On 7/5/14, Moritz Bartl mor...@torservers.net wrote:
The legal FAQ is a legal FAQ. It is still completely legal in all
countries we know of. It is not the how you should behave and what is
the worst case scenario FAQ: That is
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines
On 07/05/2014 07:30 AM, Zenaan Harkness wrote:
I'm not sure the TorExitGuidelines provide an adequate
Behaviour FAQ, in the hindsight of recent events.
Again: There is no hindsight of recent events. There just can't be,
because the court opinion has not been released yet.
It has always been
On Fri, Jul 4, 2014, at 11:42 PM, ideas buenas wrote:
Do a Whois lookup of the addreses I gave u before and check that all of
this resolve to markmonitor. s3-us-west-2-w.amazonaws.com
amazonaws.com is registered with Markmonitor, yes: The 'registrar' is
MarkMonitor, Inc and the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 07/05/2014 11:13 AM, grarpamp wrote:
On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski
pze...@gmail.com wrote: i2p does have 'exits' you can compare to
tor as well. Anyone can run an exit. But users have first find one
on a wiki list or
On 7/5/14, Moritz Bartl mor...@torservers.net wrote:
On 07/05/2014 07:30 AM, Zenaan Harkness wrote:
HE WAS NOT CONVICTED BECAUSE OF RUNNING AN EXIT.
Every single character of any of the emails in this thread are PURELY
ASSUMPTIONS.
Thanks.
- Node operators (relays, entries and exits) are
On Sat, Jul 5, 2014 at 12:36 AM, isis i...@torproject.org wrote:
Ergo, as Jacob has pointed out to me, the regexes which are released should be
assumed to be several years out of date, and also shouldn't be assumed to be
representative of the entire ruleset of any deployed XKS system.
The
I have a small site. Smaller than 1M if zipped. It is static. And it
probably won't get much traffic. So 20Gb storage and 200Gb bandwidth are
pointless in my case. I would like no ads, no tracking for the reader,
faster, good uptime, and so on.
What would you recommend? What do you use? Free of
I have a small static site bundle on my hard drive. I want to get it up
to some provider. Which protocol to use? It's only HTML, CSS and a
couple of PNGs.
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change
On 7/5/14, Red Sonja
bm-2ctpedtadjx2bqf6wuux1cper78sq3x...@bitmessage.ch wrote:
I have a small static site bundle on my hard drive. I want to get it up
to some provider. Which protocol to use? It's only HTML, CSS and a
couple of PNGs.
It is _so_ easy to give advice that could get you in
n 7/5/14, Red Sonja bm-2ctpedtadjx2bqf6wuux1cper78sq3x...@bitmessage.ch wrote:
I have a small site. Smaller than 1M if zipped. It is static. And it
probably won't get much traffic. So 20Gb storage and 200Gb bandwidth are
pointless in my case. I would like no ads, no tracking for the reader,
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets, however we shouldn't do anything that will hurt our users nor
should be
On 05 Jul 2014, at 15:08, Roman Mamedov r...@romanrm.net wrote:
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hey Folks!
I would like to quote from the XKeyscore code (1)(2):
// START_DEFINITION
/*
These variables define terms and websites relating to the TAILs (The
Amnesic Incognito Live System) software program, a comsec mechanism
advocated by extremists
Bobby Brewster:
Currently, my Tor use model is as follows:
Me (TBB in Ubuntu) --- VPN --- Tor (entry node) --- Tor network
I could, instead, do:
Me (TBB Ubuntu VM) --- VPN (configured in VM) --- Tor (entry node) --- Tor
network
However, from what I've read, there isn't really any
On 07/05/2014 05:28 AM, Joe Btfsplk wrote:
On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello Tor!
Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his
if your non-VM host system has been compromised, there is absolutely no
notable advantage to using a vm. your vm will be affected by the
malware that sits on the host system.
I don't understand this. If my Ubuntu system has a virus / rootkit / whatever
then what I do on it is compromised.
On Sat, 5 Jul 2014 10:05:10 -0700
Bobby Brewster bobbybrewster...@yahoo.com wrote:
if your non-VM host system has been compromised, there is absolutely no
notable advantage to using a vm. your vm will be affected by the
malware that sits on the host system.
I don't understand this. If
17 matches
Mail list logo