Hi, thank you very much. One thing I am also wondering;
http://torstatus.blutmagie.de/router_detail.php?FP=db1af6477bb276b6ea5e72132684096eee779d30
Only shows the read/write history in “bytes per second”. I am wondering, as I
am currently away from the computer that I am running my tor relay on
On Wed, May 9, 2018 at 2:06 PM, Trevor Ellermann wrote:
> I just a notification from my data center that someone is trying to hijack
> the IP of my exit node. Seems like the sort of thing someone might do when
> trying to attack Tor. I'm in a very remote area with limited access but any
> suggesti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Dear Trevor,
> I just a notification from my data center that someone is trying
> to hijack the IP of my exit node. Seems like the sort of thing
> someone might do when trying to attack Tor. I'm in a very remote
> area with limited access but any su
Hi,
I just a notification from my data center that someone is trying to hijack
the IP of my exit node. Seems like the sort of thing someone might do when
trying to attack Tor. I'm in a very remote area with limited access but any
suggestions on actions I should take?
Dear Keifer,
I'm seeing a stable flag on torland right now:
https://onionite.now.sh/node/DB1AF6477BB276B6EA5E72132684096EEE779D30
--torix
Sent with [ProtonMail](https://protonmail.com) Secure Email.
‐‐‐ Original Message ‐‐‐
On May 8, 2018 2:34 PM, Keifer Bly wrote:
> Hello, for some rea
On 2018-05-08 16:59, Jonathan Marquardt wrote:
On Tue, May 08, 2018 at 04:45:58PM +0200, Martin Kepplinger wrote:
How does a usable ipset (hash:ip,port) look like, so that it is a whitelist
for
in/out tcp connections? *Everything* else from/to the outside world is
assumed
to be dropped. (DNS too