would using bridges prevent the ISP from knowing that a person is using tor?
On Sat, Sep 10, 2011 at 1:04 AM, and...@torproject.org wrote:
On Thu, Sep 08, 2011 at 10:23:41PM +0100, pump...@cotse.net wrote 1.4K
bytes in 42 lines about:
:
Hi Andrew,
: Requests: Why? [1] from the Tor-talk mailinglist. Some believe (credits
: to @ly_gs for enlightening me) that the August 2011 spike in Tor users
: via bridges may be related to the Dutch police investigation on Tor
: hidden services hosting child pornography, which also took
I recently setup my own Tor relay, and its exciting!
Yes.
(1) I read in a recent list posting that paid private VPN services
provides no anonymity. According to some of those providers, they
don't keep any log of your connections. Is this just a marketing
gimmick, or are there other reasons
EVERYONE should be running NTP, of course, not the relatively few that do.
If you happen to still be on a windows machine, here is a FREE utility
And if you prefer the open source NTP standard that everyone else uses...
http://support.ntp.org/bin/view/Main/ExternalTimeRelatedLinks
And I'm
On Sat, Sep 10, 2011 at 08:20:39AM +0200, Matthijs R. Koot wrote:
: Requests: Why? [1] from the Tor-talk mailinglist. Some believe (credits
: to @ly_gs for enlightening me) that the August 2011 spike in Tor users
: via bridges may be related to the Dutch police investigation on Tor
:
On Sat, Sep 10, 2011 at 08:20:39AM +0200, k...@uva.nl wrote 1.8K bytes in 40
lines about:
: I know, mind the last part (see below) of my post, which was probably
: WAY too long. I'm wondering whether, in lack of a better explanation,
: the bridge spike might have been caused by undisclosed
On Sat, Sep 10, 2011 at 05:13:32AM +, moeedsa...@gmail.com wrote 4.5K bytes
in 111 lines about:
: would using bridges prevent the ISP from knowing that a person is using tor?
Yes. However, any analysis of the traffic using deep packet inspection
will show it is using encryption which is
For a while I've had my eye on a system that abuses the open nature of DNS
requests to tunnel data out of a firewalled / censored environment. It would be
interesting to see this implemented into tor bridges as an additional method of
circumventing blocking.
I can't think of any reason that
- Original Message -
From: and...@torproject.org and...@torproject.org
Sent: Saturday, September 10, 2011 2:29 PM
Subject: Re: [tor-talk] Dutch Police Investigation Tor Spike: Correlation
Or Also Causation?
The current rumors around this spike in bridge queries and usage is:
Hi
I've noticed in Ubuntu that when the computer is booted up and before I
connect to the web the computer needs the keyring password. No matter
whether I try to change my mac address that stupid keyring thing won't
let me do anything until it gets the answer it wants. So the password
is
It would be good to know what technologies these ISPs will implement to
do the packet inspection for encrypted tunnels. Half the problem is you
don't really know what they'll be looking for and so you don't know how
to circumvent.
Forgive my ignorance but why would there be any need to
On Sat, 2011-09-10 at 22:08 +0100, Matthew wrote:
It would be good to know what technologies these ISPs will implement to
do the packet inspection for encrypted tunnels. Half the problem is you
don't really know what they'll be looking for and so you don't know how
to circumvent.
On Sun, Sep 11, 2011 at 12:06:08AM +1000, har...@violaceo.us wrote 3.3K bytes
in 75 lines about:
: For a while I've had my eye on a system that abuses the open nature of DNS
requests to tunnel data out of a firewalled / censored environment. It would be
interesting to see this implemented into
I've noticed a lot of people that are concerned about privacy and
security are using Gmail accounts.
Do you really trust Google not to read your email and tell THE MAN what
you've been saying?
--
http://www.fastmail.fm - Access all of your messages and folders
On Saturday, September 10, 2011 9:55 PM, and...@torproject.org wrote:
On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K
bytes in 16 lines about:
: Forgive my ignorance but why would there be any need to inspect
: packets for tunnels? Would the authorities not just ask
15 matches
Mail list logo