On 04/10/14 00:27, Mike Perry wrote:
> CJ:
>> Hello!
>>
>> just a small update regarding orWall: it's released 1.0.0!
>> There's still *one* annoying issue regarding the tethering, but it
>> should be OK next week. Just have to take some time in order to debug
>> this for good.
>>
>> orWall provide
[embarrassed]
even better. avoiding youtube is a good idea anyway.
On Oct 3, 2014, at 11:03 PM, I wrote:
> It was here too with others.
>
> https://media.torproject.org/video/
>
> Robert
>
>> https://www.youtube.com/watch?v=-hZZNFQm1Vs
>>
>> more social and political change data but with mor
It was here too with others.
https://media.torproject.org/video/
Robert
> https://www.youtube.com/watch?v=-hZZNFQm1Vs
>
> more social and political change data but with more examples than the
> previous video mentioned regarding the very real dangers involved trying
> to speak one's beliefs in
i've started another torcloud account on amazon but received my invoice for the
1st torcloud node
it really is free under the amazon cutoff bandwidth !
nice
torcloud is capped to 40GB which is a $3max per month using the right location
(virginia east i think).
i used the same credit card for b
found it here
https://www.youtube.com/watch?v=8NxTFDDdjd4
at about 10:35
DMCA takedown seems to have killed the study
questions as to how that data was gathered. had to "tap" an exit node
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
ht
this video addresses tor and tor in media gap (at least in part)
also examples of enforcement using tor to do their jobs.
"bad people use tor" raised again.
consequences removing tor and constrasted in different scenarios early in talk
https://www.youtube.com/watch?v=8NxTFDDdjd4
--
tor-talk mail
1
Greg Curcio
On Fri, Oct 3, 2014 at 6:10 PM, stn wrote:
> https://www.youtube.com/watch?v=-hZZNFQm1Vs
>
> more social and political change data but with more examples than the
> previous video mentioned regarding the very real dangers involved trying to
> speak one's beliefs in an oppressive r
so cool in kalifornia
Greg Curcio
On Fri, Oct 3, 2014 at 4:22 PM, I wrote:
> Through Glenn Greenwald
>
> > hey guys how can i communicate with mr S on here to discuss a possible
> > movie deal in the coming years
> >
> > Greg Curcio
>
>
> --
> tor-talk mailing list - tor-talk@lists.torproject.
https://www.youtube.com/watch?v=-hZZNFQm1Vs
more social and political change data but with more examples than the previous
video mentioned regarding the very real dangers involved trying to speak one's
beliefs in an oppressive regime. worse case death.
writeup
Published on Aug 30, 2013
Tor d
Through Glenn Greenwald
> hey guys how can i communicate with mr S on here to discuss a possible
> movie deal in the coming years
>
> Greg Curcio
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman
yes they have allot of good usage data tied to political and social change and
censorship methods.
in other videos too i believe. if you have time keep obtaining the vidoes and
watching if you can.
you'll learn allot. don't be afraid of "hacker" conference videos on tor.
lots of good tor
CJ:
> Hello!
>
> just a small update regarding orWall: it's released 1.0.0!
> There's still *one* annoying issue regarding the tethering, but it
> should be OK next week. Just have to take some time in order to debug
> this for good.
>
> orWall provides now a brand new UI in order to be easier to
thank you very much for this and the article! I also found this video
http://vimeo.com/8023776 around & after the 23 minute mark there are some
graphs of user numbers in Iran and China over a particular period, during
times of political upheaval (but no information about what the users were
doing).
i found this ref regarding appropriate analysis on tor given the recent threads
and interest. might be dated with a 2010 pub date..
http://dl.acm.org/citation.cfm?id=1894882
[...]
The Tor network is one of the largest deployed anonymity networks, consisting
of 1500+ volunteer-run relays and
The deadline for comments is Oct 17.
This isn't going to fit on my plate in this timeframe, but if anybody
here has partially written ideas that they want to put together into a
submission, please do!
--Roger
- Forwarded message from Jed Crandall -
Date: Thu, 02 Oct 2014 16:23:28 -0600
i don't believe this is the video with the short lived DoJ study reference.
sorry about that.
but this video tutorial contains allot of content related to "tor is evil if
only tor disappeared" ...
at about 40:23 for the start of "evil alice user"
https://www.youtube.com/watch?v=BBHcIvMoRMs
it's
i wish i could recall which talk it was. i've watched so many without taking
notes recently as a quick study aid.
sorry about that.
On Oct 3, 2014, at 8:48 AM, z9wahqvh wrote:
> thank you, this is exactly the sort of thing I was looking for. I'll see if
> I can find it in one of Roger's v
In the man page description of
"HiddenServiceAuthorizeClient auth-type client-name,client-name,..."
we read
"Valid client names are 1 to 16 characters long and only
use characters in A-Za-z0-9+-_ (no spaces)."
but it doesn't say where to find the client-name.
Is it a hash ? How can I create it
Well, this thread went nowhere fast. Sorry guys! And thanks to people who
emailed me. Cheers.
On Fri, Oct 3, 2014 at 9:18 AM, Lunar wrote:
> Derric Atzrott:
> > There are some strong ethical questions in logging all traffic from a
> > relay, but I can't see any other way to get this sort of data
Very clear and very helpful !!!
I'm testing both "HiddenServiceAuthorizeClient" and PKI.
Thank you all !
Lluís
Spain
On 10/03/2014 05:09 PM, coderman wrote:
> On 10/3/14, Lluís wrote:
>> I understand that for "clients" you mean client processes as:
>> apache, httpd, etc.
>>
>> Right ?
>>
>> If
On 10/3/14, Lluís wrote:
> I understand that for "clients" you mean client processes as:
> apache, httpd, etc.
>
> Right ?
>
> If that so, which is the point on specifying policies as
>
> "reject 2.2.2.2:80" ???
by clients i typically mean Tor Browser, users behind Transparent Tor
Proxy, etc.
b
I understand that for "clients" you mean client processes as:
apache, httpd, etc.
Right ?
If that so, which is the point on specifying policies as
"reject 2.2.2.2:80" ???
Lluís
Spain
On 10/03/2014 04:23 PM, coderman wrote:
> On 10/3/14, Lluís wrote:
>> ...
>> SocksPolicy policy,policy,...
>>
On 10/3/14, Lluís wrote:
> ...
> SocksPolicy policy,policy,...
>
> Being "policy" the same form as exit policies.
>
> Since I can "reject" anyone but me, this will act as a kind of
> a firewall for hidden services. Am I right ?
this is not correct; think of SocksPort as a way for clients to use
t
Derric Atzrott:
> There are some strong ethical questions in logging all traffic from a
> relay, but I can't see any other way to get this sort of data.
The answer to the ethical question is simple: this is plain wrong. You
don't spy on people.
But there's also a legal aspect to it: in many juris
well, I was going to say thank you, and I will, but I can certainly
understand the issues raised below.
On Fri, Oct 3, 2014 at 9:04 AM, Thomas White wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> On 03/10/2014 13:59, Derric Atzrott wrote:
> > I would be happy to stalk users of my r
I think I can afford something else to this thread.
After re-reading the tor man page, I've found the following option:
SocksPolicy policy,policy,...
Being "policy" the same form as exit policies.
Since I can "reject" anyone but me, this will act as a kind of
a firewall for hidden services. Am
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 03/10/2014 13:59, Derric Atzrott wrote:
> I would be happy to stalk users of my relay for a while if anyone
> is willing to help me set it up
That's worrying.
There are some strong ethical
> questions in logging all traffic from a relay, but I can
I would be happy to stalk users of my relay for a while if anyone is willing to
help me set it up. It would have to be a short time period and the logs
would have to be shredded afterwards for privacy reasons, but if we want actual
data, this seems to be the best way to do it. There are some stro
On Fri, Oct 3, 2014, at 03:37 AM, CJ wrote:
> just a small update regarding orWall: it's released 1.0.0!
> There's still *one* annoying issue regarding the tethering, but it
> should be OK next week. Just have to take some time in order to debug
> this for good.
Congratulations. Will definitely do
thank you, this is exactly the sort of thing I was looking for. I'll see if
I can find it in one of Roger's videos, though if anyone has a specific
pointer that would be very much appreciated.
On Thu, Oct 2, 2014 at 7:57 PM, stn wrote:
>
> i think roger dingledine presented some short timeline e
On Thu, Oct 2, 2014 at 7:18 PM, Ted Smith wrote:
> List administrators, you have dedicated significant resources towards
> stopping censorship, and I understand that you don't want to use the
> banhammer lightly, but any unkempt garden inevitably becomes a bed of
> weeds, and this is something yo
re: HiddenServiceAuthorizeClient
this assumes you will never encounter an adversary relay (hsdir)
intending to enumerate addresses. a useful feature, but the intent is
not to hide existence of hidden service addresses.
best regards,
--
tor-talk mailing list - tor-talk@lists.torproject.org
To un
Hello,
I'm curious if anyone noted the occurrence of this problem, and I wonder
what is its impact on the TOR network considering that probably a lot of
bridges and relays are located on Xen based infrastructure. Below is a
link to a page that shows a little more detail:
https://xen-orchestra.com
Hello!
just a small update regarding orWall: it's released 1.0.0!
There's still *one* annoying issue regarding the tethering, but it
should be OK next week. Just have to take some time in order to debug
this for good.
orWall provides now a brand new UI in order to be easier to handle.
There's als
Il 02/10/2014 17:39, Ted Smith ha scritto:
> Could you elaborate more on this specifically? What are some ways that
> abusers use technology to commit abuse?
For example: https://duckduckgo.com/?q=abuse+victim+spyware
Spyware increasingly a part of domestic violence
Cory Doctorow at 9:00 am Sun,
35 matches
Mail list logo