omebody do anything
else, like me.
Marek
On Sun, Nov 21, 2010 at 4:45 AM, slush wrote:
> Bitcoins are 'fair' on level that everybody can go to shop and buy strong
> GPU.
>
On Tue, Nov 16, 2010 at 3:41 AM, Kyle Williams wrote:
>
> So when the value of BTC's starts to be cut in half, and with INFLATION now
> at a record high, the cost of electricity is NOT GOING DOWN.
> Hence, the chance of you generating bitcoins will go down because a CPU can
> not compete with some
Hello ,
you should consider change of your DNS. Maybe it isn't problem in this
specific issue, but DNS hijacking isn't good at all.
I think there is not problem with your relay. Revvvolution appears on
torstatus.blutmagie.de without any problem so don't panic. In my case
it took many days until c
I dont think you are right.
There are two extremes when checking if two files are the same:
* Both files are exact byte copies - we are happy, because everything is clear
* Both files are absolutely different - we are also happy, because we
know that something is bad
But scanner which consider j
Hello,
yes, there is a way how to detect corrupted/malicious node. I wrote
Tor exit node scanner with some advanced techniques (for example
clustering or source tree analysis) as my thesis last year. During
debugging and testing I checked all exit nodes with many common pages
(google, few news pag
Hello Damian,
I just tried your application and want to say it is helpful for me. Im
running relay on standalone server and until today I missed something
to monitor Tor.
Thank you,
Marek
On Tue, Aug 4, 2009 at 9:23 PM, Damian Johnson wrote:
> Hi, throughout the summer I've been on a project cal
You can fully control Tor thru Tor Control Port. But it isnt end-user
functionality, you will have to write some controlling program. I used
this feature in my own app and works quite well.
Marek
On Fri, Aug 14, 2009 at 8:49 PM, M wrote:
> Hi,
>
> Could someone please answer these 3 questions (or
Hello,
I obtain following message from my provider:
[snip]
The following alert has been raised by the network security system for
the application/server in your network. It is suspected that some
malicious activity is happening from your network. The following IP
address is making SQL Injection t
> when you terminate and/or OS hibernate any circuits with your relay in
> them will fail. if you are not a guard or stable exit the impact of
> this might be minimal in practice.
Minimal impact in case you have no users :-).
Is there any positive case to run exit, when you hibernate often? When
Information available on exit node:
* Somebody is trying to communicate to some IP address
* Exit node knows identity of previous relay
* Exit node knows amount of transfered data
* In case of unsecured protocol (HTTP, FTP, Telnet) have exits full
access to transfered data and bad exits are able to
efore.
Marek
2009/4/8 Василий Озеров :
> Hmm... there are another options that must be set.. For default, tor
> won't use circuits, that have two nodes in one /16 subnet. Is it
> clear?
>
> 2009/4/8 slush :
>> Yes, Im attaching streams by myself. Should it be a r
Yes, Im attaching streams by myself. Should it be a reason for problems?
Marek
2009/4/8 Василий Озеров :
> Have you specified option in torrc:
>
> __LeaveStreamsUnattached=1
>
> ?
>
> 2009/4/8 slush :
>> Thanks to reply. For now, I found one exit, which do it perm
4661-4666
reject *:6346-6429
reject *:6699
reject *:6881-6999
accept *:*
router-signature
2009/4/7 Василий Озеров :
> I think, that the exit node of your circuit can't be exit node.
> Can you post servers descriptors wich are in the circuit?
>
> somet
Hi,
Im playing around Tor control port, own streams and own circuits. Im
surprised, that Tor sometimes say me "STREAM xxx is DETACHED from
circuit xxx" just few seconds after I obtain "SENTCONNECT" message. Do
anybody know why?
Im trying to build own circuit, but when Tor detach my stream in some
Hello,
full integration of Vidalia and Tor in Linux is very, very wanted.
Current status, where Vidalia controls own Tor process is not working
well for common user. Although I cannot participate on GSoC and I dont
know C++ so much, feel free to contact me with testing any changes you
will make. I
> Sudo /mnt/cdrom/presentation/encryptswap.sh or encryptswap_random.sh
Are these scripts available? These files arent in zip...
Interesting presentation. I will probably need another life to fulfill all
these tips :-).
Marek
On Tue, Mar 17, 2009 at 11:51 PM, Ringo Kamens <2600den...@gmail.com
Hello Matt,
Im interesting in your materials, because at this moment, Im working on
advocacy of Tor node on my university. So please send me a copy!
I think there are some materials about Tor advocacy, see
https://wiki.torproject.org/noreply/TheOnionRouter/TorGuideUniversities.
Merging all these
Eh, wrong mailbox :]. Marek
On Tue, Mar 17, 2009 at 9:41 PM, Marek Palatinus wrote:
> Thank you everybody. There were many good ideas. One of the worst solution
> is to close next and next exit ports, because by this, Tor will be closed
> network without bridges to Internet one day.
>
> I also t
project.org/tordnsel/index.html.en)
>
> Good luck!
>
> On Tue, Mar 17, 2009 at 01:18:10AM +0100, slush wrote:
> >Hi,
> >
> >Im running Tor on VPS and I have some problems with abusive Tor
> traffic.
> >Firstly, I had problem with DMCA and BitTorrents, so
Hi,
Im running Tor on VPS and I have some problems with abusive Tor traffic.
Firstly, I had problem with DMCA and BitTorrents, so I close non-HTTP(s)
ports and everything was OK for few months. Now, some dumbass wrote abusive
message to some web forum, which was reported to police. They located my
Hi Scott,
dont forget, that your's ISP last mile connectity is not sized for running
high-traffic servers. They count with aggregation, because dont expect many
users running any kind of server application. And I think there is nothing
illegal in their business. If you want to run fast server, ren
On Tue, Mar 10, 2009 at 3:20 PM, Gary Cooper wrote:
> Hi everyone,
>
> I've two questions :
>
> 1/ How can i reduce the time for changing route originally set to 10
> minutes? I can't find the line i am supposed to add in TORRC ?
Variable MaxCircuitDirtiness, integer in seconds.
Marek
As Roger wrote to list before few months, experimental version of Tor
optimizes RAM usage and I can confirm that. Before I switched to 0.2.1.x
branch, my node used +- 2x more RAM (not sure exactly).
ad "top": Dont forget to buffers and caches. So final amount of actually
used RAM by system is:
Use
Hello,
Im little bit confused with RAM usage of i686 box. Im running node with
almost same bandwidth and after 6 days uptime, Tor process consumes only
37MB. What is different? My Tor version is 0.2.1.12-alpha (r18423).
Marek
On Thu, Mar 5, 2009 at 8:27 PM, basile wrote:
>
> 1) node "simba" =
linode.com
But I dont want to propagate them in that way, because they probably dont
want to became a Tor hosting :-).
Marek
On Mon, Feb 23, 2009 at 5:27 PM, Andy Dixon wrote:
>
> I have subsequently cancelled my account with them.. Who do you use as a
> VPS provider..?
>
>
Tor FAQ: I have more than one CPU. Does this help?
Yes. You can set your NumCpus config option in torrc to the number of CPUs
you have, and Tor will spawn this many cpuworkers to deal with public key
operations in parallel.
nope, just one core is used by tor for aes crypto. So the "openssl speed
>
> You really don't need to send an HTML copy of your message to the list.
>
Im not doing that myself. It is done by Evil Google :-).
To rate limits: I worked on it today and it really changed immediately. Im
using 2.1.x branch, it can be a reason...
I will try to make screenshot, but curre
>
> Note also that when you do a non-emergency shutdown of tor, it will
> publish a new descriptor with a data rate of 0 to scare off any new
> attempts
> to contact the relay that is quiescing. (tor also closes its DirPort if
> that
> was open.)
>
Thank you for info. Well, it isn probably wh
>
> No one gets cut off when the rate is reduced. In fact, if you've ever
> tried reducing the rate with the BandwidthRate statement in torrc, you may
> have noticed that the actual data rate takes a while to slow down to the
> newly
> imposed limit.
>
I tried that today on my laptop relay wi
>
> Ich guess that it will not be a big issue to change from a low bandwidth
> situation
> to a high bandwidth. Maybe it will take a while before the information
> propagates,
> but that should be OK.
Agree.
> Maybe a solution would be to try a slow approach throtteling bandwidth: to
> stay wit
Hello Andy, simply change your VPS provider. I cannot imagine that my VPS
provider will stop services without any warning! Because Im running Tor on
production server with many other services, I'd like to kill him with some
painful way :-).
Marek
On Tue, Feb 17, 2009 at 4:22 PM, Andy Dixon wrote
Oh, also dont forget that openssl speed runs only on one core!
I tested it on my server 2x dualcore Xeon 3GHz and results:
type 16 bytes 64 bytes256 bytes 1024 bytes 8192
bytes
aes-128 cbc 92860.55k 120028.42k 130562.36k 132490.03k
135248.26k
aes-192 cbc 82
It is in kilo _bytes_, isnt it? I think 84MB/s isnt that bad result :).
[snip]
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes 1024 bytes 8192
bytes
aes-128 cbc 51108.77k68049.87k73548.62k73809.19k
75586.27k
aes-192
Hi, I discuss to running high capacity Tor node on my univerzity in Czech
Republic. There is plenty of connectivity during night, but less during day.
In asking you, if you see any problem in switching tor speed automatically
during day period.
More information:
Im using that on my home server. I
Great tip about torifying only connection to tracker. It works like a charm
in Deluge and I feel a little bit safer on torrents.
Thanks for interesting discussion.
Marek
>
> please, reply to my email from 8 or 9 months ago and help friends in the
> Iran to use tor riskless. You find my or-talk mail via google. Thanks.
>
He needs to get arround the exclemation mark problem.
> I asked him to use a proxy. But it seems that all
> known proxys - fast proxys - are more
>
> > Marco Bonetti
> > BT3 EeePC enhancing module: http://sid77.slackware.it/bt3/
> > Slackintosh Linux Project Developer: http://workaround.ch/
> > Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live/
> > My webstuff: http://sidbox.homelinux.org/
>
> People like you should be ban
>
> Yes, wow my English was pretty poor in that post, sorry. ;)
I think Im undestanding you :-).
I guess I misunderstood you, sorry. It sounded like you
> were suggesting that middle nodes treat such data
> differently. I guess you were only referring to exit
> nodes then?
>
Exactly!
Makes s
>
> >Disagree. I wrote _port_ oriented QoS, not _content_. There can be config
>
> is encrypted between the client and the exit
But not between exit and target (well, we are not speaking about tunelling
any kind of SSL connection).
> >option to prioritize some port (port range) above other. J
>
> > Simply I imagine that in same style like ExitPolicy. Did
> > you ask others, why
> > are they using ExitPolicies? I dont think so. It is part of
> > Tor and nobody
> > (as far as I know) is against - because it is free choice
> > of relay operator
> > which kind of traffic he will support.
>
>
> Well, that's what exit policies are for. As far as relay traffic goes,
> the more traffic my relay handles, the more useful my relay seems to be and
> the better it makes me feel about running a relay.
>
Well, me to.
> As has been discussed to death here many times already, there i
On Tue, Feb 17, 2009 at 10:00 AM, Scott Bennett wrote:
> Really? I know that seems to be in accord with the received wisdom
> on this list, but I, for one, no longer make that assumption. For one
> thing,
> my node spends most of the time handling somewhere between 15% and 50% of
> its
> pr
Umm, I probably dont undestand well. Should be there any speciality because
of Tor?
There is part of my firehol configuration related to Tor:
-
server_tor_ports="tcp/9001"
client_tor_ports="default"
server_tordir_ports="tcp/9030"
client_tordir_ports="default"
interface eth
Fortunately, I write thesis in my language, not English :-). 80% of work is
not about Tor. Part of the task is also writing Tor exit node scanner (I
wrote a little bit to or-talk about months - something like "soat"). If it
will be a little bit useful for Tor community, I will translate this part &
> You cannot check only once and then conclude anything from that. Tor
> network is really a place where you should do a statistical research
> as is almost as far from deterministic as it can be.
>
During last year of my playing with Tor network I did plenty of test in
different days, random circ
By the way, do you have any evidence for that? I read
http://www.securityfocus.com/news/6779, but I cannot find mentioned things
in source codes (http://anon.inf.tu-dresden.de/develop/jap.src.tgz).
There can be "backdoor" in cascades, of course, but it is similar situation
as "backdoor" (~ logging
agree that
this is not typical case, right?
Marek
On Fri, Feb 13, 2009 at 2:59 PM, slush wrote:
> Well, Firefox rendes HTML as fast as it is possible (instead of IE6), so I
> dont think it is the reason. You can also try wget or something - it takes
> hell long time to receive first b
Well, Firefox rendes HTML as fast as it is possible (instead of IE6), so I
dont think it is the reason. You can also try wget or something - it takes
hell long time to receive first byte of response and then it is fast enough.
Original question was very simple: Where is the main difference between
> http://www.securityfocus.com/news/6779
Thank you, important for my thesis.
But the Tor behaviour looks ok, according on how I understand it should
> work: the client will chain 3 ORs, the last one fetch the information and
> send it back on the chain. So, until everything is set up and the exi
Sorry for many typos...
that torrent stream is built once, request data on*C*e and lives for long
> time.
> WWW is much more about request/RESPONSE.
etc...
Marek
ring short-live streams (or generally
young streams) in dividing node throughtput will do miracles! I think
currently is Tor doing the right oposite...
Marek
On Fri, Feb 13, 2009 at 9:55 AM, slush wrote:
> I know that latency is the real reason of user experience. But my speed
> tests w
I know that latency is the real reason of user experience. But my speed
tests were averages for longer time and many requests. When I have faster
connection, but it feels much slower.
Tor:
request > . nthng for minute > page is loading in ten
seconds with all images (and bandw
Do you know it is same for JonDonym (paid service) as well? Probably yes,
but I cannot found any source, my german is worse than english :-)
Well, thanks to info. But it isnt relative with speed issue.
Marek
>
> The problem with JAP is that they are complying with the data
> retention laws.
>
>
Hello,
for my thesis, I tested speed of Tor and JAP (free service). Although JAP
was a little bit slower than circuits of Tor in benchmark tests, I was
surprised that JAP had much better user experience and acted as faster. So I
looked after reason and I think I found. JAP has almost constant thro
;
> On Tue, Feb 3, 2009 at 8:50 PM, slush wrote:
> > Yes, Im using linode.com, plan "Linode 720". Tor runs without any
> problem
> > (but my bandwidth is only about 150kB/s; there are another network
> services
> > too).
>
> Interesting. That is $40/mo
Yes, Im using linode.com, plan "Linode 720". Tor runs without any problem
(but my bandwidth is only about 150kB/s; there are another network services
too).
I received two DMCAs (some torrent sharing). Linode stuff was very polite,
but they said me they have to solve this. Because server is very im
Thank you for quick response.
> have terms against "running servers" in your TOS
Nop. It is server housing provider :-).
Marek
2008/12/27 Ted Smith
> See http://www.torproject.org/eff/tor-dmca-response.html.en , and
> http://www.torproject.org/eff/tor-legal-faq.html.en#DMCA . You should
> con
Hi,
today I receive message from my internet provider:
We have received a complaint in connection with the below-pasted details
from HBO regarding materials contained in the specified web site that are
infringing upon the claimant's intellectual property rights.
We are required by f
Nice solution!
Im looking forward docs, how to run system&Tor on this type of hardware.
Marek
No.
2008/12/19 Eugen Leitl
>
> This is off-topic, but isn't UDP making data retention more difficult
> than TCP/IP.
>
If I understood well, Psiphon is eye-catching installer for web proxy with
authentication. And without any standard way, how to obtain public list of
psiphonodes (~ Tor directory servers). If you are interested in this level
of "breaking censorship", consider http://samair.ru/proxy/ . Hundreds of
f
Hello Geoff,
thank you for posting. I see you solved problem by complicated way that I
wanted to do. In your case it is right decision, because your program is
much more complicated and you manage circuit/streams more complex. I tried
to do is simply, but it probably dont work :-).
So I used "you
statuses in my language, so Im sorry if "Connecting" and "Repeat" are
bad translations. But I dont know, why Tor cannot connect final destination,
because in Vidalia it seems to do so.
I will be very happy for any help.
Marek
2008/12/6 slush <[EMAIL PROTECTED]>
> I will
>
> use multiple threads (one to do the connect, and one to listen to Tor
> controller events and assign the stream to the circuit)
You are a genius! (An I'm and an idiot because I didn't found this solution
by self!)
I will post final solution after it will works. Currently there is at least
on
circuit.
More high-level, my problem is, that I dont know StreamID *before* I create
stream by calling socket.connect(), but it never finish, because of
deadlock. Is there any possibility to get stream id before this call or do
this call non-blocking?
Thanks,
Marek
The
2008/12/6 slush <[EMA
Next possibility is that some relay on path was stopped/restarted.
Personally it make me sense that network like Tor is not as stable as normal
Internet connection.
Marek
2008/12/6 <[EMAIL PROTECTED]>
> On Fri, Dec 05, 2008 at 10:53:18PM +0300, [EMAIL PROTECTED] wrote 1.3K
> bytes in 24 lines ab
Hi guys, I have quite special question. As I wrote many times before, Im
trying to do some utility in python using Tor. Currently, Im playing again
with core of utility - talking with Tor and downloading some files thru it.
Im trying to download HTTP file thru exact path (defined by router chain).
Hi, Im scared with these methods of Linux "marketing". I expect there is
something worse than national thinking. Are complete source codes of Red
Flag Linux available, so Internet cafes are able to compile it by self? If
yes, it should be quite easy (well, better, not impossible) to find major
diff
Hello,
is there any easy way, how to limit connections for Tor? Thousands of
connections often breaks my lowcost ADSL router at home and I have to
restart it.
I think it should be similar option like Bandwidth rate. Or is there any
reason, why there must be thousands of connection from point of T
I found another problem in torsocks bash script. There is missing backslash
in sed construction around ". torsocks off". More in googlecode issue
http://code.google.com/p/torsocks/issues/detail?id=1
Bye,
Marek
2008/10/26 slush <[EMAIL PROTECTED]>
> Hi,
>
> nice work! I
Doesn't matter for me, if Tor fails under Windows because Im using
mainstream :-). I will try it for week on my home server before running on
production.
Thanks,
Marek
2008/11/10 Roger Dingledine <[EMAIL PROTECTED]>
>
> Tor 0.2.0.x is somewhat more stable than 0.2.1.x-alpha in general. For
> exa
Hi Roger,
Im in same situation as Matt. Im running Tor exit on VPS, version 0.2.0.x.
So each MB of memory is quite bit expensive for me :). Do you personally
think that running 0.2.1.x (so experimental branch, but less memory usage)
on production machine is a good idea? Stability is the main issue
I didnt read Tor path selection very well, but I suppose, that exit nodes
which allow some special address are not preffered by tor clients. So
argument that whitelisting will raise network thoughput is problably false.
More in "path-specification" on
https://svn.torproject.org/svn/tor/trunk/doc/s
Thanks for post.
I know it is solution, but I prefer exit node, because I think it is more
universal (it can be used as middleman and also as exit).
There is no question about law (I think there is no problem in my country,
expecially when it is university server). It is only about people on
univ
>
>
> 1. 8 tor processes, each using separate spool directory
>
Btw, using more processes for one user is a little bit nasty. Of course, it
can raise up speed of browsing (because parallel processing), but it will
overload tor network (which is still overloaded). This can cause that every
user wil
Hi guys,
Im talking with teachers about running tor node on my university. There is
plenty of unused bandwidth, especially at night :-). But there are some
arguments against tor, so Im trying to find some solutions.
One of arguments was, that tor is used for downloading porn and p2p networks
and
I forgot to note, that all available control commands of tor are specified
in file /usr/share/doc/tor/spec/control-spec.txt or here
http://www.torproject.org/svn/trunk/doc/spec/control-spec.txt
Marek
2008/10/29 slush <[EMAIL PROTECTED]>
>
>
> 2008/10/29 Jonathan Addington &l
2008/10/29 Jonathan Addington <[EMAIL PROTECTED]>
> So my main question still is, where does Vidalia go for its list of IP
> addresses?
>
>
Try:
1) Run Tor, enable control port (9051) in your torrc
2) telnet localhost 9051
3) type:
AUTHENTICATE ""
GETINFO ns/all
let's parse ;-)
Marek
Hi,
nice work! I tried and works perfectly.
Just one typo. in src/usewithtor.in - there is missing # on line four. It
works, but print warning in runtime.
If is anybody interested, on
http://www.slush.cz/torsocks_1.0-beta-1_i386.deb is DEB package (made by
checkinstall tool) for Debian (tested o
2008/10/25 <[EMAIL PROTECTED]>
> On Fri, Oct 24, 2008 at 11:10:21PM +0200, [EMAIL PROTECTED] wrote 2.5K
> bytes in 49 lines about:
> : > as far as I read Tor documentation, I cannot find mechanism, how can be
> : > exit node marked as "Bad exit". Is there any standardized mechanism for
> : > detec
Any suggestion?
Thanks,
Marek
2008/10/23 slush <[EMAIL PROTECTED]>
> Hi all,
>
> as far as I read Tor documentation, I cannot find mechanism, how can be
> exit node marked as "Bad exit". Is there any standardized mechanism for
> detecting bad exits and marking t
Hi all,
as far as I read Tor documentation, I cannot find mechanism, how can be exit
node marked as "Bad exit". Is there any standardized mechanism for detecting
bad exits and marking them in directory servers?
I found one man's activity on tor forum (
http://xqz3u5drneuzhaeo.onion/users/badtorno
:).
Marek
2008/10/23 Mike Perry <[EMAIL PROTECTED]>
> Thus spake Roger Dingledine ([EMAIL PROTECTED]):
>
> > On Wed, Oct 22, 2008 at 10:42:27PM +0200, slush wrote:
> > > do anobody know, where I can found sources of TorCtl, which was months
> ago
> > > on ht
Hi,
do anobody know, where I can found sources of TorCtl, which was months ago
on https://www.torproject.org/svn/torflow/TorCtl/ ? It looks like Tor svn
structure has changed and I cannot find important library for my
application.
Thank you,
Marek
Thank you so much, it is exactly what I want. I didnt find that in docs.
Marek
2008/8/10 Nick Mathewson <[EMAIL PROTECTED]>
> On Sat, Aug 09, 2008 at 12:47:10PM +0200, slush wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA1
> >
> > Hi,
> >
&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
is there any possibility to tell Tor, that I dont want rotate circuits
(relays and exit nodes) every few minutes? I want to build circuits
(with notation host.node.exit) and use it long time (for good reason).
Thanx for help,
Marek
-BEGIN PG
>
> - Are you using Opera to Privoxy to Tor, or Opera directly to Tor?
Opera -> Privoxy -> Tor
> - Are bytes getting clobbered inside a given stream, or is Opera loading
> several streams and some of them are entirely the wrong bytes? For
> example, if you could fetch the page with wget and s
> OK, understood. I thought you had specified the Python code you were
> using.. it appears to use multiple exits.
>
Yes, I have to make tests, if bug depends on multiple exits or just on
number of circuits... But I think it should make somebody who knows Tor
better than me, because I cannot find
>
> At first sight this appears to be an exit node problem but then, as I
> read it, you say it occurs with more than one exit node and only at this
> "higher" level of throughput.
I can repeat this problem (I could do it yesterday) by opening large amount
of circuits between my computer and anot
,
Marek
On Thu, Jul 17, 2008 at 2:16 AM, slush <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hi all,
>
> I dont have better contact (I cannot find any bugzilla for Tor), but I
> have to say, that there is serious problem in Tor (using l
iD8DBQFIfwBnr7KgZiv8EokRAhPqAJ9AAqXridDS29CXudRICqPvu5PFywCgjZ3i
BnICmZm48Ehi9rOPjLEckmU=
=N8Qu
-END PGP SIGNATURE-
On Thu, Jul 17, 2008 at 8:38 AM, Roger Dingledine <[EMAIL PROTECTED]> wrote:
> On Thu, Jul 17, 2008 at 08:08:38AM +0200, slush wrote:
> > Tor did not stop serving me. He served me
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
It looks like you have DoSed some of the faster Tor relays out there,
and then Tor stopped working as well for you. Perhaps these were your
entry guards, so you were particularly strongly affected?
Tor did not stop serving me. He served me with errors
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
More information:
I tried to repeat this bug (really sorry for all relays operators).
I found that this part of python code breaks connection of standalone
browser.
for i in range(300):
ctl.extend_circuit(0,["sabotage", 'tortila'])
ctl.exten
Unfortunately, mail "mplsfox" is not registered as contact of any tor relay,
so if mplsfox dont say name of his exit node, there are no chance to get it.
There is only one exit node with contact on sneakemail.com:
Unnilquadium
but there not have to be any relationship, of course.
Marek
On Mon,
94 matches
Mail list logo