Re: [tor-talk] (FWD) ISC Update: StoryMaker

2014-08-01 Thread Nathan Freitas
On 08/02/2014 01:22 AM, Roger Dingledine wrote: > An interesting-sounding success story of Tor in action -- and so well > integrated that people barely even mention Tor. :) It is all my fault! I think every app would love to have a standard, easy way to include a "powered by Tor" or "works with

[tor-talk] (FWD) ISC Update: StoryMaker

2014-08-01 Thread Roger Dingledine
An interesting-sounding success story of Tor in action -- and so well integrated that people barely even mention Tor. :) (Sorry for the horrible user-specific tracking links. You all get to be me I guess.) --Roger - Forwarded message from The ISC Project - Date: Fri, 1 Aug 2014 22:21:1

Re: [tor-talk] 'relay early' attack logging at the infrastructure level?

2014-08-01 Thread Roger Dingledine
On Fri, Aug 01, 2014 at 09:37:02PM +, Nusenu wrote: > > On July 30th, 2014 arma said: It will indeed kill circuits if it > > sees an inbound (towards the client) relay_early cell. > > > > It doesn't have to decrypt the stream to see it, because whether a > > cell is relay or relay_early is a

[tor-talk] 'relay early' attack logging at the infrastructure level?

2014-08-01 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 quoting from [1] > On July 30th, 2014 Anonymous said: Suppose my relay is running > 0.2.4.23, and suppose it's the middle hop between adversary's guard > node and adversary's hidden service directory. Will it kill > circuits sending relay_early ce

Re: [tor-talk] Why make bad-relays a closed mailing list?

2014-08-01 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 >>> Does anyone want to argue against making who we flag and why >>> public? >> >> Would be great to also hear about >> >> "Does anyone want to argue against making who we reject >> (AuthDirReject) and why public?" (if the above question doesn't

[tor-talk] Is there an accepted doling rate for the size or bandwidth of the Tor network?

2014-08-01 Thread Virgil Griffith
Theoretically you could look at the historical data from the beginning of time and fit an exponential curve to it and see what it comes out to, but I suspect there is an accepted/established answer to this question. If not, references to the data for me to calculate it would be helpful. -V -- to

Re: [tor-talk] Why make bad-relays a closed mailing list?

2014-08-01 Thread Damian Johnson
>> Does anyone want to argue against making who we flag and why >> public? > > Would be great to also hear about > > "Does anyone want to argue against making who we reject > (AuthDirReject) and why public?" > (if the above question doesn't include that already) It does. Rejection is just another

[tor-talk] new tab in tbb (cli)

2014-08-01 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Micah, Micah wrote (https://twitter.com/micahflee/status/495250082288001024): > Anyone know how to open a new tab in an already-open Tor Browser > window in Linux? you might like: https://lists.torproject.org/pipermail/tor-talk/2014-July/033848

[tor-talk] TorCitadel: Testers with RaspberryPi needed for torified network of mail/jabber servers

2014-08-01 Thread Rene Bartsch
Hi, I've created a Howto (https://trac.torproject.org/projects/tor/wiki/doc/TorCitadel) to run a decentralized network of home-made torified mail/jabber servers. Instead of entrusting your mail some unknown hidden service mail operator you just run your own mail server on a Raspberry Pi at

Re: [tor-talk] Why make bad-relays a closed mailing list?

2014-08-01 Thread Nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 > Does anyone want to argue against making who we flag and why > public? Would be great to also hear about "Does anyone want to argue against making who we reject (AuthDirReject) and why public?" (if the above question doesn't include that already)

Re: [tor-talk] Why make bad-relays a closed mailing list?

2014-08-01 Thread Damian Johnson
> I think this is a really important point. > > I'm usually on the side of transparency, and screw whether publishing > our methods and discussions impacts effectiveness. > > But in this particular case I'm stuck, because the arms race is so > lopsidedly against us. > > We can scan for whether exit

[tor-talk] Tor-ramdisk 20140801 released

2014-08-01 Thread Anthony G. Basile
Hi everyone I want to announce to the list that a new release of tor-ramdisk is out. Tor-ramdisk is an i686 or x86_64 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Security is enhanced by hardening the k