Hello,
There have been around 25 000 Tor users from Finland. The number of users
is very stable. Except right now I see a spike of 200 000 Tor users
connected from Finland. Number of users starts to increase on Tuesday
2021-12-21.
Hi all,
I noticed that Tor metrics estimate of directly connecting users from
Finland spiked from 10 000 to over 25 000.
https://metrics.torproject.org/userstats-relay-country.html?start=2017-05-08=2018-05-08=fi=off
As we can see, the number of connections from Finland has been very stable
10
Thanks Alec!
This is very useful. Especially plain HTTP sites are unsafe because the
attacker might inject something to HTTP traffic. For some weird reason many
popular sites, like CNN in your example, are not supporting HTTPS. As a
result, exit node or someone else can inject something nasty to
Hi,
"We all have secrets."
"Prefer encryption if you can."
The Finnish Communications Regulatory Authority recommends using encryption
and privacy tools, such as OpenPGP, Signal and Tor :) Also full disk
encryption tools are mentioned.
Google translate:
Hi,
The number of onion services is very interesting question. I have been
researching onions in several research projects and I am writing papers
about this.
Meanwhile, TorProject provides excellent onion stats too, see
https://metrics.torproject.org/hidserv-dir-onions-seen.html
Thanks Matthew!
So stealth makes onions really hidden by encrypting the list of intro
points. Nobody knows how many hidden services are out there. Great!
-Juha
On Sun, Aug 7, 2016 at 5:08 AM, Matthew Finkel <matthew.fin...@gmail.com>
wrote:
> On Sat, Aug 06, 2016 at 10:24:53AM +03
Hi,
I have been playing with stealth onion services[1] to protect some of my
SSH servers from SSH MITM. I like to keep my servers as hidden as possible.
Great to have this option on Tor :) I have some questions about it and I
didn't find much information.
Could someone tell me how it actually
Hi,
On Mon, Jun 6, 2016 at 2:47 PM, wrote:
> Hello, I'm the creator of a new fingerprinting website,
> https://browserprint.info
> Think Panopticlick but with a lot more tests.
> Many of the tests are even designed specifically to catch the Tor browser
> bundle out, for
> Are you sure it was a man-in-the-middle?
>
> May be, the other communication partner uses another device?
First we started a fresh conversation and messages went through. We
compared our fingerprints using other channel and they didn't match. After
this I restarted my Tor Messenger and then
> How can someone mitm Hidden Service connections?
This has nothing to do with hidden services. I had XMPP conversations with
other jabber users so the traffic exits from the Tor network.
-Juha
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
Hi,
Yesterday, when I was using Tor Messenger, I detected that Off-the-Record
Messaging fingerprints are not matching!
There seems to be a man-in-the-middle attack. The attacker probably is an
exit node.
I was comparing public key fingerprints through a secure outside channel.
Is there a way
:50 PM, Nurmi, Juha <juha.nu...@ahmia.fi> wrote:
> Hi,
>
> As you may have heard someone runs fake sites on a similar address to the
> original ones and tries to fool people with that. Fake sites are transparent
> proxies with MITM.
>
> I added this detection to ahmia.fi's
Hi,
As you may have heard someone runs fake sites on a similar address to the
original ones and tries to fool people with that. Fake sites are transparent
proxies with MITM.
I added this detection to ahmia.fi's onion site:
REAL: http://msydqstlz2kzerdg.onion/
FAKE:
I found over 200 more fake onions and filtered them. I don't like that
someone sabotages the onion ecosystem.
-Juha
On Wed, Jan 27, 2016 at 7:57 AM, Juha Nurmi wrote:
> Hi,
>
> > If somebody hosts a dark website, that doesn't have a verifiable
> external way
> > to lookup
Hello Tor community,
In June I warned Tor users about the presence of hundreds of fake and booby
trapped .onion websites [1].
Someone runs a fake site on a similar address to the original one and tries
to fool people with that. The sites look like the original ones.
These sites are actually
Hi,
I released refactored new version of Ahmia search engine :)
It's not finished yet but the main parts are working. Be patient, it's far
from perfect. It has some performance issues etc.
Deeper than ever: you can also search i2p network https://ahmia.fi/i2p/
Happy new year 2016!
-Juha
--
This is a horrible idea and it is not going to work.
Fortunately, Tor gives the user multiple mechanism to fight back. Even
against deep packet inspection (DPI).
http://i.imgur.com/hg3Fc0y.png
-Juha
On Tue, Dec 8, 2015 at 5:56 AM, grarpamp wrote:
>
>
Hi,
I am running raspberry pi 1 and raspberry pi 2 Tor relays.
Middle relay works pretty well, see
https://atlas.torproject.org/#details/E7FF7144EA49AAE291B48E354C80B0CEE74A706E
2.65 MB/s without any problems.
However, my exit does not work very well. I have to limit it to
BandwidthRate 256 KB
Short update about the fake onion address attack:
- Again, this is not a new phenomenon but larger scale: there is one
attacker or a group of attackers who run about 300 fake onion sites.
- The attacker has automated the fake site production. These sites came
online about simultaneously.
-
On Tue, Jun 30, 2015 at 5:59 AM, Roger Dingledine a...@mit.edu wrote:
If somebody could investigate how the fake onion services differ from
the real ones, that would be neat.
I made a comparison and noticed that the attacker is replacing all the
Bitcoin addresses. Obviously the attacker is
Hi,
I noticed a while ago that there is a clone onion site for Ahmia. Now I
realized that someone is actually generated similar onion domains to all
popular onion sites and is re-writing some of the content.
For instance,
REAL Ahmia: http://msydqstlz2kzerdg.onion/search/?q=duckduckgo
FAKE
://yrpavngfbhbc3tcc.onion/
http://z5fvd3hwmtzkgaqy.onion/
http://z7rpuixjsncgomw7.onion/
http://zzmqpfvozz4wqxwm.onion/
See https://ahmia.fi/search/?q=Alert%21
Greetings,
Juha
On Sun, Nov 9, 2014 at 2:51 PM, Nurmi, Juha juha.nu...@ahmia.fi wrote:
Hi,
I made a query to my index. According to Ahmia.fi's data
Hi,
I made a query to my index. According to Ahmia.fi's data these sites show
the take down notice:
http://dxwmc6b3mtklq44j.onion/
http://hydrampvvnunildl.onion/
http://exposed36mq3ns23.onion/
http://qbikfpcr4mhqoumm.onion/
http://silkroad6ownowfk.onion/
http://lygnimwoedhioopl.onion/
Hi,
Lawyer Jason L. Van Dyke[1] has sued PinkMeth[2] and The Tor Project:
http://www.scribd.com/fullscreen/233081133?access_key=key-WFujAqEI3BioFxNO43R3allow_share=trueescape=falseview_mode=scroll
Furthermore, he has sent emails to the Tor2web nodes.
[1] https://twitter.com/MeanTXLawyer
[2]
Hi,
I have a Raspberry Pi as wireless router and Tor proxy. Everything from
wlan0 is directed to Tor. When I am taking SSH connection using this
wireless transparent proxy with my laptop the SSH connection is sometimes
left alive forever after the laptop is closed.
How it works:
1) I am taking
Hi,
Sure we will help you and do not worry.
First of all, this is a civil case and they just try to scare you from
downloading with Bittorrent. Because you are not doing that and are able to
tell them about this they will eventually leave you alone.
However, do not write anything unrelated
Good observation Lars!
YLE (Finnish Broadcasting Company) has published many GOOD news about Tor
network. There have been a lot of news about how people could protect
themselves against mass surveillance and Tor has been explained in these
news (Finnish only):
Hi all,
I wrote a blog post about the content published in the Tor network:
http://torrorists.wordpress.com/2013/06/19/tor-network-provides-almost-only-legal-content/
According to the ahmia.fi's monitoring there are only few sites that have
possibly shared child porn.
Regards,
Juha Nurmi /
28 matches
Mail list logo