Hi Leeroy,
I'll do your proposed testing. Let me just add: my Tor on Win 7 gives
... only one in 2,322 browsers have the same fingerprint as yours.
1000x700x24
--
Viele Grüße,
Hartmut
Hungerhilfe: http://www.thehungersite.com
Ohne Zensur suchen:
http://suche.amnesty-bergedorf.de
Googeln ohne
On 2014-12-02 21:45, l.m wrote:
Perhaps the new implementation of the hidden services will be better
?
How is it going ?
I don't see anything in the improvements suggested for hidden services
that would help this situation. Though I would be grateful for being
corrected.
First, I just want
Tor Weekly News December 3rd, 2014
Welcome to the forty-eighth issue in 2014 of Tor Weekly News, the weekly
Hi Hartmut,
I tried to reproduce your problem on Windows. You may have stumbled
onto a bug. Here are my results. Upon loading Tor-Browser, and after
automatic resize, the window has an extra large 32 pixel border along
the bottom edge. The content area is 1000x600 (for my display).
Producing one
Hi Leeroy,
if I start Tor browser from the scratch (Linux) I get:
... only one in 13,463 browsers have the same fingerprint as yours.
Screen Size and Color Depth:1000x900x24
--
Viele Grüße,
Hartmut
Hungerhilfe: http://www.thehungersite.com
Ohne Zensur suchen:
Hi Leeroy,
if I start Tor browser from the scratch (Linux) I get:
... only one in 13,463 browsers have the same fingerprint as yours.
Screen Size and Color Depth: 1000x900x24
on ther other hand, I'm losing all my preferences and bookmarks. In Win
7 I don't
--
Viele Grüße,
Hartmut
Last saturday during my Tor Talk in a Security Barcamp someone asked me
about this technology which I really don't have much information so I want
to share the link in case someone in here has any experience with this. I
heard some ISPs are using this in some countries to break into people's ssl
You need to install the sniffers CA certificate to allow them to break your
TLS connections or you need to hack a trusted CA to create some wildcard
ones (Comodo incident). Some software like Chrome also uses cert pinning,
so only a hardcoded cert is allowed. Afaik Tor uses hardcoded certs for the
Thanks for the answer, I was a little amazed by the demo videos.
Regards,
Dedalo.
2014-12-03 10:50 GMT-05:00 Akademika Aka akademik...@googlemail.com:
You need to install the sniffers CA certificate to allow them to break your
TLS connections or you need to hack a trusted CA to create some
Blockchain.info has become the second site after Facebook to roll out
a Tor hidden service with a CA signed SSL certificate. You can find it
here:
https://blockchainbdgpzk.onion/
My blog post explaining some of the background and implementation
details is here:
It maybe a noobish question but, netinfo cells do send the OR address so
what I am missing? Because then you get every address of every node right?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Part four: what do we think about an https cert for a .onion address?
https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
On Wed, Dec 3, 2014 at 11:17 AM, Nik Cubrilovic nik...@gmail.com wrote:
Blockchain.info has become the second site after Facebook to roll out
a Tor
On 2014-12-03 16:17, Nik Cubrilovic wrote:
Blockchain.info has become the second site after Facebook to roll out
a Tor hidden service with a CA signed SSL certificate. You can find it
here:
https://blockchainbdgpzk.onion/
My blog post explaining some of the background and implementation
On Wed, Dec 3, 2014 at 4:17 PM, Nik Cubrilovic nik...@gmail.com wrote:
Blockchain.info has become the second site after Facebook to roll out
a Tor hidden service with a CA signed SSL certificate. You can find it
here:
https://blockchainbdgpzk.onion/
My blog post explaining some of the
On Thu, Dec 4, 2014 at 4:55 AM, Runa A. Sandvik runa.sand...@gmail.com wrote:
Can you elaborate on why Blockchain wanted an SSL certificate on its
.onion site?
A few reasons:
1. When they announced the first hidden site on Saturday which was
plain HTTP[0] there was a clone up within an hour
When a client creates a circuit, it sends cells with some CircuitID. How
are these cells routed?Are they routed by their CircuitID, the IP address
of the ORs or how?
Thanks in advance
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Hi, any response regarding my previous message? In addition I've tried to
host static html site, and its running fine, also images and scripts are
loading fine as well. Now its confirm that its all because of CMS
compatibility.
Another question here;
I've visited some sites like Agora Silk Road,
17 matches
Mail list logo