Re: [tor-talk] OnionBalance Hidden Service has over 1 million successful hits in just 3 days

2015-07-07 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 *Numbers look good: Over 4 million hits in 7 days.* I want again to use this opportunity to say THANK YOU to everyone who is contributing and stress testing. 4 million requests tell me people are putting quite some effort into it. Please continue to

Re: [tor-talk] OnionBalance Hidden Service has over 1 million successful hits in just 3 days

2015-07-07 Thread tqr2813d376cjozqap1l
4. Jul 2015 22:57 by s...@sky-ip.org: > After little over 3 days of uptime, the OnionBalance hidden service > http://eujuuws2nacz4xw4.onion> was successfully accessed over 1 > Million times. There was no complaint in any of the running Tor instance > s. >   Hey s7r, things still looking OK? Ho

[tor-talk] OFTC and Tor

2015-07-07 Thread meejah
My usual method of connecting to OFTC via Tor is "really hope the exit I have isn't blocked". However, this "strategy" has been failing for weeks. Is there a better way to connect? I'm using SSL and authorizing via SASL. thanks, meejah -- tor-talk mailing list - tor-talk@lists.torproject.org T

Re: [tor-talk] Regarding the Hacking Team leak and the "TOR interception" (all uppercase Tor obviously)

2015-07-07 Thread aka
The browser would send a socks5 connect request to the hacking team proxy server, which would connect to the real hidden service and transparently proxy the content to the browser. If the hidden service had an SSL connection (like facebook hs), it would try to MITM with the installed cert. The infe

Re: [tor-talk] Regarding the Hacking Team leak and the "TOR interception" (all uppercase Tor obviously)

2015-07-07 Thread chloe
Hello, how would this method work if an infected client tries to visit a hidden service? Regards, Chloe aka skrev den 7/7/2015 16:52: Nothing special, they try to infect the machine using browser exploits while the victim surfs without Tor. The malware then manually installs an ssl cert and

[tor-talk] Regarding the Hacking Team leak and the "TOR interception" (all uppercase Tor obviously)

2015-07-07 Thread aka
Nothing special, they try to infect the machine using browser exploits while the victim surfs without Tor. The malware then manually installs an ssl cert and redirects the browser proxy from 127.0.0.1:9050 to evilguys.com:9050, which does ssl interception with that installed ssl cert. At the time o