-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
*Numbers look good: Over 4 million hits in 7 days.*
I want again to use this opportunity to say THANK YOU to everyone who
is contributing and stress testing. 4 million requests tell me people
are putting quite some effort into it. Please continue to
4. Jul 2015 22:57 by s...@sky-ip.org:
> After little over 3 days of uptime, the OnionBalance hidden service
> http://eujuuws2nacz4xw4.onion> was successfully accessed over 1
> Million times. There was no complaint in any of the running Tor instance
> s.
>
Hey s7r, things still looking OK? Ho
My usual method of connecting to OFTC via Tor is "really hope the exit I
have isn't blocked".
However, this "strategy" has been failing for weeks. Is there a better
way to connect? I'm using SSL and authorizing via SASL.
thanks,
meejah
--
tor-talk mailing list - tor-talk@lists.torproject.org
T
The browser would send a socks5 connect request to the hacking team
proxy server, which would connect to the real hidden service and
transparently proxy the content to the browser. If the hidden service
had an SSL connection (like facebook hs), it would try to MITM with the
installed cert.
The infe
Hello,
how would this method work if an infected client tries to visit a hidden
service?
Regards,
Chloe
aka skrev den 7/7/2015 16:52:
Nothing special, they try to infect the machine using browser exploits
while the victim surfs without Tor. The malware then manually installs
an ssl cert and
Nothing special, they try to infect the machine using browser exploits
while the victim surfs without Tor. The malware then manually installs
an ssl cert and redirects the browser proxy from 127.0.0.1:9050 to
evilguys.com:9050, which does ssl interception with that installed ssl
cert. At the time o