Sadia Afroz, International Computer Science Institute (ICSI), mentioned
in her talk that it appears that some site owners are accidentally
blocking Tor due to settings in Cloudflare
"many people block countries without even knowing that
they are blocking countries. we talked to
On 12/18/18 10:07 AM, Kevin Burress wrote:
> How about "A Guard"
Yes, "A guard" would also reduce the potential for confusion, and it's
even shorter. The log error should clearly convey the information of
whose guard is being noted.
The phrase "Your guard" very strongly suggests that the user is
The log messages "Your Guard" make produce confusion, Looking at the
latest code base I see the string "Your Guard" recurring.
Does this string actually refer to a Guard the user is responsible for
operating and maintaining? Or does it refer to the guard the Tor client
is connecting to on its
I noticed this post about what is possibly the next unavoidable big
change in web browsing:
"HTTP/3"
https://daniel.haxx.se/blog/2018/11/11/http-3/
This looks official, but even if the move is unofficial, if Google and
Facebook adopt it, it is a defacto necessity. So, is the
On 02/17/2018 10:17 PM, Matthew Finkel wrote:
>...
> That's surprising. I just tested it with a fresh Tor Browser
> installation on 64-bit Linux and it worked without an error. A couple
>
> questions:
> - What version of Tor Browser are you using?
> - Press the Alt key, then select the Help
On 02/17/2018 07:52 PM, Rusty Bird wrote:
> Lars Nood�n:
>> I've looked around a bit and wonder how to launch new tabs from the
>> shell into a running TBB instance.
>
> $ ./Browser/start-tor-browser --allow-remote # for the master process
> $ ./Browser/start-tor-browser --allow-remote --new-tab
I've looked around a bit and wonder how to launch new tabs from the
shell into a running TBB instance.
I see how to do it to create a new instance but would like to work with
one that is already running. Also which documentation should I check
for this info?
/Lars
--
tor-talk mailing list -
On 09/12/2016 03:54 PM, Ben Tasker wrote:
>...
> CheckHostIP=no
>
> Don't do a DNS lookup of the host, the Tor exit node's going to do that
> anyway, and again, the queries will be observable by your ISP
I'm thinking that the use of ProxyCommand makes that redundant?
The manual page for
What are the thoughts on the appropriateness or usefulness of the Tor
Browser Bundle on public desktop computers?
I ask for two reasons. I notice that there are no packages (APT or RPM)
or for that matter repositories containing the TBB. That means that
each machine with TBB must be updated
On 04/01/2016 02:19 AM, tor_t...@arcor.de wrote:
> Hi Tor Talkers,
>
> what does "malicious Tor use" mean? I would be only too pleased to
> say my surfing isn't malicious but then i can't tell w/o its
> definition.
Maybe the definition of malicious traffic is those that don't turn on
javascript
I checked the FAQ and it is unclear about precisely what to do about
sites that gratuitously block Tor. Just recently I noticed that
www.justice.gov blocks Tor. For example the URL
http://www.justice.gov/atr/cases/exhibits/1332.pdf
and the search function at the site's start.
I notice in the Tor Browser Bundle 5.0.3 (based on Mozilla Firefox
38.3.0) on Ubuntu AMD64 that PDFs are displayed inline. I had the
impression that is unsafe. Is that best turned off? Is so, how?
Regards,
Lars
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change
On 11/12/2013 05:38 AM, M C J wrote:
I'm unable to connect to Tor with PF enabled. Without PF, Tor connects and
runs fine (with Privoxy). Soon as PF is enabled, Tor will either disconnect
if already running, or fail to connect if I try.
I've used a very basic pf.conf ruleset:
On 10/31/2013 09:07 PM, antispa...@sent.at wrote:
AFAIK you don't need permission for creating a mirror. After all, the
works are in the Public Domain.
[snip]
The original works are in the public domain, but the new, electronic
editions may not be. But either way, their issue is with spidering
I have a feature request. It would be nice for a future version of Tor
to allow scheduling at least one alternate values for RelayBandwidthRate
and RelayBandwidthBurst for a span of time. This would allow relays to
operate at higher speeds when their host network is normally less active.
One
On 27.08.2013 17:13, lee colleton wrote:
http://www.google.com/trends/explore#q=Tor%2C%20TOR%20browser%2C%20piratebrowser%2C%20date=today%203-mcmpt=q
That link seems partially broken. Google is not showing me it in
English even though the browser preferences are for English. Is that
not
This etag trick seems to work ok even against TBB:
http://lucb1e.com/rp/cookielesscookies/
Should TBB have the option to scrub E-tags?
Regards,
/Lars
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
On 26.08.2013 17:41, Moritz Bartl wrote:
On 26.08.2013 14:16, Lars Noodén wrote:
This etag trick seems to work ok even against TBB:
Are you sure? It is by design that you can track TBB users within
one session. Did you try New Identity, and restarting TBB?
https://trac.torproject.org
At intervals Tor posts some status updates to the system log file:
Aug 15 19:56:40 relay4 Tor[26018]: Heartbeat: Tor's
uptime is 6:00 hours, with 10 circuits open. I've sent
2.11 MB and received 7.18 MB.
I see that Tor takes different actions upon catching various signals
On 08/05/2013 06:13 PM, Roger Dingledine wrote:
And finally, be aware that many other vectors remain for vulnerabilities
in Firefox. JavaScript is one big vector for attack, but many other
big vectors exist, like css, svg, xml, the renderer, etc.
If I understand it is possible to embed
This last Monday's A-Studio covered Tor briefly. It's in Finnish only.
Ironically it's encoded in Flash:
http://areena.yle.fi/tv/1943194/
Regards,
/Lars
___
tor-talk mailing list
tor-talk@lists.torproject.org
On Thu, 30 May 2013, Achter Lieber wrote:
Is stealth mode a setting that will hinder or enhance the use of the Tor
Bundle?
The stealth mode menu is weak on information but it appears that it
simply drops packets instead of rejecting them properly. When that
happens to you or a service you
No need to spam for M$ services. There are better services with less
baggage:
You can search via Tor at ixquick's Start Page:
https://startpage.com/do/search
And DuckDuckGo works as well:
https://duckduckgo.com/html/
Both provide fairly thorough results. It would be
On 5/4/13 4:20 AM, Edward J. Shornock wrote:
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/ssh
[snip]
I wish that had turned up in my web searches. But, yeah, that's about
the same tools and same method I used. Neither know where to look for
leaks beyond DNS. I did a test on
I'm looking at using netcat to run ssh over Tor.
Does this use of netcat leak information in any way?
ssh -o ProxyCommand=nc -X 5 -x localhost:9050 %h %p \
-o User=user1 server.example.org
Many others must have already looked at this way of connecting since it
is fairly obvious. The only
25 matches
Mail list logo