-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04/07/15 10:55, David Serrano wrote:
On 2015-07-02 09:40:31 (+0200), Karsten Loesing wrote:
Julius and I have been working on a design mockup for the
ExoneraTor service for the past few months and would want to hear
what you think about this:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/07/15 14:20, teor wrote:
On 5 Jul 2015, at 19:37 , Karsten Loesing
kars...@torproject.org wrote:
Results: do we really need the Exit: yes column? Seems pretty
redundant to me.
I think this is answered later in this thread. We should
On 5 Jul 2015, at 23:26 , Karsten Loesing kars...@torproject.org wrote:
Also, there seems to be 24 rows with white background, then 24
with light grey bg. If the search returns eg. 30 results, then
only the last 6 would be in grey, and users could potentially
think there's something
On 5 Jul 2015, at 19:37 , Karsten Loesing kars...@torproject.org wrote:
Results: do we really need the Exit: yes column? Seems pretty
redundant to me.
I think this is answered later in this thread. We should probably
keep that column. Not sure if exiting to at least one of the two
Hi all,
I run a Tor exit node, and I received an abuse complain from Webiron.
In this mail, I can read the following:
If you run a VPN, anonymizer service (like a TOR exit or proxy node),
or business intelligence not contracted with the site owner, then we
request that the targeted range be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I receive the Webiron abuse complaints too. You can opt-out of their
e-mails as I personally also do not like restricting access to
specific networks.
For the relays I run which are in a SWIP-ed IP range redirecting the
abuse to myself I just
To add to this, it might be worth noting that they will likely block (or
attempt to block) your IP address from their network regardless of if
you add their network to you exit policies. What this will mean is that
anyone attempting to access their network through your exit node will be
met
On 07/05/2015 07:21 PM, Patrick ZAJDA wrote:
I know I can block this IP range by adding it to my exit policy, but I
would like to know how others exit node operators manage these type of
requests, because I ask myself if it is not against tor philosophy to
block access to a specific network to
On Sun, Jul 5, 2015, at 02:26 PM, Karsten Loesing wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 05/07/15 14:20, teor wrote:
On 5 Jul 2015, at 19:37 , Karsten Loesing
kars...@torproject.org wrote:
Actually, how about we use the same definition as for the Exit flag?
Hi,
Usually those are automated messages. I get them all the time as well.
They are just relaying abuse messages. The text in their message is
standard, and includes all cases so to say. If you scroll down the
email, you will see the target IP and few logs. Usually this is the
result of automated
10 matches
Mail list logo