On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
http://www.cnx-software.com/2013/11/22/49-safeplug-tor-router-let-you-browse-the-net-anonymously/
)
I think these kind of devices configured
I very rarely (if ever) comment on this list (I like to read and
learn). That said, I've been looking into building a TOR router using
Pi. This is because I have elements within my home that are
technically inept and thus are a danger to themselves and everyone
else (ageing parents...what can
On Fri, 22 Nov 2013 06:25:33 -0500
Sean Alexandre s...@alexan.org wrote:
On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
On Fri, Nov 22, 2013 at 07:04:00PM +0600, r...@romanrm.net wrote 2.5K bytes in
0 lines about:
: On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
: https://pogoplug.com/safeplug
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds
On Fri, 22 Nov 2013 10:56:55 -0500
and...@torproject.is wrote:
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds more clients to the network without
giving back in the form of relays or bridges.
If these are all real people using and getting
On 21/11/2013 5:08 AM, Katya Titov wrote:
Roger Dingledine:
But TBB in the background will still fetch
https://check.torproject.org/RecommendedTBBVersions
to decide if you need to upgrade without telling anybody your version.
So yes, the answer is that pretty soon the check website won't be
On 22/11/2013 4:50 AM, Roman Mamedov wrote:
https://pogoplug.com/safeplug
Someone should buy this and post a teardown. :)
(via
http://www.cnx-software.com/2013/11/22/49-safeplug-tor-router-let-you-browse-the-net-anonymously/
)
I too would be interested in seeing how this actually works.
* on the Fri, Nov 22, 2013 at 08:38:40AM -0500, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most of their
Mike Cardwell:
* on the Fri, Nov 22, 2013 at 08:38:40AM -0500, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most
On 11/22/2013 05:38, krishna e bera wrote:
When people are switched over to Tor without their informed enthusiastic
consent, they are likely in for disappointment and you are in for a lot
of tech support calls. Some websites will be blocked and most of their
internet use will be much slower
On 11/22/2013 05:49 PM, Ed Fletcher wrote:
On 21/11/2013 5:08 AM, Katya Titov wrote:
This is something that I have also wondered about. Why go outside of
the Tor network to check that you're using Tor?
A hidden service adds extra hops to hide the (location of the) service.
There's some
Thanks Mick, I'll look into it
2013/11/20 tor-talk-requ...@lists.torproject.org
Send tor-talk mailing list submissions to
tor-talk@lists.torproject.org
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Mark McCarron:
It will not be a fork. Anything I do will be submitted for inclusion in the
main branch when ready.
Quite a number of the changes I mentioned are in the pipeline anyway.
In this case, thank you for helping make tor better.
--
tor-talk mailing list -
On Fri, 22 Nov 2013 10:45:35 -0800
Yuri y...@rawbw.com wrote:
Also, without the device being open source (and how can it really be?)
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design level, but
they could post source-code for the firmware with the instructions
On 2013-11-22 15:56, and...@torproject.is wrote:
On Fri, Nov 22, 2013 at 07:04:00PM +0600, r...@romanrm.net wrote 2.5K
bytes in 0 lines about:
: On Fri, Nov 22, 2013 at 04:50:44PM +0600, Roman Mamedov wrote:
: https://pogoplug.com/safeplug
Out of all the concerns about how they implemented
On 11/22/2013 11:35, Roman Mamedov wrote:
Why can't it be?
Well, maybe not the whole device down to the CPU Verilog design level, but
they could post source-code for the firmware with the instructions to build
and flash it, and since most likely this contains at least the Linux kernel
and some
Moritz Bartl:
On 11/22/2013 05:49 PM, Ed Fletcher wrote:
This is something that I have also wondered about. Why go outside
of the Tor network to check that you're using Tor?
A hidden service adds extra hops to hide the (location of the)
service. There's some movement towards allowing
I bought an early pogoplug device.
It was advertised as a means to provide safe and secure file access.
This model allowed connecting one's external hard drive via a USB port
and connecting via ethernet to WAN thru their infrastructure which
ostensibly provided authentication and access
Yuri:
How can one be sure that firmware that is running on the router is
built from this particular source code and not from some modified
version or different revision?
Hashes?
The ability to build it from sources?
If you search you can find a few other solutions.
Also how can one be
On 11/22/2013 10:35 PM, Katya Titov wrote:
The advantage that I see is that is there is no way to directly access
a .onion site without using Tor, so it is a clear indicator that Tor is
in use, visible to the user.
TBB 3.0 works under the assumption that it can either access websites
and is
On Tue, Nov 19, 2013 at 09:41:40PM -0600, jonasbru...@gmail.com wrote 1.2K
bytes in 0 lines about:
: with me and fill it out. It would mean a lot to me, my research - and
: eventually to people using Tor and similar services.
:
: This is the link: https://www.surveymonkey.com/s/DBYBDZL
I
and...@torproject.is wrote:
Out of all the concerns about how they implemented it and such, my
main concern is that it just adds more clients to the network without
giving back in the form of relays or bridges. Or at least, none of
their documentation mentions the ability to share freedom and
Hello,
I just see the options StrictExitNodes and StrictEntryNodes is deprecated?
What is the correct syntax now to use fixed entry nodes and fixed exit
nodes?
Thank you
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To
On Sat, Nov 23, 2013 at 07:35:54AM +1000, Katya Titov wrote:
The advantage that I see is that is there is no way to directly access
a .onion site without using Tor, so it is a clear indicator that Tor is
in use, visible to the user.
Not necessarily. Imagine a local network attacker who sees
On Sat, Nov 23, 2013 at 04:19:20AM +, anonymous coward wrote:
Hello,
I just see the options StrictExitNodes and StrictEntryNodes is deprecated?
What is the correct syntax now to use fixed entry nodes and fixed exit
nodes?
EntryNode $9695DFC35FFEB861329B9F1AB04C46397020CE31
ExitNode
On Nov 23, 2013, at 6:19 AM, anonymous coward anonymous.cow...@posteo.de
wrote:
Hello,
Hi,
I just see the options StrictExitNodes and StrictEntryNodes is deprecated?
The correct syntax is:
EntryNodes {node, node, ...}
StrictNodes 0 or 1 #0 for disabled
For more information about how
26 matches
Mail list logo