On Sun, 16 Sep 2007 00:54:43 -0400 misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:
Please read the tor documentation. If you think you've already done
that, please go back and read it again.
That brings back the pain of reading it the
On Friday 14 September 2007 18:27:21 misc wrote:
I'm using Tor on windows
I prefer to avoid tor nodes from certain countries. I know that I can
manually add nodes into ExcludeNodes setting in Tor Config.
However there are over hundred different Tor nodes in one country I want to
exclude.
On Sun, 16 Sep 2007 08:42:32 +0100, Robert Hogan wrote:
TorK allows you to do this (in a rough and ready way using the geoip database
(maxmind.com) - about 9x% accurate). TorK is available only for Linux/BSD
unfortunately, but you could you use the Incognito LiveCD which uses TorK as
the
On Sun, 16 Sep 2007 17:18:49 -0400 misc [EMAIL PROTECTED] wrote:
On Sun, 16 Sep 2007 01:25:51 -0500 (CDT), Scott Bennett wrote:
I'd strongly recommend that you start with the tor overview
document at
https://tor.eff.org/overview
paying special attention to the cartoon
-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of misc
Sent: September 15, 2007 8:43 AM
To: or-talk@freehaven.net
Subject: Re: Exclude nodes from certain countries
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run a squid server on localhost with a block
On Sat, 15 Sep 2007 17:47:11 -0400 misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
www.pickaproxy.com
So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In other words users do not
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
Why would they waste their time? They will have already gotten copies
of what they want as it traveled in the clear between its origin and the web
server. Remember the news articles a while back about all those snoop boxes
My main criticism of pickaproxy is... why? Why do that when you can
program a tor controller to do exactly the same thing with a offline
database?
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Sat, 15 Sep 2007 17:57:51 -0500 (CDT), Scott Bennett wrote:
Why would
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run a squid server on localhost with a block by
country filter. Then, route your tor client through it.
Comrade Ringo Kamens
I researched it more and everybody is saying squid goes between the browser
and tor:
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
On 9/15/07, misc [EMAIL PROTECTED] wrote:
On Fri, 14 Sep 2007 19:47:56 -0400, Ringo Kamens wrote:
The best option is to run a
On Sat, 15 Sep 2007 21:39:17 -0400, Ringo Kamens wrote:
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
I know how to filter entry nodes. I can do it with Protowall or another
If Tor is never allowed to connect to certain nodes, and therefore doesn't
know about them, can they still be used as exit nodes?
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in question connected to you 20 seconds before
the alleged connection was
On Sat, 15 Sep 2007 21:39:17 -0400 Ringo Kamens [EMAIL PROTECTED]
wrote:
I don't think you get the problem here. Squid wouldn't be able to
affect the choice of exit nodes. It would just be able to filter entry
nodes.
Comrade Ringo Kamens
This is getting to be really irritatingly
On Sat, 15 Sep 2007 23:30:58 -0400 misc [EMAIL PROTECTED] wrote
On Sat, 15 Sep 2007 22:20:16 -0400, Ringo Kamens wrote:
AFAIK tor connects to an entry guard which then connects to the exit
node for you. This way, they can't take the logs from the exit node
and go well.. the IP in
On Sat, 15 Sep 2007 12:29:16 -0700, Wesley Kenzie wrote:
www.pickaproxy.com
So your server can see all the traffic in cleartext before it enters Tor
network AND where the traffic is coming from. In
other words users do not have any protection from your server.
If you have not been
On Sat, 15 Sep 2007 23:17:14 -0500 (CDT), Scott Bennett wrote:
Please read the tor documentation. If you think you've already done
that, please go back and read it again.
That brings back the pain of reading it the first time :)
I must admit I gave up after first few pages. I found it
The best option is to run a squid server on localhost with a block by
country filter. Then, route your tor client through it.
Comrade Ringo Kamens
On 9/14/07, misc [EMAIL PROTECTED] wrote:
I'm using Tor on windows
I prefer to avoid tor nodes from certain countries. I know that I can
manually
18 matches
Mail list logo