Scott Arciszewski:
I'm using the latest version of the Tor Browser Bundle. It gives me this
prompt: http://imgur.com/ZGqzK4Z
That's something else.
http://www.propublica.org/article/meet-the-online-tracking-device-that-is-virtually-impossible-to-block
^- possibly related
Yea. That Schneier
Kristy Chambers:
Interesting article published few days ago. Any comments?
http://pando.com/2014/07/16/tor-spooks/
Interesting how?
Comments on what?
So far that is just troll bait. /dev/null is usefull in these cases.
signature.asc
Description: OpenPGP digital signature
--
tor-talk
Somebody told me of tlk.io. I have joined. I closed the window and when
I was back I already had all settings as last time. I cleared the
cookies and went back. I was like logged in, without ever logging in. I
closed the window, cleaned up everything the delete all data can remove
and 15 minutes
I'm running the latest TBB on linux32. How do I reset the window size? I
moved one side by mistake and I can't set it back by hand. Each time I
run it, it's the window size from the last session.
One way would be to save the bookmarks and remove the whole folder. But
maybe that is too radical. Is
Mirimir:
There are many ways :) Learning to filter is key. For example, hit
Expression and look at the options under IPv4.
I haven't found expression, but...
But for now, just do Statistics/Conversations.
...this works. And it is something nicely done I can follow. I can make
the window
Mirimir:
Using verbose tools is only risky if those tools can see anything that
you don't want servers to see. At a minimum, Tor and those tools should
be running in an isolated system (at least a VM) that's never used for
anything that you want kept private. Better is to have the Tor client
grarpamp:
keyserver-options http-proxy=socks5://127.0.0.1:9150
A socks5 service is not an http proxy service, privoxy is.
Yet this is what the gpg.conf of the TorBirdy github notes.
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list -
Rejo Zenger:
++ 15/07/14 14:09 -0400 - grarpamp:
secured server. Or anybody can see your whole addressbook. So it is a
secured server. But still, it is quite obvious who am I just by looking
at that list. So I figured out, maybe if I push the refresh through Tor,
talking with a secured server
Michael Carbone:
It sounds like you'd be interested in Parcimonie:
https://github.com/EtiennePerot/parcimonie.sh
https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/
Which one to use?
It is a script to refresh your keyring over Tor without disclosing your
entire keyring to the
Mirimir:
Ultimately, you know that when it works, and it doesn't leak, no
matter how you try to break it. Sorry :(
No matter? Like using a credit card or just your real address?
When you're testing, you don't reveal anything that matters.
Right. When I am testing. But for me the server is
intrigeri:
Michael Carbone wrote (15 Jul 2014 19:11:15 GMT) :
https://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/
Currently down = better install from Debian (if using this
distribution, or a derivative) or get the source from
https://packages.debian.org/source/sid/parcimonie
Now I'm getting somewhere.
Mirimir:
I did. I have no idea how to sort them out.
Well, they're free. So just pick one at random, and try to sign up via
Tor. Repeat until success. Then create a test page, and try to upload
with FTP via Tor. Repeat until success. That's what I would do,
Mirimir:
Yes, but I have no idea what the server is seeing from me.
As long as you're using Tor browser or Tails, I doubt that the server is
seeing anything except a Tor exit IP.
So Tails would be a good idea. Although I prefer my customized desktop.
So I was hoping for somebody who
Mirimir:
Yes, but I have no idea what the server is seeing from me.
As long as you're using Tor browser or Tails, I doubt that the server is
seeing anything except a Tor exit IP.
So Tails would be a good idea. Although I prefer my customized desktop.
So I was hoping for somebody who
I said to myself what the hell.
I have a pgp keychain. I update that chain. First rule is to talk to a
secured server. Or anybody can see your whole addressbook. So it is a
secured server. But still, it is quite obvious who am I just by looking
at that list. So I figured out, maybe if I push the
So TorBirdy makes my Thunderbird access .onion sites. That's all I know
so far.
1. Does the regular browsing (extensions for example) is through Tor?
2. How do I change identity like the TBB new identity?
3. Does my mail checking go through the current 3 hop chain I use for
browsing in the TBB?
Somebody rose about a month ago this issue. And I haven't seen an
answer. Please, can you name, even in private, some options?
I did a search and I get some fancy services giving 20Gb of data and
lots of site making tools. I have a couple of HTMLs. And I would like to
attach an identity to them,
I have a small site. Smaller than 1M if zipped. It is static. And it
probably won't get much traffic. So 20Gb storage and 200Gb bandwidth are
pointless in my case. I would like no ads, no tracking for the reader,
faster, good uptime, and so on.
What would you recommend? What do you use? Free of
I have a small static site bundle on my hard drive. I want to get it up
to some provider. Which protocol to use? It's only HTML, CSS and a
couple of PNGs.
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change
Mark McCarron:
It will not be a fork. Anything I do will be submitted for inclusion in the
main branch when ready.
Quite a number of the changes I mentioned are in the pipeline anyway.
In this case, thank you for helping make tor better.
--
tor-talk mailing list -
Yuri:
How can one be sure that firmware that is running on the router is
built from this particular source code and not from some modified
version or different revision?
Hashes?
The ability to build it from sources?
If you search you can find a few other solutions.
Also how can one be
Mark McCarron:
This will assist in eliminating the global view issue.
Money. Money? Money! Money...
Have you read *IBM and the Holocaust*?
Any suggestions, modifications, comments or constructive criticism
is very welcome.
That's the miracle done by Richard Stallman and countless others
Mark McCarron:
It is my view TOR is currently compromised by intelligence agencies
sharing information on TOR traffic. These modifications must be made
and rolled out ASAP.
So it's pointless to continue using Tor or any related tech. You «ASAP»
mods are going to be broken even faster.
Have
I have just discovered that EncFS works well under Windows. So that
would be a secure way to share files between Windows and Linux. But can
I do it with Tails also? On the site I only find the release notes for
Tails 0.12 where EncFS is said to be replaced by the persistent
partition. Than I have
Bill Cox:
Yes, griefers often use Tor. Who are they? The obvious answer is
they're dumb kids,
Are you smarter? I know I'm not. I don't do that. That should make me
any better? Maybe they are doing something far better that I don't do.
Think about it.
but what if Tor were threatening to a
25 matches
Mail list logo