On Sunday 03 Nov 2013 23:50:58 Lukas Erlacher wrote:
> Censor torrents because your provider will shut you down if you
> generate DMCA complaints and C&D's; censor them because you truly
> believe that the torrents are a necessary sacrifice to allow the Tor
> network to continue to function; don't
> your refusal to pay for content people create.
That's a silly smear.
> not related to tor
That's just plain silly.
Did you really enter this thread just to flame? That's also silly.
___
tor-relays mailing list
tor-relays@lists.torproject.org
https:/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I don't think this is the right place for you to try and justify your refusal
to pay for content people create. I think most people on this list would prefer
you keep political opinions not related to tor off list.
Cheers
Ramo
On Sun, Nov 03, 2013
Let me chime in here in regards to torrents to be perhaps not the
devil's, but the radical's advocate.
I'm sure everyone here will agree that a good case can be made that
copyright laws as they stand today are a perversion of, and
counter-productive to, their original stated intention of "advancem
On 11/03/2013 at 6:51 AM, Moritz Bartl wrote:
> Where did you copy that policy from?
It is the default policy that was installed with Vidalia.
> A more conservative approach would be whitelisting, ie. Only
> allow specific ports while blocking all others. The "reduced
> exit policy" is such a whi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Staples:
> I am also running on a Pi Model B, 512MB RAM. How are you logging
> SYNs?
Ah yes, that's right.
You will find all the magic (very pre-alpha at the moment - it's
iptables commands in /etc/rc.local) in contrib/90_slowboards as part
of
I am also running on a Pi Model B, 512MB RAM. How are you logging SYNs?
On Sun 03 Nov 2013 11:25:26 AM EST, Gordon Morehouse wrote:
> * *BEGIN ENCRYPTED or SIGNED PART* *
>
> Dan Staples:
>> This morning I got my first Tor traffic flood since upgrading to
>> 2.4.x. Logs didn't say
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dan Staples:
> This morning I got my first Tor traffic flood since upgrading to
> 2.4.x. Logs didn't say anything about not being able to handle the
> amount of circuit creation requests, but it showed a 200x increase
> in active TAP circuits (~400k/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Paritesh Boyeyoko:
> On Friday 01 Nov 2013 14:39:28 Gordon Morehouse wrote:
>
>> Completely aside from the ethical and censorship-related buzzsaw
>> you're about to run into for posting this (perennial) question, I
>> believe some actual developers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
starlight.201...@binnacle.cx:
>> The question is, should I put in an adjustment for
>> 'MaxAdvertisedBandwidth' during the backup window or make any
>> other change to advise remote relays to de-prioritize the node
>> for the duration?
[snip]
> So t
This morning I got my first Tor traffic flood since upgrading to 2.4.x.
Logs didn't say anything about not being able to handle the amount of
circuit creation requests, but it showed a 200x increase in active TAP
circuits (~400k/hour) and the traffic pattern is the same: Advertising
100kb bandwidth
On Saturday 02 Nov 2013 22:30:00 t...@tafb.xxx wrote:
> I'm new to running a relay. There are lots of exit policies when I look at
> my atlas details:
> https://atlas.torproject.org/#details/DDB401F4CA108C6F6AF4E0DCE2DFC3407F577
> B21
>
> Is this a pretty good exit policy list to prevent harassmen
On 11/03/2013 03:30 AM, t...@tafb.xxx wrote:
> I'm new to running a relay. There are lots of exit policies when I
> look at my atlas details:
>
https://atlas.torproject.org/#details/DDB401F4CA108C6F6AF4E0DCE2DFC3407F577B21
> Is this a pretty good exit policy list to prevent harassment from my ISP?
Gordon Morehouse:
> Paul Garrett Hugel:
> > Please steer me to the correct list if off topic here
> >
> > Remote machine is Ubuntu obfsproxy bridge on amazon ec2 using ARM
> >
> > My local machine running 10.9 Mavericks with
> > TorBrowser-Pluggable-Transports-2.4.17-beta-2-pt3-osx-i386
> >
> >
14 matches
Mail list logo