You are right. 32^16 which is 1.2 septillion (24 zeros). That's the total
number of possible .onion addresses at the current base32 format.
> On Mar 5, 2016, at 4:24 AM, grarpamp wrote:
>
>> On 3/4/16, Scfith Rise up wrote:
>> It _would_ be the same private key. Good l
So it's not who is already published in the list but whoever has published most
recently? Very confused now. Seems like that works completely backwards from
how it should.
> On Mar 4, 2016, at 4:05 PM, Mirimir wrote:
>
>> On 03/04/2016 01:39 PM, Scfith Rise up wrote:
>
Schoen wrote:
>
> Scfith Rise up writes:
>
>> It _would_ be the same private key. Good luck with generating 1.2 septillion
>> permutations (16^32).
>
> This would be true if the public key were used directly as the onion name
> (which might be possible in certain ellipti
It _would_ be the same private key. Good luck with generating 1.2 septillion
permutations (16^32).
But could be doable in a few years so to answer your question, I believe there
can only be one published in the HSDIR, so first come first served. Facebook's
would have to be DDOS / shutdown and
Now the spike is up to over 8 domains. The Tor Project has had more than a
few days now to analyze this, any update or feedback regarding what these
appear to be beyond "we need to wait and see." Personally, I think it is, in
fact, Ricochet.
> On Feb 21, 2016, at 4:09 PM, grarpamp wrote:
27;d
> probably run a hidden service on the VPN VPS rather than wasting exit
> bandwidth.
>
> On Sun, Feb 21, 2016 at 8:12 PM, Anders Andersson
> wrote:
>
>>> On Sun, Feb 21, 2016 at 7:17 PM, Scfith Rise up wrote:
>>> I can point you in a direction that I took to a
I can point you in a direction that I took to accomplish this without having to
resort to a third party VPN. I am running my own VPN from a VPS and added it to
my proxychains file. Here is the github for proxychains-ng that I highly
recommend. This setup accomplishes what you ask, a list of ip a
That site doesn't have the 2+ increased sites count in its list (I've been
checking it daily).
> On Feb 20, 2016, at 7:23 AM, Mirimir wrote:
>
>> On 02/20/2016 01:28 AM, CANNON NATHANIEL CIOTA wrote:
>> With the large sudden spike in hidden services addresses, any way to
>> view what the n
I believe the Internet is a misinformation machine. I don't think the solution
is to somehow stop the tide, which would be impossible or only piecemeal
(managing to answer every question on Quora). The best you can do is have the
correct and complete information on virtual properties you own, li
̼̩̬̱̹͔o̟̳r̫̜͎̥̹̀s̖̦. On
> Thu, Feb 18, 2016 at 5:22 AM, Pickfire < pickf...@riseup.net
> [pickf...@riseup.net] > wrote:
>> On Thu, Feb 18, 2016 at 05:11:58AM -0500, Scfith Rise up wrote:
>> I am just wondering why there has been a huge increase in .onion domains on
>
I am just wondering why there has been a huge increase in .onion domains on
http://metrics.torproject.org. Is this just an error or something else going
on?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bi
Is there anyway to somehow automate the process? (The developer in me coming
out)
I ask because this seems like something that you will be doing perpetually.
Something like an algorithm that can compare percentage match of heuristics of
a database of previous sites marked as fake against all ne
I didn't realize The Tor Project needed to investigate other options to raise
more money. They have a decently paid staff, and plenty of beneficiaries. At
least according to their 2013 tax filings. So, while your idea is interesting,
this is a solution seeking a problem with the wrong entity.
Just my 2 cents, if you move to something like github's "latest" binary
releases approach for projects, it works really well.
I do that for a few of mine and it works great. As simple as a latest.zip that
is them most recent version binary for Linux, OSX, & Windows.
> On Dec 14, 2015, at 5:45
I have to agree. crontab -e and add in the commands you want to run
automatically at set intervals.
> On Nov 30, 2015, at 4:10 PM, Michael McConville
> wrote:
>
> Flipchan wrote:
>> I tried to code an autoupdater for my tor relay, IF anyone is a
>> king/queen on node.js or got any other awnse
> easily recognize. He would "stand by (his) recommendations. What a joke. This
> kid is probably in his early twenties and imagines himself some great hacker.
> At total joke!
>
>
>
>> On 11/23/2015 8:22 PM, Scfith Rise up wrote:
>> For all we know, you, Will
For all we know, you, William, sir, could be actually working for them as a way
to identify who knows what about when to help target the next wave before they
become problems to the new intrusion sets being developed. If you weren't the
#1 target then what would you be doing? Your answers to tha
Can't you just buy a new machine with cash, and then make sure to never let it
out of your site? What your describing would only happen if they have physical
access to your machine to install ANT in the bios. Probably naive here, but I
don't think that every machine made is already owned by the
I've seen the velocity of this topic interest rise at an insane rate, wonder
what their traffic looks like to that site. In a week or two it will be old
news and some other terror-du-jour will take its place.
> On Nov 16, 2015, at 10:07 PM, grarpamp wrote:
>
> http://isdratetp4donyfy.onion/
>
19 matches
Mail list logo