Try manual download from here:
https://www.torproject.org/download/download-easy.html.en
> I cannot found new TBB sources:
>> ~$ wget
>> https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-9-src.tar.gz
>> --2012-04-28 16:57:21--
>> https://www.torproject.org/dist/torbrowser/tor-browse
>> Okay, but I don't see a package for openSUSE in the rpm repository.
>> Will I need to install the bundle from source?
>>
>>
>> Jon
>>
No installation necessary. You download it from here:
https://www.torproject.org/download/download-easy.html.en
And then click on the start-tor-browser script. It
It's been (perhaps unfortunately) superseded by the Tor Browser Bundle,
which includes a version of Torbutton built into a custom Firefox
browser... all due to security issues.
I find it kind of annoying as well, especially since I run a separate
instance of Vidalia for all of my applications... :
It's possible to sign up for VPNs anonymously, as well as finding VPN
providers that keep no logs. Mullvad is a good example of one which you
can sign up for using bitcoin or even cash in the mail. Here's a list of
some more privacay-aware VPNs:
https://torrentfreak.com/which-vpn-providers-really-
Just a quick question, might be stupid: if you were to run all of your
traffic through a VPN, including tor, would the same considerations apply?
Or would they only apply to your VPN provider (provided that they keep
records at all)...?
Phillip
> MAC addresses are used by layer 2 protoc
From that article:
/Undercover law enforcement agents infiltrated the group in a sting
dubbed “Operation Adam Bomb.” According to the indictment, between
April and August 2011 one of the defendants received more than
$261,000 in PayPal transfers for the purchase of drugs, including
I agree only to a certain extent. Paypal and Western Union are easily
traceable. If it was that easy to track down Tor and BitCoin users, Silk
Road would have fallen as well.
However, even with BitCoin, it may be possible to pin down transactions,
or at least narrow the list down considerably. Onc
It wouldn't really matter even if they are, would it? I mean, the whole
idea of Tor is that the communication gets encrypted at every hop, so
even if an intermediate computer is CIA, it would (theoretically) not be
able to crack the encryption from the previous hops, as well as not
knowing who is r
Hi Jacob,
Tried running through the instructions, have everything set up, and then
I reach a stumbling block - when I try to add
ServerTransportPlugin obfs2 exec /usr/local/bin/obfsproxy --managed
to the torrc file (through Vidalia), it gives me the error "Unknown
option ServerTransportPlugin. F
> Phillip wrote the following on 02/09/2012 06:33 PM:
>> I've had the same problem when I routed my e-mail client to send
>> everything through Tor (via SSL/TLS of course ;))... When I logged on to
>> Gmail (and Facebook for that matter) via the web interface, it would
&
> On 02/10/2012 05:01 AM, Gramps wrote:
>> Phillip wrote the following on 02/09/2012 06:33 PM:
>>> I've had the same problem when I routed my e-mail client to send
>>> everything through Tor (via SSL/TLS of course ;))... When I logged on to
>>> Gmail (
> I got it to work reliably under similar circumstances this way:
>
> ./App/Firefox/firefox -no-remote -profile ./Data/profile
>
> In circumstances where multiple Firefox profiles are in use,
> specifying the particular profile used with TBB seems to work more
> reliably.
>
Thanks Doc, this worked
I've had the same problem when I routed my e-mail client to send
everything through Tor (via SSL/TLS of course ;))... When I logged on to
Gmail (and Facebook for that matter) via the web interface, it would
challenge me to prove my identity...
Now I just run my whole connection, including my Tor n
>> Thanks for the link C, I did what it suggested vis modifying the
>> start-tor-browser script, but it ends up just launching another window
>> of Firefox and not Aurora...
> Try adding option -no-remote to Firefox, it should start new process instead
> of
> connecting to an already running i
> On 6 February 2012 20:04, wrote:
>> I am using a transparent proxy (all connections are forced through Tor).
>>
>> The Tor Browser isn't just Firefox, it contains many security related
>> patches, settings and addons. Therefore I can't just go ahead and install
>> the addons myself into normal
On Saturday 17 December 2011 10:42:19 Phillip wrote:
>> Hi,
>>
>> I'm trying to set up tor on two separate computers using one net
>> connection.
>>
>> I have a spare computer, which I want to set up as a relay, permanently
>> using about 1/3 of my ba
>> From:
>> http://www.wired.com/vanish/2009/09/interview-with-pi-steve-rambam-evan-can-be-found/
>>
>> Wired: How much can one do with IP addresses that have been run through
>> Tor?
>>
>> SR: If you have access to certain tools, you can completely ignore Tor.
>> You
>> can trap your subject's IP
to go through the hassle of networking them,
or using the spare as a central tor server, if it can be avoided... btw,
both run Ubuntu and Vidalia.
Any suggestions?
Thanks in advance!
Cheers,
Phillip
___
tor-talk mailing list
tor-talk@l
http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
>>> It is very bad news because I am affraid that another tyrannical regimes
>>> such as Russian can make do it too.
>>> But it seems to me that Tor-users can use bridges and etc. for avoiding
>>> repressive measures
>> http://www.guardian.co.uk/world/2011/aug/30/pakistan-bans-encryption-software
>>
>>
> It is very bad news because I am affraid that another tyrannical regimes
> such as Russian can make do it too.
> But it seems to me that Tor-users can use bridges and etc. for avoiding
> repressive measures fr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
> Hi,
> I wonder how you distinguish whether the users are political
> opponents or just ordinary people...
That's the beauty of tor, you don't have to... ;))
- --
GPG Key: CF345FAE
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sounds about right Curious Kid! The quickest way I use to check
whether everything is OK with tor is to go to www.whatsmyip.org/more
If Tor is working, the Google map will be centred on some city that is
not in your country, and the IP will proba
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
> From: Adriana Leal
>> Sent: Sunday, August 28, 2011 5:11 PM Subject: [tor-talk] tor
>> vidalia
>>
>> hi, I install tor vidalia bundle on my mac.The onion tunrs
>> green.The network I can see the people and flags and saw one
>> green line on the
a Tor node on my
connection at ~500kb/s easily goes through 10-20 gb/day for both
uploads and downloads, so the monthly costs can built up quite quickly...
Would love to hear your thoughts!
Thanks,
Phillip
- --
GPG Key: CF345FAE
-BEGIN PGP SIGNATURE-
Version: GnuPG v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
>> You mentioned having traffic logs from all possible servers.
>> If by "servers" you mean 'honestly and properly run Tor relays',
>> then those logs do not exist, so what you are saying is not
>> possible.
>
> Well, yes, i meant exactly this scen
I'm still sticking to Torbutton - I prefer the flexibility of being able
to switch it on and off when I need, rather than launching a new
browser. That being said, I frequently run Tor with Firefox at the same
time as my e-mail client (all of which is routed through Tor). As long
as Vidalia's opene
@Joe Thanks a lot for the info!
I do use Enigmail quite often, but the problem is the usual, a
relatively small proportion of my contacts (read friends and family)
care about privacy and encryption... what can I say, it's a work in
progress!
It's reassuring to know that the SSL is working throu
ich gets leaked gratuitously by
Thunderbird, and to ensure that the e-mail gets to the GMail server as
securely as if I was using the https web mail.
Thanks in advance for any assistance!
Cheers,
Phillip
___
tor-talk mailing list
tor-talk@lists.torpr
28 matches
Mail list logo