On 12/23/2014 06:18 PM, Ben Tasker wrote:
> In torrc - where you've got a NickName, ORPort etc disabled, comment it out
> and restart tor
>
> As a side note, if you've got accounting disabled, you should probably
> disable that too.
Many thanks, Ben! That's simple enough!
Cypher
--
tor-talk mai
In torrc - where you've got a NickName, ORPort etc disabled, comment it out
and restart tor
As a side note, if you've got accounting disabled, you should probably
disable that too.
On Wed, Dec 24, 2014 at 12:13 AM, Cypher wrote:
>
> Hi Everyone,
>
> The docs say it's not a good idea to run a HS
Hi Everyone,
The docs say it's not a good idea to run a HS on the same node as a
relay. I'm looking through the docs and the config file and can't find a
way to turn relaying off for the node I'm running my HS on. Can anyone
advise?
Thanks!
Cypher
--
tor-talk mailing list - tor-talk@lists.torpro
I'm far from an expert on Tor, but:
> The key is that they will be programmed to redirect users towards the
backup DirAuths servers only once the backup plan
> has been activated. Before this happens, no one should possibly be able
to learn the locations of the backup DirAuths from > these public
Hello,
First I'd like you to know that I'm not deeply familiar with the internals of
Tor infrastructure.
However I'm reasonably confident to have grasped one fundamental aspect of this
issue, being that Tor routing depends first and foremost on 10 servers.
Because decentralizing this system
Dear all,
We’re happy to announce the release of GlobaLeaks 2.60.43 [1].
The release includes the following major improvements:
* Added support for Field Templates configuration
* Added support for Context Steps configuration
* Implemented caching for API
* Early Support for Stats Trackin
On Tue, 23 Dec 2014 20:23:20 +0100
Tyler Durden wrote:
> Yeah I see but I still think that we need to add some more to prevent
> a massive interrupt of the network.
> If I would be an evil government attacker I wouldn't go for the
> thousands of relays or exits but for the very small amount of tr
Yeah I see but I still think that we need to add some more to prevent a
massive interrupt of the network.
If I would be an evil government attacker I wouldn't go for the
thousands of relays or exits but for the very small amount of trusted
DirAuths.
Greetings
On 2014-12-23 00:16, Thomas White w
23.12.2014, 17:26 s7r:
> Ok, sent the additional bibtex entry to anon...@freehaven.net. Does
> this address automatically adds the entries to the page source code or
> someone manually reviews everything?
>
It's a manual process.
It being automated would surely work*, but since anyone can send e
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ok, sent the additional bibtex entry to anon...@freehaven.net. Does
this address automatically adds the entries to the page source code or
someone manually reviews everything?
On 12/22/2014 9:02 PM, Seth David Schoen wrote:
> Sebastian G. writes:
>
Hi,
is some stuff used in TBB from https://github.com/pyllyukko/user.js ?
--
Best regards
Michael
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
11 matches
Mail list logo