Mix+TB Test:
Running TB 24.1.0 with TorBirdy 0.1.1 under Linux. No issues. Default
settings, no other extensions.
It probably works, but I expect it to be broken for some preference
settings (not the important ones) and the account manager because of the
changes introduced in TB 24. Long story
Thanks
I found this discussion on the subject
https://blog.torproject.org/category/tags/anonymity
Will try to read through it thoroughly later tonight.
DC
Please keep the replies civil. I know there is one in every crowd. Don't be
that one.
On 02/11/2013 11:16 AM, Mirimir wrote:
On
antispa...@sent.at:
If TorBirdy 0.1.2 has support for Thunderbird 24, can I just leave my
current configuration and just upgrade the TorBirdy plugin? As far as I
can tell, all the connections of Thunderbird 24 are made through Tor,
less the DNS part.
When you say configuration, which
I got to speak with my acquaintance about his experience. Sadly It was as
bad but not as quick as I was told.
He told me within a three week period of setting up the tor exit node he
considered his entire internal network compromised as several of his
machines showed signs of being
On 01/11/2013 12:39 AM, mick wrote:
On Thu, 31 Oct 2013 17:59:39 +1030
DeveloperChris developerch...@rebel.com.au allegedly wrote:
Could exit nodes act as caches. I know that would introduce a number
of issues including a compromised exit node revealing what was
retrieved by that node (but
On 11/2/2013 2:33 AM, DeveloperChris wrote:
I got to speak with my acquaintance about his experience. Sadly It was
as bad but not as quick as I was told.
He told me within a three week period of setting up the tor exit node he
considered his entire internal network compromised as several of
On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
There's a whole circuit between the HS and the rendezvous point. You'd
have the same problem as trying to deanonymize a client from a subverted
exit node.
Actually, technically, the analogy would be trying to deanonymize a
client
On Sat, Nov 02, 2013 at 05:49:57AM -0400, Roger Dingledine wrote:
On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
There's a whole circuit between the HS and the rendezvous point. You'd
have the same problem as trying to deanonymize a client from a subverted
exit node.
On Sat, Nov 02, 2013 at 10:46:38AM +1030, DeveloperChris wrote:
I just reviewed the tor hidden services page. so I am pretty green
about the way it works.
From the description I gather this
When a client wants to connect to a hidden service an introducer
picks a random rendezvious
It's a nice idea to suggest he joins the list.
I'll drop the hint, but this guy is not one to participate in online
discussions in any meaningful fashion. He is very security conscious and
does not have any form of traceable online presence as it is. But he may
come in under a pseudonym.
On 02/11/2013 8:19 PM, Roger Dingledine wrote:
On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
Snip
Actually, technically, the analogy would be trying to deanonymize a
client from a subverted website.
The Tor client running the hidden service picks its own three hops,
so it's
Hi,
On 11/01/2013 07:49 PM, Joe Btfsplk wrote:
I could add TBB, vidalia and Tor.exe to KIS's do not monitor
application's activity and / or do not scan (this application's)
network activity list, but that defeats purpose of having the protection.
What kind of protection do you expect from
I like to start a conversation about secure email provider... If I
start new email provider now, how to guarantee security and privacy
for user?
Before becoming a secure e-mail provider, first you should understand
how users can best protect themselves.
Users should not relay outbound
On Sat, 02 Nov 2013 03:46:33 -0400
Michael Wolf mikewol...@gmail.com allegedly wrote:
I think if this conversation is to progress beyond Tor got someone's
network hacked - No, it probably it didn't, we'll need some
specifics.
Seconded.
I think until those facts are known, we're just
t...@lists.grepular.com:
1) Create a list of tor exit nodes that do not block port 25
2) Command the tor daemon to exit those nodes exclusively.
Is this really necessary? Tor will automatically honor any exit relays's
exit policy and use another exit having that port open instead?
--
On 11/2/2013 6:08 AM, Moritz Bartl wrote:
What kind of protection do you expect from this, anyway?
Wow, I don't know. Having a rough night / day?
Could be a weird KIS bug affecting TBB, *that stopping / restarting KIS*
somehow fixes it temporarily (consistently). That'd be fairly unusual.
Hi Joe!
I'm answering off-list, because it seems out of focus of the community there
and while I understand the need/necessity/advantage/etc. of opensource-sw in
certain cases, I'm not a *nix-nazi and one of my machines uses windows and
KIS2013. I'm also not eager to out myself with this to
On Sat, 02 Nov 2013 15:15:41 +0100
freek2...@yahoo.de freek2...@yahoo.de allegedly wrote:
I'm answering off-list, because it seems out of focus of the
community there and while I understand the
need/necessity/advantage/etc. of opensource-sw in certain cases, I'm
not a *nix-nazi and one of my
mick m...@rlogin.net schrieb:
On Sat, 02 Nov 2013 15:15:41 +0100
freek2...@yahoo.de freek2...@yahoo.de allegedly wrote:
I'm answering off-list, because it seems out of focus of the
community there and while I understand the
need/necessity/advantage/etc. of opensource-sw in certain cases,
On 11/02/2013 02:27 PM, Joe Btfsplk wrote:
Don't expect too much help here [from Moritz].
Well, not from some, anyway. LOL :)
Hey hey, no reason to become hostile. I wrote the mail, which I consider
help. Help in making you understand why nobody really interacted with
you over this issue the
Hello,
Nice to be here.
I’am working on a Android project.
I try to launch tor (Orbot 12.05 already installed ) via the console/terminal
I don’t want the graphical interface so “users” can mess with it.
(orbot is working perfect via the gui)
Does anyone have the exact syntax to start on a nexu
On 13-11-02 02:54 AM, DeveloperChris wrote:
On 01/11/2013 12:39 AM, mick wrote:
On Thu, 31 Oct 2013 17:59:39 +1030
DeveloperChris developerch...@rebel.com.au allegedly wrote:
Could exit nodes act as caches. I know that would introduce a number
of issues including a compromised exit node
On Sat, 2 Nov 2013 13:50:18 +0100
t...@lists.grepular.com wrote:
1) Create a list of tor exit nodes that do not block port 25
2) Command the tor daemon to exit those nodes exclusively.
SSL-SMTP configured to works over 465 port in most cases.
--
tor-talk mailing list -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Windows Yes.
SMTP over ssl/tls is configured on port 25. Starttls, aca submission, is
configured for port 587
unknown unkn...@pgpru.com schrieb:
On Sat, 2 Nov 2013 13:50:18 +0100
t...@lists.grepular.com wrote:
1) Create a list of tor exit
Hi,
Your information is precious.
I am experimenting problems with TorBrowser on the last months.
On most of the web sites I have to reload it 2 to 8 times until it
loads, receiving most of the times messages like this:
Unable to connect
Firefox can't
Can someone explain how this new check differs from the last one please? I
don't have the time to compare the code right now.
Thanks.
On Thu, Oct 31, 2013 at 3:40 PM, Luther Blissett lbliss...@paranoici.orgwrote:
On Wed, 2013-10-30 at 01:37 +, antispa...@sent.at wrote:
On 29.10.2013
Hi,
For some days now I'm playing with the Tor source code and trying to get a
better understanding of it. Also read all the documentation on
volunteering. I'm looking for a way to get involved with its development
but it's not clear for me how to get the ball rolling.
If you are a Tor (core)
i want to know how do i configure tor on my jailbroken iphone if i am
already using proxy for using internet. also i have access to torrc
configuration files on my iphone.
so please help me to configure tor
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other
28 matches
Mail list logo