>> Since you are all tinkering with your servers anyway, why don't you try
>> deb822-style ;-)
>
> Because that doesn't make sense for public Tor nodes, but rather for .onion
> services.
> Many ISPs and providers have a Debian and Tor mirror and I use them via
> clearnet because reliability for
Hi,
>> wget
>> -qO-https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc
>> | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg
>> >/dev/null
>
> Is the name important?
I assume it's Debian? The onfiguration of the signing key and the repo is
c
>> On 27 Feb 2024, at 15:39, boldsuck wrote:
>> On Dienstag, 27. Februar 2024 14:52:00 CET Corl3ss via tor-relays wrote:
>>> On 26/02/2024 21:03, Toralf Förster via tor-relays wrote:
On 2/26/24 20:07, meskio wrote:
> At the moment we're
> looking for 10 new bridges for Lox.
If it ha
>> I have a relay on 152.53.17.183 / 2a0a:4cc0:1:1333::beef which is listed as
>> "German" in metrics.torproject.org, but actually it is in Austria
>
> Was just a topic here recently:
> https://lists.torproject.org/pipermail/tor-relays/2024-January/021472.html
>
> Ask geofeed from the provider an
Hello,
unfortunately this happens more often. you are not alone :-)
> Am 18.01.2024 um 20:50 schrieb NodNet :
>
> I think tor and Tor Project use IPFire's DB for GeoIP lookups, and
> 198.13.48.219 shows the following:
Yes, libloc/location is used. I had the same problem with one or two relays
> Am 01.11.2023 um 17:53 schrieb dewaj :
> [...]
> Who wants to be identified as a tor user, let alone a relay operator?
> […]
I don't like this attitude at all and I don't think it goes with the demands of
most operators either.
I have often heard on this list and elsewhere sentences like: "It
On 3/3/22 22:48, li...@for-privacy.net wrote:
On Donnerstag, 3. März 2022 16:40:42 CET Martin Gebhardt wrote:
I don't understand the analogy in his phrase. I'm not a native English
speaker.
Yes, I understand German better too.
I took a closer look at the site. Pretty hidden on
On 3/3/22 18:22, t...@nullvoid.me wrote:
Glowie is used as a slur* (kinda) against intelligence officers. Normally used for the
CIA but also used for agencies like the ATF, FBI, etc. Their inability to blend in to the
native population's habits, patterns and speech makes them stick out like a s
Hi
On 3/3/22 21:12, awffelwaffels via tor-relays wrote:
[..]
ffelwaffels via tor-relays:
I see on every exit node I check on the metrics page, a massive bump in
bandwidth used without a change in exit probability. Is this perhaps an
attacker squeezing the bandwidth of the network so people a
Hi Marco,
On 3/2/22 22:21, li...@for-privacy.net wrote:
On Mittwoh, 2. März 2022 00:57:26 CET Martin Gebhardt wrote:
[..]
I can't find any relays operated by them. Does anyone know which? Looks like a
ploy to me to find some dumbasses to fund Alphabay Market, Archetyp Market and
A
Hello all,
I don't know who of you is familiar with this, I just came across it a
few weeks ago. It's about tor-node.org.
It is probably a person who collects funds for the operation of Tor
infrastructure. Nothing wrong with that and I applaud that.
What you might find objectionable, but I
for a few days, I opened the topic in the
forum. If you are interested, you can see the way to solution here:
https://forum.torproject.net/t/torrc-unit-files-confusion/2217
--
Martin
On 2/18/22 15:24, li...@for-privacy.net wrote:
On Wednesday, February 16, 2022 8:07:21 AM CET Martin Gebhardt
Hi ,
I would try the following:
ExitPolicy accept [::]:20-21 # FTP, SSH, telnet
ExitPolicy accept [::]:23 # FTP, SSH, telnet
ExitPolicy accept [::]:43 # WHOIS
[..]
ExitPolicy reject *:*
I would recommend that you block outgoing email ports instead of trying
to block out all IPv4 traffic. I've
Hi Daniel,
On 2/10/22 09:19, Dan via tor-relays wrote:
[..]
Tor compiled with GCC version 8.3.0but tor@default.service is still running on
0.3.5.15 (I have restarted the service multiple times)...
Please show us the output of 'systemctl cat tor@defailt.service' and
'which tor'.
I assume yo
Hello all,
I would like to read about experiences with local laws of various
countries. So far I run my exits in Austria, Germany and the Netherlands.
I have found a provider for me that also covers the following countries
and has no problem with Tor exits:
- Poland
- Australia
- Singapore
-
Hello Marco,
On 2/7/22 01:45, li...@for-privacy.net wrote:
On Sunday, February 6, 2022 11:49:03 AM CET Martin Gebhardt wrote:
I explore various possibilities to deanonymize. My motives are solely
dedicated to the Tor project. I have configured a bridge and I know that
it is also possible to
Hey nusenu,
thanks for your quick reply.
On 2/6/22 17:18, nusenu wrote:
Hi Martin,
[..]>> 1. 2. to simplify the torrc, would it
not be advantageous to enter in "MyFamily" not all fingerprints, but
only that of the Family as such? Are there already suggestions for
this with the developers?
A
Hello,
I am running some servers in the Tor infrastructure for research reasons
and my own (mainly political) interest. I have a few questions, the
answer to which would help me a lot at the moment.
1. can someone explain to me how the fingerprint of a Family is created?
For example, I have
The problem has now been solved.
https://lists.ipfire.org/pipermail/location/2022-February/000523.html
On 1/24/22 18:31, nusenu wrote:
We run the update command daily and sync the data from it.
See: https://man-pages.ipfire.org/libloc/location.html
As far as I understand this should update th
On 1/21/22 12:15, Valters Jansons wrote:
> On Fri, Jan 21, 2022 at 1:05 PM Georg Koppen wrote:
>
> If you check the current lookup for the mentioned IP[2], it results in:
> - Network: 89.58.16.0/22
> - Announced by: AS197540 - netcup GmbH
> - Country: Austria
> This seems to be correct, like Mart
Hi,
in the past I had already written with someone about it. At that time
the entries were not up to date. There was a Gitlab issue about this,
but I can't find it now.
Anyway, the data is not up to date again.
Example: https://apps.db.ripe.net/db-web-ui/query?searchtext=89.58.17.76
vs
htt
21 matches
Mail list logo