Let me rephrase:
Do I follow the steps outlined by Webiron or just ignore them?
I had always intended to respond to the ISP.
On 29.1.16 2:11, Josef 'veloc1ty' Stautner wrote:
Hi,
you ISP opened that ticket so you answer the ISP.
~Josef
Am 29.01.2016 um 03:31 schrieb 12xBTM:
My ISP just
Hi,
I responded them the first few times. After I got angry about automated
abuse I ignored them.
Just answering your ISP is fine.
~Josef
Am 29.01.2016 um 15:01 schrieb 12xBTM:
> Let me rephrase:
>
> Do I follow the steps outlined by Webiron or just ignore them?
> I had always intended to
Thanks!
On Jan 29, 2016 1:08 AM, "Louie Cardone-Noott" wrote:
>
> If I've understood your question: press i and select 1 second, then
> enter.
>
> Press h for other keyboard options.
>
> On Fri, 29 Jan 2016, at 12:17 AM, SuperSluether wrote:
> > How would I change the
On 01/29/2016 05:34 AM, Pat Scharmer wrote:
> So the duplicate DNS responses has returned. Any thoughts on what would
> cause duplicate DNS responses? I'm running unbound with DNSSEC activated
> and it is using the root name servers as the upstream resolvers.
Wild guess, but I'd suspect a
Hi Josef,
actually I complained to Webiron once for their Spamming and they put me
on a "list" of recipients to which they not send emails.
It worked after their second attempt :-)
Generally spoken we have an autoreply on our abuse-ripe address. When
someone then replies again we really look
On 01/29/2016 03:01 PM, 12xBTM wrote:
> Do I follow the steps outlined by Webiron or just ignore them?
We didn't ignore them at first but answered why we think that kind of
measure is not useful nor appropriate. Since they ignored us, we started
to ignore their purely informational reports, too.
What does it change that webiron know or doesn't know if you have seen
those f*cking abuse email?
My exit node IP is listed as having an email sent to abuse@... and I
never received any email at abuse@...
I might be missing something but who cares about webiron? I care about
what my ISP
It was more of an idea to disrupt whatever they are trying to build.
They actually banned our email server (which does not share its IP with
Tor) so even if we reply to their shitty mails, we can't get off their
list anymore... hah
On 30.01.2016 02:26 AM, Operator AnonymizedDotio1 wrote:
We quickly have created a poc to prevent their webbug of being useful:
https://github.com/TheSchokomilchFoundation/IronFist
IronFist will parse their latest JSON data (by downloading it via a Tor
connection if a Tor-socks is available on 127.0.0.1:9050)
It then generates a list of all current