On 08/02/2014 01:22 AM, Roger Dingledine wrote:
> An interesting-sounding success story of Tor in action -- and so well
> integrated that people barely even mention Tor. :)
It is all my fault!
I think every app would love to have a standard, easy way to include a
"powered by Tor" or "works with
An interesting-sounding success story of Tor in action -- and so well
integrated that people barely even mention Tor. :)
(Sorry for the horrible user-specific tracking links. You all get to be
me I guess.)
--Roger
- Forwarded message from The ISC Project -
Date: Fri, 1 Aug 2014 22:21:1
On Fri, Aug 01, 2014 at 09:37:02PM +, Nusenu wrote:
> > On July 30th, 2014 arma said: It will indeed kill circuits if it
> > sees an inbound (towards the client) relay_early cell.
> >
> > It doesn't have to decrypt the stream to see it, because whether a
> > cell is relay or relay_early is a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
quoting from [1]
> On July 30th, 2014 Anonymous said: Suppose my relay is running
> 0.2.4.23, and suppose it's the middle hop between adversary's guard
> node and adversary's hidden service directory. Will it kill
> circuits sending relay_early ce
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
>>> Does anyone want to argue against making who we flag and why
>>> public?
>>
>> Would be great to also hear about
>>
>> "Does anyone want to argue against making who we reject
>> (AuthDirReject) and why public?" (if the above question doesn't
Theoretically you could look at the historical data from the beginning of
time and fit an exponential curve to it and see what it comes out to, but I
suspect there is an accepted/established answer to this question.
If not, references to the data for me to calculate it would be helpful.
-V
--
to
>> Does anyone want to argue against making who we flag and why
>> public?
>
> Would be great to also hear about
>
> "Does anyone want to argue against making who we reject
> (AuthDirReject) and why public?"
> (if the above question doesn't include that already)
It does. Rejection is just another
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Micah,
Micah wrote (https://twitter.com/micahflee/status/495250082288001024):
> Anyone know how to open a new tab in an already-open Tor Browser
> window in Linux?
you might like:
https://lists.torproject.org/pipermail/tor-talk/2014-July/033848
Hi,
I've created a Howto
(https://trac.torproject.org/projects/tor/wiki/doc/TorCitadel) to run a
decentralized network of home-made torified mail/jabber servers.
Instead of entrusting your mail some unknown hidden service mail
operator you just run your own mail server on a Raspberry Pi at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> Does anyone want to argue against making who we flag and why
> public?
Would be great to also hear about
"Does anyone want to argue against making who we reject
(AuthDirReject) and why public?"
(if the above question doesn't include that already)
> I think this is a really important point.
>
> I'm usually on the side of transparency, and screw whether publishing
> our methods and discussions impacts effectiveness.
>
> But in this particular case I'm stuck, because the arms race is so
> lopsidedly against us.
>
> We can scan for whether exit
Hi everyone
I want to announce to the list that a new release of tor-ramdisk is out.
Tor-ramdisk is an i686 or x86_64 uClibc-based micro Linux distribution
whose only purpose is to host a Tor server in an environment that
maximizes security and privacy. Security is enhanced by hardening the
k
12 matches
Mail list logo