deal of life.
Gumby
On 03/29/2017 05:47 AM, John Ricketts wrote:
Gareth,
Thank you for your response.
I can imagine how this could turn into Oil and Gas incident and I
certainly wouldn't want that for myself or anyone else. I'm still
debating the privacy of CC:ing the group. As the majority
Nice to finally see this...
"The encrypted email provider announced Thursday it will allow its users
to access the site through the Tor anonymity service.
The aim is to allow its more than 2 million users access the provider by
taking "active measures to defend against state-sponsored
update that allowed their "true" IP to be found -
then doxxed each one and posted the list of child porn frequenters from that?
Based on a scenario such as that - who CAN we trust? Who is actually "in the
circle of trust" - and who ain't?
Gumby
"We're from the government,
s entire Tor freedom concept become the field of
rich, unlimited bandwidth mavens?
And incidentally, those jocks would never had graduated if not for the
"nerds" that tutored them - the little guys provide a hell of a lot more
than people realize.
Gumby
On 12/22/2016 12:47 PM, Rana w
ewer Intel hardware?
Gumby
On 12/07/2016 02:35 PM, diffusae wrote:
On 07.12.2016 01:36, Duncan Guthrie wrote:
if some flaw was exploited in the various nasty proprietary bits that
make up the Pi, much of the network might be compromised - due to large
similarities across the different models,
Exits are badly needed, but is it economically feasible to change to a
relay? Based on your cost, and the ISP attitude to a relay only, does it
make sense to be a relay instead - and still provide for the Tor community?
I would be curious also to know if many of the ISP's have a higher
level
do you have the full xfinity system with security and wireless cameras?
that would be the encryption points probably - if you do.
Me
On 05/31/2016 05:27 PM, Percy Blakeney wrote:
I've recently taken her Dell out of her room and into mine. She knows
the rules and ALWAYS grabs me before
s always, ALWAYS, asked the same thing: "Unplug your
modem from your router." And each time I've had to tell them, I
don't have a separate modem, I have the Arris router/modem combo
that you gave me.
On Tue, May 31, 2016 at 5:15 PM, Gumby <i...@gumbyzee.torzone.net
Actually, looks like it used the 2.3.25 browser bundle. But it was
through emule file sharing. If he is legit, and I have concerns, could
the daughter download some old infected files - and was it network aware
enough to spread and infect a new Mint/Ubuntu?
New variant back to life, finding any
? questions arise out of the fog.
Sir Percy Blakeney - the Scarlet Pimpernel of fiction. cute.
sorry, just looking under the goat bridge,
Me
On 05/31/2016 04:31 PM, Mirimir wrote:
On 05/31/2016 01:34 PM, Gumby wrote:
That is a fairly old version of Tor to have installed.
On 05/31/2016 03:06 PM
That is a fairly old version of Tor to have installed.
On 05/31/2016 03:06 PM, Percy Blakeney wrote:
And this:
.
.
.
TorVersion Tor 0.2.4.27 (git-412e3f7dc9c6c01a)
CircuitBuildTimeBin 1175 1
CircuitBuildTimeBin 1275 1
CircuitBuildTimeBin 1375 1
CircuitBuildTimeBin 1525 1
CircuitBuildTimeBin
I am a tech, a good one, who also runs 2 relays from my shop. I have
found in client PC's many hidden things - such as proxys running for
malware delivery. They were totally unaware except for slow and losing
disk space. (Finding Tor running is a bit too extreme) I've also had two
clients that
I recently had some spare time, so sat looking at the list of connections in arm
just for S Most of the connections have fingerprints - but there are always a
few "unknown".
I run 3 relays on 2 different providers, one of them online over a year, and
list my family in torrc. Yet, several
13 matches
Mail list logo