On Samstag, 26. März 2016, 09:09:18 Hartmut Haase wrote:
> Hi,
> 1. I cannot watch TV on page funk.to/tvlive, not with xubuntu 14.04, and
> not with Windows 10 due to a missing flash plugin, it says. But I can do
> it with Firefox.
> 2. I cannot play videos on page www.ard.de, but I can on page w
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
https://www.elrippoisland.net/public/how_to/anonymity.html
Am 07. März 2016 23:03:57 MEZ, schrieb Oskar Wendel :
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>
>Guys, I think I don't understand how exactly transparent proxy in Tor
>works.
>
>Cli
Try [1]this one :D
[1] https://elrippoisland.net/public/how_to/anonymity.html
Kind regards,
elrippo
On Donnerstag, 11. Februar 2016, 08:06:02 onionsalad wrote:
> Hello there,
>
> I'm trying to set up a "isolating transparent proxy" a la Whonix,
> where the
ount.
4.) Do not use Email as a communication tool.
If you are not able to fulfill #1 and do not want to use your $ on #3, then you
have to get #2 that is tor friendly and not under your own control as also #3
So, bitmessage.ch isn't a bad choice as you state, else it leaves you to #4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
bitmessage.ch is a good choice.
Am 05. Februar 2016 13:09:40 MEZ, schrieb blo...@openmailbox.org:
>Hello!
>
>I am looking for Tor friendly webmail operators. By this, I mean ones
>that do not insist on SMS verification and do not block Tor.
>
>I use
obfs4proxy not obsf4proxy.
>
>
> Regards,
> Dedalo.
>
> 2016-02-04 5:37 GMT-05:00 elrippo :
>
> > Dear list,
> > i am trying to install the obsf4proxy on Ubuntu.
> >
> > 1.) I added the following repos to my sources list.
> >
> > deb http://deb.t
on how to install this
branch manually to my extend
Would you be so kind to offer instructions how to install obfs4proxy on Ubuntu
amd64
Thanks with kind regards,
elrippo
--
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippo
to be
the best solution of the worst options.
Kind regards,
elrippo
Am 01. Februar 2016 19:25:22 MEZ, schrieb Spencer :
>Hi,
>
>>
>> Elrippo:
>> a cloud under your own control
>>
>
>A hard drive with Wi-Fi works wonders.
>
>>
>> instead of blamin
an open source
solution trying to anonyminize your TCP based traffic.
Kind regards,
elrippo
Am 01. Februar 2016 18:46:22 MEZ, schrieb Chris Dagdigian :
>
>Hi Janos,
>
>If your computer was taken over by ransomware that encrypted your files
>
>then you are yelling at the wron
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Well,
I personally think the CA mechanism is broken, so letsencrypt would be the
better choice of the bad ones.
Maybe the tordevs could implement a mechanism for selfsigned certs with the key
mechanism of the hidden service itself to avoid the need
had a few restarts, but nothing annoying so far.
Kind regards,
elrippo
Am 25. September 2015 11:09:27 MESZ, schrieb Nathan Freitas
:
>On Fri, Sep 25, 2015, at 04:42 AM, Elrippo wrote:
>> You are welcone. Of course I have orbot installed, I misspelled OrBot
>> with OrWeb
>
>Jus
ly.
Am 25. September 2015 10:26:34 MESZ, schrieb Nathan Freitas
:
>Thanks for testing! This is only a replacement for Orweb browser. It
>still requires Orbot for the Tor connectivity.
>
>(Sorry for the top post... On the go, on my phone!)
>
>On Fri, Sep 25, 2015, at 04:12 AM, Elrippo w
Hy,
installed in cyanogenmod. When I hit "quit" it does not quit, I have to kill
the process manually
Nice to have a replacement for orbot, nice work!!!
Am 25. September 2015 00:33:08 MESZ, schrieb Nathan Freitas
:
>Orfox Beta is out on our F-Droid repos and Google Play:
>
>https://play.goo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Why don't you use the Firefox built in Videochat and run that over a local Tor
instance?
Am 14. September 2015 09:11:19 MESZ, schrieb Griffin Boyce
:
> For video chatting, I like using Talky.io . Using Skype with Tor
>doesn't work very well. B
Hy,
i don't think letsencrypt will work on a HS because letsencrypt checks [1] if
the domain you type in, is registered.
So for example on a clearnet IP which has a registered domain at mydomain.com
called myserver.tld, letsencrypt makes a DNS check for this clearnet IP and
gets the awnser, that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Try ruggedinbox.com
Am 09. April 2015 16:25:12 MESZ, schrieb
bm-2cvhtjbzdsfk9beugwimwfzfjjrdfcn...@bitmessage.ch:
>
>Hi,
>
>I used to subscribe a few mailing lists with mail.ru mailboxes.
>Today they blocked all my email accounts which were only c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Are you considering opennicproject.org DNS servers as secure?
Am 05. April 2015 18:25:27 MESZ, schrieb Tom van der Woerdt :
>Please clarify "secure"? Tor has its own built-in DNS resolution that
>will ignore client-side settings.
>
>If you're referr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
You'll get troubled with your PI as it gets some flags :D
Am 24. Dezember 2014 18:56:46 MEZ, schrieb Chris Dagdigian :
>
>
>Colin Mahns wrote:
>> I wouldn't recommend using a rPi for a Tor bridge/relay. It's far too
>
>> underpowered in my mind to b
ology which does not imply a zero day exploit against TOR
HS protocol.
And yes, drug users are written on LE black boards.
Kind regards,
elrippo
Am 07. November 2014 15:29:44 MEZ, schrieb "Öyvind Saether"
:
>> http://www.bbc.com/news/technology-29950946
>>
>> Does an
others too.
Kind regards,
elrippo.
--
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net
Encrypted messages are welcome.
0x84DF1F7E6AE03644
-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuP
On Freitag, 31. Oktober 2014, 12:23:02 Mike Cardwell wrote:
> https://www.facebook.com/notes/protect-the-graph/making-connections-to-facebook-more-secure/1526085754298237
>
> So Facebook have managed to brute force a hidden service key for:
>
> http://facebookcorewwwi.onion/
>
> If they have th
On Montag, 27. Oktober 2014, 07:06:31 CJ wrote:
> On 10/26/2014 01:21 PM, Johnny Cash wrote:
> > I'm setting up a blog and I need a secure hosting service.
> >
> > First, I signed up with HostGator, but received an email telling me I
> > needed to call and confirm my account. When I did, they told
On Mittwoch, 29. Oktober 2014, 20:40:28 Zenaan Harkness wrote:
> On 10/29/14, Moritz Bartl wrote:
> > On 10/29/2014 09:54 AM, C B wrote:
> >> I was shocked to see when I upgraded to 4.0 that scripts were allowed
> >> globally. How did that happen? Pardon me if this has already been
> > discussed.
On Dienstag, 28. Oktober 2014, 10:52:46 Nathan Freitas wrote:
> On Sun, Oct 19, 2014, at 05:33 AM, Elrippo wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > Hy devs,
> > i am loving the Orweb browser with it's options for the control of
&
ng sick doesn't help much reading iptables
>rules :/
>
>On 10/21/2014 07:57 PM, elrippo wrote:
>> Hmmm, at point 5.f.) that's exactly what i propose. Please do not
>forget
>> to let your relay do the NTP
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Try https://elrippoisland.net/public/how_to/anonymity.html
Am 20. Oktober 2014 17:52:18 MESZ, schrieb Robert Watson
:
>could someone please clarify a question I have about configuring tor &
>iptables. I'm using a dual nic centos server with squid/
esn't support alternative certificates
(self signed and cacert.org) while browsing. Could you please enable a feature
for controlling certificates in OrFox? And please keep the options from Orweb!!!
Kind regards,
elrippo.
- --
We don't bubble you, we don't spoof you ;)
Keep your data enc
Now click on "start-tor-browser" or open a terminal and type
"Software/tor-browser_de/start-tor-browser" :-)
On Sonntag, 19. Oktober 2014, 09:30:43 Hartmut Haase wrote:
> Hi WGG,
> > Assuming that you mean the Tor Browser Bundle, simply uncompress
> > (i.e. tar xvf or equivalent commands in a GUI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hy there,
maybe you want to take a look at this.
https://elrippoisland.net/public/how_to/anonymity.html
Kind regards,
elrippo
On 30. September 2014 12:52:10 MESZ, "René Pedersen"
wrote:
>Hello is it possible to set a router to r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
This writer has absolutely no clew what she/he is writing about.
Absolutely no scientific proof, just copy/paste the FAQ articles of some sites
and claim TOR is compromised.
Sad how disinformation again finds its way on a "professional" homepage..
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
MITM Attack?
On 18. September 2014 12:39:39 MESZ, Hartmut Haase wrote:
>Hi,
>when I try to open www.stayfriends.de I get the following message:
>
>Dieser Verbindung wird nicht vertraut
>
>Sie haben TorBrowser angewiesen, eine gesicherte Verbindung
le: it lacked a HiddenServicePort stanza
>for the service. . =/
>
>Adding it, restarting the tor and service and now it is up and
>accessible for the world at large.
>
>Thanks for your time though =)
>
>/Martin S
>
>2014-09-01 16:43 GMT+02:00 elrippo :
>> Am M
ing the Tor browser may be an
>insurmountable obstacle for some.
>
>I'll disable it as a test tomorrow.
>
>2014-09-02 16:16 GMT+02:00 elrippo :
>> I personally do not know why you are using privoxy on a machine with
>a webserver running.
>> I believe privoxy to be
82u IPv4 2360227 0t0 TCP
127.0.0.1:43645->127.0.0.1:80 (ESTABLISHED)
...
...
...
tor1307 debian-tor 100u IPv4 2360228 0t0 TCP
127.0.0.1:43646->127.0.0.1:80 (ESTABLISHED)
...
..
.
Try that, maybe it helps you for clearing your trouble.
Regards,
elrippo.
On Dienst
Am Montag, 1. September 2014, 13:29:45 schrieb Martin S:
> Apologies if this is doubled - got a weird error on first attempt.
>
> Hi,
>
> I've setup a key server on Tor.
> After installation I manage to connect to it using Lynx on the local
> machine (lynx localhost:11371 gets me to the intended
Very nice :)
My browser, rekonq, reports that your certificate is not valid. Maybe you check
that.
Kind regards,
elrippo
Am Samstag, 30. August 2014, 02:28:22 schrieb Juris - torservers.net:
> Update:
>
> https://www.torservers.net/wiki/tshirt/index
>
>
> J
> Hi elrippo thanks for the inputs.
You are welcome :D
> Your implementation is good (in our opinion) because you block
> everything (INPUT DROP) and then allow only the strict necessary.
Yes, me and others believe this to be a way to close some "unnecessary" ports
and/or att
Take a look at example f.) ->
https://elrippoisland.net/public/how_to/anonymity.html
> Hello again :)
>
> At https://ruggedinbox.com we are running a 'standard' email server,
> using postfix, dovecot, and so on ..
>
> The server is also able to receive and send emails to the onionland,
> thanks
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Muuuhhh :D
That's a nice one :*
On 23. Juli 2014 16:50:52 MESZ, Sarah wrote:
>Shh, don't let them find out that the military has had ties to the
>Internet since before it was the Internet. The concentrated hysteria
>might warp the space-tim
n, we all are happy to read about it :D
Ultima Ratio: If you don't trust it, don't use it!
Kind regards,
elrippo.
--
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net
Encrypted messages are welcome.
0x84DF1F7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Yes, and what's new or creepy about that?
I am aware for what this was build and is used, you not?
On 23. Juli 2014 13:15:15 MESZ, Kristy Chambers
wrote:
>Interesting article published few days ago. Any comments?
>http://pando.com/2014/07/16/tor-s
Am Montag, 21. Juli 2014, 11:31:21 schrieb mick:
> On Mon, 21 Jul 2014 10:21:33 +0200
>
> Elrippo Athletico allegedly wrote:
> > Depends, on wether you trust a CA, for example VeriSign, who just
> > want your money, or wether you go trough a personal verification
> >
Am Montag, 21. Juli 2014, 11:28:09 schrieb Rene Bartsch:
> Am 2014-07-21 04:17, schrieb Cinaed Simson:
> > On 07/17/2014 07:11 AM, Elrippo wrote:
> >> I don't think that this is a problem, if you configure TOR as a
> >> transparent proxy with some iptables rules o
Am Montag, 21. Juli 2014, 04:17:05 schrieb Cinaed Simson:
> On 07/17/2014 07:11 AM, Elrippo wrote:
> > I don't think that this is a problem, if you configure TOR as a
> > transparent proxy with some iptables rules on your Debian based OS, all
> > TCP based tra
OR already uses
>end-to-end encryption. The problem is to make Citadel sending outgoing
>SMTP/Jabber traffic to the TOR client.
>
>Best regards,
>
>Renne
>
>
>Am 2014-07-17 08:27, schrieb Elrippo:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA512
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I am using Exim on a hidden service.
Principally make your SMTP listen on local host and on the used onion TLD, and
edit the hidden service line, so it will redirect incoming traffic on port 25
and/or 587 to localhost: 25 and/or localhost:587.
Be s
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
If I remember right, you can set a socks proxy in konqueror and rekonq.
After you set these, the apt utility and also Kontact uses this Proxy settings.
On 09. Juli 2014 10:10:59 MESZ, alex wrote:
>You could install and configure proxychains and use
Am Freitag, 4. Juli 2014, 20:48:09 schrieb Jens Kubieziel:
> * elrippo schrieb am 2014-07-04 um 20:30 Uhr:
> > Missed it, but watched it in the ARD Mediathek [1]. Could someone advise,
> > how a copy could be downloaded as mp4, divx, ogg or some other format?
>
Am Donnerstag, 3. Juli 2014, 16:48:46 schrieb Jens Kubieziel:
> * Elrippo schrieb am 2014-07-03 um 16:22 Uhr:
> > On which station can we watch the story on German TV today?
>
> Will be broadcasted on ARD at 21:45 (9:45 pm, 20:45 UTC).
> http://daserste.ndr.de/panorama/arc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On which station can we watch the story on German TV today?
On 03. Juli 2014 14:01:15 MESZ, Jacob Appelbaum wrote:
>Hi,
>
>On 7/3/14, coderman wrote:
>> request for more (english speaking) details on QUELLCODE part of
>> XKeyScore(XKS)
>>
>>
>http
me of the server is it's *.onion domain
2.) The mail server listens only on local host, not public
So, how do you get the ehlo trough TOR to the mail server on local host?
Thank's for your time in advance!
Kind regards,
elrippo
- --
We don't bubble you, we don't spoof you ;)
Keep
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Try squid, privoxy and polipo.
On 09. Juni 2014 21:18:04 MESZ, Antonio Z wrote:
>I understand that it is not necessary, but I believe that making your
>own ad blocking software would bring more people to tor. It does not
>even have to come with the
Maybe you find this helpful
https://elrippoisland.net/public/how_to/anonymity.html
Kind regards,
elrippo
Am Samstag, 17. Mai 2014, 18:05:38 schrieb Clare ♬:
> Thanks! It's incredibly helpful to see how more experienced users have Tor
> set up. Sorry again for the poor formatting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On that note.
https://cacert.org root certificates are missing mostly.
You have to install them by your own. Personally i prefer cacert.org, because
firstly you have to identify yourself and secondly you actually are meeting
assurers face to face
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hy Nathan.
Thank you, in the guardianproject repo it is tagged as beta, but now it works :D
Kind regards,
elrippo
On 21. April 2014 16:09:32 MESZ, Nathan Freitas wrote:
>On 04/19/2014 02:24 PM, Elrippo wrote:
>> Since the last update,
there other issues to be aware of?
Kind regards,
elrippo
- --
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net
Encrypted messages are welcome.
0x84DF1F7E6AE03644
- -BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.
Hy community.
Though this doesn't relate directly to TOR, it is a warning sign for the
Future. None of this is in the news, broad media, people don't even talk about
it.
Watch the videos, read the articels and build your own opinion.
https://www.youtube.com/watch?v=fzgQwDeP7eM
https://www.you
Good Morning.
Running 2.5.3 on all interfaces with privoxy on a desktop could look like
this. Hope this helps :D
1.) /etc/tor/torrc
VirtualAddrNetworkIPv4 172.16.0.0/12
TransPort 9040
AutomapHostsOnResolve 1
DNSPort 9053
2.) /etc/privoxy/config
listen-address localhost:8118
forward-socks4 /
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hy John.
Nice idea. Are you considering a package for Linux also, aka a tarball with
installing instructions?
Kind regards,
elrippo
On 27. März 2014 06:20:49 MEZ, John Brooks wrote:
>I’d like to present a project that I hope will interest s
Hy dear list.
Maybe this is interesting for some of you.
If you want to help and/or contribute, write a mail to
Tiffiniy Cheng
Dear Fight for the Future member,
On Monday, Edward Snowden spoke to a crowd of thousands at SXSW, and it
seriously felt like he was reading our minds.
“The NSA is setti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hy there.
Maybe the developers from orbot might find the first android based
"snoop-proof" cellphone [1] interesting.
[1]
http://news.discovery.com/tech/gear-and-gadgets/the-worlds-first-snoop-proof-phone-140116.htm?utm_source=DNFB&utm_medium=DN
I like that one :D
David schrieb:
>Not exactly what was originally requested, but I thought it might be
>funny nonetheless:
>
>
>http://i.imgur.com/WM89LyI.png
>
>
>Icons were public domain from thenounproject.com
>
>
>Cheers and happy holidays!
>
>David.
>--
>tor-talk mailing list - tor-talk@
Am Montag, 23. Dezember 2013, 20:57:47 schrieb Katya Titov:
> David:
> > Hey everyone,
> >
> > I've been searching around for a few hours now looking for a good VPS
> > service to host a non-exit relay. It seems as if most VPS services
> > cringe at the word Tor, and the ones that allow it are eit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Windows Yes.
SMTP over ssl/tls is configured on port 25. Starttls, aca submission, is
configured for port 587
unknown schrieb:
>On Sat, 2 Nov 2013 13:50:18 +0100
> wrote:
>
>> 1) Create a list of tor exit nodes that do not block port 25
>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I find this one otettu good. Serves also a small python script :D
http://null-byte.wonderhowto.com/how-to/use-traffic-analysis-defeat-tor-0149100/
Jon schrieb:
>This is probably not new news to most of you. However this was posted
>by
>the Wash
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I would recommend debian wheezy, if you are going for debian based operating
systems, since K/Ubuntu is considered to be a system with commercial interest
from canonical.
Search the internet for Amazon shopping lense in Ubuntu.
Marcos Eugenio K
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
That's what I suggested earlier, without a reaction :D
mick schrieb:
>On Mon, 14 Oct 2013 05:17:19 +0200
>Martin S allegedly wrote:
>
>> On Saturday, October 12, 2013 08:48:02 PM Antispam 06 wrote:
>> > On 24.05.2013 00:50, Moritz Bartl wrote:
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Surprise, surprise :D
Why don't you get yourself a v-root kvm server with a debian image for €5 a
month, a FQDN for €30 per anno and setup your own mail server if you can not
setup one at home?
Exim or postfix are not so hard to learn and roundcu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
You could also use the transport option in /etc/tor/torrc
This enables routing of your tcp-based traffic through the transparent proxy
function provided by tor.
Take a look at the tor wiki.
https://trac.torproject.org/projects/tor/wiki/doc/Transp
3a821)
>opening log file."
>It stopped working at 15:32, at least Tor weather says that.
>
>
>Am 13.09.2013 22:46, schrieb Elrippo:
>> Du solltest die repositories von Tor verwenden.
>> Bitte nutze die experimental [1] repo. Danach ein update und upgrade
>auf 2.4.17-
ESSAGE-
>Hash: SHA1
>
>Tor 0.2.3.25 on Debian
>
>Am 13.09.2013 21:52, schrieb Elrippo:
>> Which version of Tor are you running?
>>
>>
>>
>>
>> Sebastian Pfeifer schrieb:
>> > Hi all!
>> > From a quick search over my phone'
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Which version of Tor are you running?
Sebastian Pfeifer schrieb:
>Hi all!
> From a quick search over my phone's internet I wasn't really able to
>find a similar case so I ask this here:
>
>Since a few days my Tor Exit Node keeps crashing. The lo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Confirmed, sadly...
Michael Wolf schrieb:
>I've been running a Tor Relay (not an exit node) from my home for quite
>a while now, and up to this point have not encountered any issues
>accessing any sites. However, today I attempted to access
>htt
other ports, 20,21,22,25,80 and so on, are bruteforced in the common way as
it is known on the i-net :)
Gordon Morehouse schrieb:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA512
>
>elrippo:
>> Am Dienstag, 3. September 2013, 15:35:04 schrieb adrelanos:
>>> New hypoth
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
No it's not new, sadly...
mirimir schrieb:
>On 09/03/2013 08:52 PM, Moritz Bartl wrote:
>
>> On 09/03/2013 10:39 PM, Elrippo wrote:
>>> I have to disagree with you on behalf of SPAM.
>>> I opened Port 25
Am Dienstag, 3. September 2013, 15:35:04 schrieb adrelanos:
> New hypothesis:
> This is an attempt to shut down the Tor network once and forever.
>
> Might this be an attack on the Tor network with the goal to make it that
> slow for everyone, that no one will use it anymore? (DDOS)
The Thing on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
I have to disagree with you on behalf of SPAM.
I opened Port 25 on one of my exits. In a week I got blacklisted by Google and
some DNSBL's for sending spam.
It took me quite a time to erase my IP from these lists...
I can live with port 587 for su
77 matches
Mail list logo