I would second the Raspberry Pi as a Tor relay/bridge.
Very low power consumption and no noise too boot!
On Fri, Apr 18, 2014 at 5:47 AM, Chris Whittleston wrote:
> Hey Robert,
>
> Thanks for your interest in setting up a relay! I see you've already had
> some replies to your questions but le
Same thing here.
I had a server from day one with them and was told "Sorry you've been with
us from the start.
But after careful consideration, Crissic Solutions LLC has decided to ban
the usage of TOR on the Crissic network."
On Sun, Jan 12, 2014 at 11:29 AM, Steve Snyder wrote:
> On 01/03/2014
Thanks for the reply Andy.
I'll try changing the sources.list first.
If that doesn't work I found the armel sources, so I can just compile them.
Richard
On Sat, Nov 16, 2013 at 8:51 PM, Andy Isaacson wrote:
> On Sat, Nov 16, 2013 at 12:09:50PM -0500, Richard Budd wrote:
> &g
Does anyone know if the Tor Project has sources for top that can be
compiled on a Udoo Dual?
It's running Ubuntu 11.10 (oneiric) on a ARMv7 processor.
I've tried following the instructions on
https://www.torproject.org/docs/debian, but I get an Err
http://deb.torproject.org/torproject.org/ expe
ing else so I'll
let it run till it gives up. (it's been running for over 70 days)
On Sat, Aug 31, 2013 at 2:20 PM, Gordon Morehouse wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Richard Budd:
> > I'm seeing the same on all 5 of my non-exit nodes,
I'm seeing the same on all 5 of my non-exit nodes, they are spread around
the US and EU.
It seems that they all are running at close to max bandwith for the last
several days also.
On Sat, Aug 31, 2013 at 1:14 PM, Jeroen Massar wrote:
> On 2013-08-30 20:39, Yoriz wrote:
> [..]
>
> > Aug 29 23:1
If you are just talking about regular server hacking attempts, and you are
using debian, tben try demyhosts and have it query the demyhosts server
every hour or so. It will download a list of known attacking ips
On Aug 2, 2013 3:41 PM, "Bryan Carey" wrote:
> Is there any kind of compiled list
I have several Tor relays running on VPS providers around the world (the 7
bucks a month kind). Most have around 5 to 6 meg a second bandwidth
available.
Would it be more useful for the Tor system to change a few of them over
to obfuscated bridges?
___
Saw your P.S. as I finished my reply.
I've got 2gig of swap on the SD card, so even if it's slow memory maybe
that helps my system.
Richard
On Sat, Jun 1, 2013 at 5:08 PM, Richard Budd wrote:
> I've had no problems with the stock raspbian. However I've only got 720kb
&
n Sat, Jun 1, 2013, at 12:43 PM, Richard Budd wrote:
>
> Don't know how common this is but I've had a Pi running for 35 days 6
> hours (so far). With over 80GB transferred on my half assed comcast cable
> connection.
> Not bad for $25 a credit card sized board sitting in a ca
Don't know how common this is but I've had a Pi running for 35 days 6 hours
(so far). With over 80GB transferred on my half assed comcast cable
connection.
Not bad for $25 a credit card sized board sitting in a cardboard box in my
broom closet.
I think I'm going to give one to everyone of my family
Tor will use many unblocked ports for outbound traffic I'm guessing.
I think that dd-wrt will open any port that Tor requests if you use port
triggering.
On Sun, May 12, 2013 at 4:45 PM, Daniel Wu wrote:
> I just started a relay (non-exit node, not running a client myself), on
> Windows, using
12 matches
Mail list logo