Please steer me to the correct list if off topic hereRemote machine is Ubuntuobfsproxy bridge on amazon ec2 using ARMMy local machine running 10.9 Mavericks withTorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386I read the trouble ticket
On 11/01/2013 07:22 PM, Nelson wrote:
Please excuse my ignorance operating Tor relays, but if I run an exit
node on Windows 7 and use something like Peerblock and correspoding
block lists of P2P sites, wouldn't this be somewhat effective in
stopping this sort of undesired traffic on Tor?
On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote:
Publication of sample exit policies? Would that encourage exit node
operators
to run restricted exit policies, and save themselves loads of bandwidth and
DMCA headache?
Is there a forum where one can put up a sticky post with sample exit
On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote:
What if someone inside a totalitarian state is attempting to upload
evidence of a massacre to a service which runs on port 80?
Yeah, I did think of this but I thought I'd put it out there anyway.
Unfortunately, too many sites/services
On Saturday 02 Nov 2013 13:21:39 Moritz Bartl wrote:
On 11/02/2013 01:15 PM, Paritesh Boyeyoko wrote:
Publication of sample exit policies? Would that encourage exit node
operators to run restricted exit policies, and save themselves loads of
bandwidth and DMCA headache?
Is there a forum
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Paul Garrett Hugel:
Please steer me to the correct list if off topic here
Remote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARM
My local machine running 10.9 Mavericks with
On 11/02/2013 02:46 PM, Paritesh Boyeyoko wrote:
I'm just finding it difficult to accept that there's little to be done. As
far
as I can see, the only way BitTorrent content distibution can work across Tor
is because exits are allowing accept *:* as their exit policy - torrent
clients
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Paritesh Boyeyoko:
On Friday 01 Nov 2013 20:02:29 Gordon Morehouse wrote:
What if someone inside a totalitarian state is attempting to
upload evidence of a massacre to a service which runs on port
80?
Yeah, I did think of this but I
The question is, should I put in an adjustment for
'MaxAdvertisedBandwidth' during the backup window
or make any other change to advise remote relays to
de-prioritize the node for the duration?
Another unanswered question now understood:
As a consequence of a simple parameter tweak,
Vidalia
On Saturday 02 Nov 2013 17:10:50 Moritz Bartl wrote:
As one of the large operators that indeed allows exiting on all ports
except 25: This is on purpose. I don't consider applications that choose
random ports as bad, I don't consider file sharing per se as bad. I
don't want to interfere with
On Friday 01 Nov 2013 14:39:28 Gordon Morehouse wrote:
Completely aside from the ethical and censorship-related buzzsaw you're
about to run into for posting this (perennial) question, I believe some
actual developers on Tor have written a paper about the problems with
Bittorrent et al (and I
Putting the extensive exit restriction policy in the responses to take-down
demands seems like a good idea.
Robert
Publication of sample exit policies? Would that encourage exit node
operators
to run restricted exit policies, and save themselves loads of bandwidth
and
DMCA headache?
I'm new to running a relay. There are lots of exit policies when I look at my
atlas details:
https://atlas.torproject.org/#details/DDB401F4CA108C6F6AF4E0DCE2DFC3407F577B21
Is this a pretty good exit policy list to prevent harassment from my ISP?
Thanks!
-Jamie M.
Putting the extensive exit
13 matches
Mail list logo