-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Sorry to respond to this late, but some advice I received from my
legal team not long ago might help on this. I apologise in advance
that I won't be able to disclose the whole letter of it but some of
the stuff contained within it is legally
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I think this is from the Lizard Squad attempted (and miserably failed)
sybil attack. The directory authorities will need to remove the ASN
from the blacklist.
T
On 20/08/2015 06:00, Greg wrote:
Hi, I tried to spin up a relay on GCE a few days ago,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Are they all on the same IP address? You can only have 2 relays per IP
address.
T
On 24/06/2015 15:22, TORnet Zone wrote:
Really need some help here, just cannot find the answer.
I've been running 2 middle relays for a year now, from a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Have there been any updated ETAs concerning the development/support of
multi-core for the core tor workloads? If not, is there anything in
particular that I could do to speed the process up? Scaling the
capabilities of the Tor process would be a huge
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mine are still operational if the primary tor project ones have any
difficulties:
https://globe.thecthulhu.com
And the hidden service for it:
http://globe223ezvh6bps.onion
They run their own Onionoo backends so if the main one has troubles,
it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey all,
I am just doing some planning for my own exits at the moment and
researching the legal provisions and experience for a variety of
jurisdictions. If anyone has any experience of raids as a result of
running a Tor relay or other legal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Having discussed this with my partner earlier today, I am curious as
to what knowledge the community might have on overclocking a CPU or
using other speciality hardware to create an ultra fast Tor relay. I
am aware of what IPredator have done but I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Directory Authorities,
Can you please remove the following fingerprints/IP's from the
blacklist as per my previous updates in tor-talk.
D78AB0013D95AFA60757333645BAA03A169DF722
6F545A39D4849C9FE5B08A6D68C8B3478E4B608B
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Assuming the court returns my passport in the court session I have
later today, I will be available to answer any questions on the
operations of such in the UK and on how to handle law enforcement
given the unfortunate volume of encounters I've had
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Mirimir:
On 12/22/2014 07:44 PM, Thomas White wrote:
Assuming the court returns my passport in the court session I
have later today, I will be available to answer any questions on
the operations of such in the UK and on how to handle law
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ask your upstream to filter their reports if you can, I can testify I
have received in excess of 300 complaints from them and ironically,
they ignored all of my responses to them for the first 200 or so I
responded to.
Ultimately (if you'll excuse my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yes there are safe harbour provisions.
When it comes to civil issues, for example DMCA (Digital Millennium
Copyright Act) issues, it is worth considering DMCA title 11 Online
Copyright Infringement Liability Limitation Act (OCILLA USA Law) as
the
Already working on it (see
https://trac.torproject.org/projects/tor/ticket/13421)
Will involve a lot of outreach and will need to consider lots of
jurisdictions but it can be done with a few volunteers over the next few
weeks I feel. I may also be proposing on trac a @torproject.org email
for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well the topic has come up several times in the last day or two on IRC
and generally the feeling is that it may be quite bad for the users of
the product, not necessarily the Tor network however.
One thing that AnonBox does do is increase Tor network
in the hands of people riding the wave following
the NSA fallout in hope for profit and not actual innovation.
- -T
On 15/10/2014 15:51, Andrew Lewman wrote:
On 10/15/2014 08:00 AM, Thomas White wrote:
I am personally hoping somebody high up in the Tor Project
management will openly condemn
I will open this up on trac tomorrow and go about with a few proposals
of how exactly to redesign it. If Tor is to scale we'll need to consider
a few factors as the reasonable expectation is for both the list to
continue to grow and that if it is made easier to use, that it will be
used more often
, Lunar wrote:
Thomas White:
Anyone with access to create a new page on the list and we can
add subsections to a new page containing the dated responses from
each company on their policy towards Tor hosting.
Sounds like a good idea but anybody working on this should keep in
mind that diversity
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I fully agree. I proposed a while back to try work on sortable tables
and to make the entire thing table based with factual information and
then have a column for anecdotal comments.
As a community I think we should also be more transparent in
Agreed with the above. If you run more than a single exit I would
further recommend that you try to diversify the exit location, IP ranges
and ISP if you can. That's not a huge issue if it's only a few servers
being run, but if you begin to process over 125MB/s of traffic overall,
it's best to
[2]
https://github.com/DonnchaC/oniontip/blob/master/scripts/payment-check.py
On Sun, 2014-09-28 at 02:32 -0700, Mike Perry wrote:
Thomas White:
Hmmm... appears to be have been upgraded since I last checked
then (which was only a few weeks ago!). Nicely done oniontip. I
stand corrected
I have a server that can be used but I'd rather not personally maintain
it so if somebody can manage it, I can provide the hardware connection.
-T
On 28/09/2014 18:24, Karsten Loesing wrote:
On 28/09/14 16:00, George Kadianakis wrote:
Thomas White thomaswh...@riseup.net writes:
My concern
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hmmm... appears to be have been upgraded since I last checked then
(which was only a few weeks ago!). Nicely done oniontip. I stand
corrected.
On 28/09/2014 03:28, Ed Carter wrote:
The process is completely transparent. All Bitcoin transactions
info on these too?)
Regards,
Thomas White
On 25/09/2014 08:21, Mike Perry wrote:
I really need identity fingerprints to see how much traffic your
node is actually pushing, what its consensus weight is, when and
how often it is hibernating, if it is otherwise strangely rate
limited, etc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Well one thing to note is that setting a bandwidth rate means you
could significantly underutilise your bandwidth capabilities, as
opposed to an overall cap. Also to consider the bandwidth on offer, I
would personally set it to use as much bandwidth
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Don't run a relay from your own IP address. Pretty standard advice
there sorry regardless if it's an exit or non-exit. I guess the people
at Apple simply downloaded every Tor server IP and put no effort into
reading the differences between types of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I receive several DDOS's per month, between 5 and 10 (I suspect that
is because I run a higher volume of relays than most so don't take
that as a normal figure). I have a 20Gbps connection with my ISP and
Tor uses perhaps 4Gbps of it so the DDOS's
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd be wary of Online.net - they are proactively against Tor and will
close your account without a refund very probably, even just relays
who aren't exits.
i3d.net look good. I would recommend Snel.com (my host), Leaseweb or
OVH but they all already
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mike Hearn,
Simple. If you start filtering anything at all, regardless of what it
is (yes, even if you filter child porn or fraud sites) then I will
block any connection of your relays to mine (which are exits and
guards totally 4Gbps). There are
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Michael,
First of all thank you for running an exit. I run a large series of
exits in the Netherlands
(https://globe.torproject.org/#/search/query=Chandlerfilters[country]=nl)
and I am a UK citizen. Having experienced many troubles, including
server
29 matches
Mail list logo