Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-05 Thread Zenaan Harkness
On 7/5/14, Moritz Bartl mor...@torservers.net wrote: The legal FAQ is a legal FAQ. It is still completely legal in all countries we know of. It is not the how you should behave and what is the worst case scenario FAQ: That is https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-05 Thread Moritz Bartl
On 07/05/2014 07:30 AM, Zenaan Harkness wrote: I'm not sure the TorExitGuidelines provide an adequate Behaviour FAQ, in the hindsight of recent events. Again: There is no hindsight of recent events. There just can't be, because the court opinion has not been released yet. It has always been

Re: [tor-talk] (no subject)

2014-07-05 Thread Geoff Down
On Fri, Jul 4, 2014, at 11:42 PM, ideas buenas wrote: Do a Whois lookup of the addreses I gave u before and check that all of this resolve to markmonitor. s3-us-west-2-w.amazonaws.com amazonaws.com is registered with Markmonitor, yes: The 'registrar' is MarkMonitor, Inc and the

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-05 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07/05/2014 11:13 AM, grarpamp wrote: On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski pze...@gmail.com wrote: i2p does have 'exits' you can compare to tor as well. Anyone can run an exit. But users have first find one on a wiki list or

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-05 Thread Zenaan Harkness
On 7/5/14, Moritz Bartl mor...@torservers.net wrote: On 07/05/2014 07:30 AM, Zenaan Harkness wrote: HE WAS NOT CONVICTED BECAUSE OF RUNNING AN EXIT. Every single character of any of the emails in this thread are PURELY ASSUMPTIONS. Thanks. - Node operators (relays, entries and exits) are

Re: [tor-talk] [liberationtech] messing with XKeyScore

2014-07-05 Thread Maxim Kammerer
On Sat, Jul 5, 2014 at 12:36 AM, isis i...@torproject.org wrote: Ergo, as Jacob has pointed out to me, the regexes which are released should be assumed to be several years out of date, and also shouldn't be assumed to be representative of the entire ruleset of any deployed XKS system. The

[tor-talk] Which tor friendly provider is more helpful?

2014-07-05 Thread Red Sonja
I have a small site. Smaller than 1M if zipped. It is static. And it probably won't get much traffic. So 20Gb storage and 200Gb bandwidth are pointless in my case. I would like no ads, no tracking for the reader, faster, good uptime, and so on. What would you recommend? What do you use? Free of

[tor-talk] What protocol to use for uploading a site to a provider?

2014-07-05 Thread Red Sonja
I have a small static site bundle on my hard drive. I want to get it up to some provider. Which protocol to use? It's only HTML, CSS and a couple of PNGs. signature.asc Description: OpenPGP digital signature -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change

Re: [tor-talk] What protocol to use for uploading a site to a provider?

2014-07-05 Thread Zenaan Harkness
On 7/5/14, Red Sonja bm-2ctpedtadjx2bqf6wuux1cper78sq3x...@bitmessage.ch wrote: I have a small static site bundle on my hard drive. I want to get it up to some provider. Which protocol to use? It's only HTML, CSS and a couple of PNGs. It is _so_ easy to give advice that could get you in

Re: [tor-talk] Which tor friendly provider is more helpful?

2014-07-05 Thread Zenaan Harkness
n 7/5/14, Red Sonja bm-2ctpedtadjx2bqf6wuux1cper78sq3x...@bitmessage.ch wrote: I have a small site. Smaller than 1M if zipped. It is static. And it probably won't get much traffic. So 20Gb storage and 200Gb bandwidth are pointless in my case. I would like no ads, no tracking for the reader,

Re: [tor-talk] messing with XKeyScore

2014-07-05 Thread Roman Mamedov
On Sat, 5 Jul 2014 03:59:28 + Matthew Finkel matthew.fin...@gmail.com wrote: This problem makes me sad on many levels, and I'm not opposed to implementing mitigation techniques (within reason) based on the rulesets, however we shouldn't do anything that will hurt our users nor should be

Re: [tor-talk] messing with XKeyScore

2014-07-05 Thread Sebastian Hahn
On 05 Jul 2014, at 15:08, Roman Mamedov r...@romanrm.net wrote: On Sat, 5 Jul 2014 03:59:28 + Matthew Finkel matthew.fin...@gmail.com wrote: This problem makes me sad on many levels, and I'm not opposed to implementing mitigation techniques (within reason) based on the rulesets,

[tor-talk] TORrorist Shirt from Pirate Party Luxemburg

2014-07-05 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey Folks! I would like to quote from the XKeyscore code (1)(2): // START_DEFINITION /* These variables define terms and websites relating to the TAILs (The Amnesic Incognito Live System) software program, a comsec mechanism advocated by extremists

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-05 Thread Tempest
Bobby Brewster: Currently, my Tor use model is as follows: Me (TBB in Ubuntu) --- VPN --- Tor (entry node) --- Tor network I could, instead, do: Me (TBB Ubuntu VM) --- VPN (configured in VM) --- Tor (entry node) --- Tor network However, from what I've read, there isn't really any

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-05 Thread Benedikt Gollatz
On 07/05/2014 05:28 AM, Joe Btfsplk wrote: On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-05 Thread Bobby Brewster
if your non-VM host system has been compromised, there is absolutely no notable advantage to using a vm.  your vm will be affected by the malware that sits on the host system.  I don't understand this. If my Ubuntu system has a virus / rootkit / whatever then what I do on it is compromised.

Re: [tor-talk] Benefits of Running TBB in a VM?

2014-07-05 Thread Roman Mamedov
On Sat, 5 Jul 2014 10:05:10 -0700 Bobby Brewster bobbybrewster...@yahoo.com wrote: if your non-VM host system has been compromised, there is absolutely no notable advantage to using a vm.  your vm will be affected by the malware that sits on the host system.  I don't understand this. If