR is not made for working behind NAT.
> >
>
Hi,
it's possible to use e. g. an open WLAN from a neighbor for your
TOR server and in most countries that's be legal, e. g. in
Germany.
But for working behind NAT the program has to be optimized, like skype,
and as far as i know, TOR is not made for working behind NAT.
Greets
> -Ursprüngl
Hi,
for anonymity konqueror is one of the best browsers, because
you can turn off the browser and os identification, as you can see
on
http://proxydetect.com/
And you can switch off the referrer by adding the following text to your
~/.kde/share/config/kio_httprc to disable the sending of the HT
Hi,
> Is there any censorship of internet in your country? otherwise you need not
> use tor.
that's wrong: TOR also countermeasures traffic analysis and other sorts of
information
abuse.
That's why i'm using TOR also for IRC and ICQ.
To countermeasure taking a public IP number e. g. from an em
Hi,
> Every time the IP changes - or the relay even goes down and up (instead
> of doing a -SIGHUP) - it breaks all the circuits running through your node.
i've been killing the tor server via torctl stop before my disconnects and
restarting
via torctl start (i also restarted squid and privoxy).
Hi,
> | i got only a snail mail with a complaint about much spam, because i
> started with no closed port.
> | Since i closed port 25 i had no complaint since more than a year :-)
> | And with the proxy chaining of port 80 it should be fine for the next
> years.
> (snip)
>
> Odd; the default exit
Hi,
> (snip)
> | yes, they can't! At least for an exit gateway they receive
> | potentially tons of abuse complaints.
with a transparent proxy +ISP proxy they can get abuse complaints
about their proxy or maybe (with really good http header evaluation)
about my proxy. So the complaints are all ab
Hi,
> Hans Schnehl wrote:
> >
> > A word about obfuscation: If we run a tor node, we are as anonymous as Sta.
> > Claus
> > hiding behind sunglasses to our ISP's. If they want, they can see that we
> > are running a router/tor-node.
> > Actually they can hardly miss it.
>
> yes, they can't! A
Hi,
> If this or things like it continue people who see a need to block (or
> otherwise treat differently) users from TOR will simply run probing
> hosts across the tor network, wasting TOR bandwidth, and applying
> their tor blocks to big proxy servers.
that would be useless because i do change
Hi,
> A word about obfuscation: If we run a tor node, we are as anonymous as Sta.
> Claus
> hiding behind sunglasses to our ISP's.
that's clear; i'm using TOR as a mix with a transparent local http proxy which
uses an ISP
proxy as parent proxy, so that the exit traffic goes through two proxies
Hi,
> On Mon, 7 Jan 2008 20:55:36 +0100 Tom Hek <[EMAIL PROTECTED]>
> wrote:
>
> >> i'm changing my public IP number ten times per day and to avoid
> >> confusion,
>
> *Ten times per day?* Please tell us again why it is you're bothering
> to run a tor server if you also feel you hav
Hi,
i'm changing my public IP number ten times per day and to avoid confusion,
i'm stopping my TOR server before and starting after the number change.
But after the start TOR is very slow.
Is there a better way to tell the TOR server that the public IP has changed?
Greets
Hi,
> So think out a name, address, etc. (just for the card) and you can get
> one e.g. at card444.com.
Cool; is it possible to have an paypal account with such a prepaid credit card?
And are there other alternatives for paying anonymously?
I looked for a swiss numbered account, but it's not r
Hi,
i tried to upgrade from version 0.1.2.16 to 0.1.2.18 but i see that my TOR
server
does not use the limit of 90 KB; it's only about 10 % (about 9 KB).
I put
HttpProxy 127.0.0.1:3128
into the torrc but that changed nothing and for the 0.1.2.16 version this was
not
necessary because it works f
34 matches
Mail list logo