--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>From the Hidden Wiki.
Bitmessage - http://bitmailendavkbec.onion/ -
MailTor - http://mailtoralnhyol5v.onion/src/login.php -
Mail2Tor - http://mail2tor2zyjdctd.onion/ -
TorBox - http://torbox3uiot6wchz.onion/
These all provide a SquirrelMail box. Bitmessage also has a nicer box where you
can
OK.
Let me ask in a different way.
What do people who use .onion addresses use to communicate?
On Wed, 5/28/14, grarpamp wrote:
Subject: Re: [tor-talk] Best onion email system?
To: tor-talk@lists.torproject.org
Date: Wednesday, May 28, 2014, 10:
Has anyone purchased hosting for an .onion domain?
Any suggestions of reputable companies? Any think to avoid?
Thanks!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Let's say I download a PDF with Tor. I get the warning that I might download it
outside Tor.
What is the liklihood of that actually happening? Are there some dangerous
file types that one should not download.
Please note that I am talking about the downloading itself. I'm not talking
about do
Hello,
Many years ago Vidalia used to be part of the TBB (I think - or was it a
stand-alone program)?
Anyhow, it was helpful to see the browsing speed.
I realise Vidalia can be installed as a stand-alone program:
https://www.torproject.org/docs/debian-vidalia.html.en
However, I'm wondering if
Hello,
I know that when the TBB connects to a 'normal' .com or .org or whatever
address then the DNS resolution is done by the exit node. There is no need
anymore (not for several years now) for the client to set-up DNS manually (as
used to be the case with Polipo or Privoxy).
However, how do
I recently watched the video by Adrian Crenshaw (IronGeek) on Youtube about how
to use darknets and Tor effectively.
One of his concerns was about the individuals or organisations that are running
exit nodes.
What is to stop someone from setting up an exit node and a) sniffing all
traffic or s
Thank you for your informative response.
>>>For .onion addresses, DNS is not used. Your Tor client receives a SOCKS
connect request for a .onion >>>address and recognises it as a hidden
service request. Your Tor client then performs the hidden-service
>>>rendezvous procedure, including looking
suggests that
the download itself did happen within the Tor network.
On Thursday, June 26, 2014 9:12 PM, Joe Btfsplk wrote:
On 6/26/2014 1:34 PM, Bobby Brewster wrote:
> /Let's say I download a PDF with Tor. I get the warning that I might download
> it outside Tor./
That used to
They are identified as a person of interest by visiting
target_website.com (where target_website.com might be an
'extremist'
site or a webmail box that has attracted attention) and
then *in real
time* code injection and redirection can be used to attack
the person's
computer. So 'ident
What does this mean? Excessive bounces?
--- On Mon, 6/30/14, tor-talk-requ...@lists.torproject.org
wrote:
> From: tor-talk-requ...@lists.torproject.org
>
> Subject: confirm 2f46a3f2170a69c943fccd83ed3ef5ea29118c4b
> To: bobbybrewster...@yahoo.com
> Date: Monday, June 30, 2014, 3:01 PM
> Your
What are the benefits of running TBB in a VM?
AIUI, there are two advantages.
1. If malware infects the VM, then just the VM is compromised. If your
Windows/Mac/Linux system is infected, then your entire system is affected (yes,
I realise that it should be only the user account for Linux
On Thu, 7/3/14, Tempest wrote:
Subject: Re: [tor-talk] Benefits of Running TBB in a VM?
To: tor-talk@lists.torproject.org
Date: Thursday, July 3, 2014, 5:48 AM
Bobby Brewster:
>
What are the benefits of running TBB in a VM?
>
hatever
then what I do on it is compromised.
The VM is, in effect, a seperate OS. How would it be affected by the malware on
the non-VM system?
On Saturday, July 5, 2014 3:19 PM, Tempest wrote:
Bobby Brewster:
>
> Currently, my Tor use model is as follows:
>
> Me (TBB in Ubu
Here is how I use SSH with Tor.
torsocks ssh username@domain.
e.g. torsocks ssh wie...@domain.com
I have checked on Wireshark and it looks like my IP connects to a tor entry
node (before the traffic passes through the Tor network).
There are apparently lots of other ways to use Tor with SSH. I
On Mon, 7/14/14, Mirimir wrote:
Subject: Re: [tor-talk] Tor and SSH?
To: tor-talk@lists.torproject.org
Date: Monday, July 14, 2014, 7:54 PM
On 07/14/2014 04:17 PM,
grarpamp wrote:
> On Mon, Jul 14, 2014 at
4:55 PM, Bobby Brewster
>
Three points about this story.
First, if the student had used a VPN then the network would only have seen his
VPN IP not the entry node IP. Right?
Second, who is to say that the 'real' perp was not using a different
non-University network? The fact that the e-mail was sent from a Tor exit no
I see that Vidalia is no longer part of the TBB.
What is the best way to monitor bandwith throughput? I always found this
helpful when assessing the quality of the connection.
Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https:/
See
http://freejeremy.net/wp-content/uploads/2013/10/jeremy-hammond-federal-complaint.pdf
The search function doesn't work but look at the detail on Pages 30-33.
The point is that Hammond's IP was accessing Tor at the same time as he was in
his residence and / or in contact with CW-1 (Monsegur
s traceable?
Are bridge addresses public?
Thanks.
On Saturday, January 4, 2014 7:41 PM, Tempest wrote:
Bobby Brewster:
> Three points about this story.
>
> First, if the student had used a VPN then the network would only have seen
> his VPN IP not the entry node IP. Right?
r
bail. Or were there
other reasons? He was, after all, 'guilty'.
On Saturday, January 4, 2014 8:56 PM, Griffin Boyce
wrote:
Il 04.01.2014 13:32 Bobby Brewster ha scritto:
> See
> http://freejeremy.net/wp-content/uploads/2013/10/jeremy-hammond-federal-complaint.pdf
>
at 9:42 PM, Bobby Brewster
wrote:
> Also, am I right to think that if he had used a bridge then the IP logged
> would have been the bridge IP rather than the Tor entry node IP? Is this
> traceable? Are bridge addresses public?
Correct. Bridge addresses are not public, but it's easy
I was experimenting using Tor and Thunderbird by entering 127.0.0.1: 9150 in
the TB Preferences.
I used my Gmail account and hence Gmail's SMTP server.
I checked the headers of the message I sent to Gmail and the IP was a Tor exit
node.
However, I am wondering whether using Tor and an e-mail c
Note that the number of unique visitors more than tripled betwen June and July.
Was there perhaps some newsworthy event that happened around this period maybe?
On Tue, 1/7/14, Jon wrote:
Subject: Re: [tor-talk] some stats year 2013 for my Tor Netwo
On Tue, 1/7/14, dhanlin wrote:
Subject: Re: [tor-talk] Thunderbird and Tor - question/s.
To: tor-talk@lists.torproject.org
Date: Tuesday, January 7, 2014, 3:02 PM
Bobby Brewster:
> I was experimenting using Tor and Thunderbird by
enter
Hello,
I recently tried to login into my Yahoo! webmail via Tor.
It asked for a CAPTCHA then informed me that unless I answered a security
question I could not login. This is because "you are logging in from a device
we do not recognize" and "you are using a browser which you have not previous
27 matches
Mail list logo