How did TBB project people decide on the user agent which is:
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Panopticlick shows 1 in 30 browsers use it. I assume it's the most generic at
this moment?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or c
Quick Question:
The node JPsi2 has an IP address of 37.200.99.251 and a host name of
j60204.servers.jiffybox.net.
Does connecting to this node require DNS resolution? I assume not. I imagine
that I request a connection to the IP address (not to the domain name).
Yes?
--
tor-talk mailing list
I am a little confused when using Tor with https://browserleaks.com/ip
My exit node is ogopogo in Canada. But the "DNS leak test" component of the
above page says that my DNS servers are in Belgium:
74.125.181.9n/a Google Belgium, Brussels
74.125.47.1 n/a Google Belgium
74.125.
Using the latest version of Torsocks with: torsocks ssh
root@111.222.222.111 gives:
PERROR torsocks[13225]: socks5 libc connect: Connection refused (in
socks5_connect() at socks5.c:202)
ssh: connect to host 111.222.222.111 port 22: Connection refused
I installed the "build dependencies"
(htt
How does Tor deal with IPv6? I ask because I recently signed up with a
VPS which automatically allocates both IPv4 and IPv6 addresses. I
checked my IP with a variety of online IP checkers and noticed that one
checker - http://whatismyipaddress.com/ - showed my IPv6 address rather
than my IPv4 a
On 2016-10-05 07:28, Mirimir wrote:
Bottom line, it's easy to create
lists of VPN exit IPs, and those IPs generally belong to data centers.
But of course, those exits all have data-center IPs. However, if
discrimination against Tor and data-center IPs becomes intense enough,
that will create a
On 2016-10-02 22:33, Alec Muffett wrote:
So:
- person uses tor to connect to socks proxy provider
- person authenticates (?) to socks proxy provider
- person traverses socks proxy prover to connect to end service
This sound like putting a condom on top of another condom after cutting
a
hole i
On 2016-09-27 15:50, Alec Muffett wrote:
Is it possible to use a different proxy way to access Gmail, FB, etc
without being seen as suspicious? For example, one could use
proxychains
with Tor followed by a SOCKS proxy to login.
If I understand you right (?) I think that was exactly the reas
On 2016-09-28 02:28, Mirimir wrote:
I'm a pretty technical guy, and it's been years since I managed to get
a
Facebook account for a persona. But I see that bogus and stolen
Facebook
accounts are available in bulk from criminals, marketed to criminals.
Or
at least, to advertisers ;)
Sorry...
On 2016-09-27 09:45, Alec Muffett wrote:
On 27 September 2016 at 09:42, Mirimir wrote:
Exactly. This manifests where folk on Twitter complain that "zomg i'm
using the onion site and it's blocked me!" - when in fact some perhaps
code
is running - code that someone took the time to write - to
Hi Alec,
Thanks for your detailed and informative response. I had never heard of
"scraping". BTW: are you the Alec Muffett name-checked in Kevin
Mitnick's autobiography? I assume so.
It may be of note that when I got the Google error, Amazon also required
a CAPTCHA in order for me to login t
From my notes dated May 2016 for Tor-friendly e-mail providers:
Bitmessage.ch - https://bitmessage.ch/
Cock.li - https://cock.li/ (various domains available).
Lelantos: http://lelantoss7bcnwbv.onion/
Mail2Tor: http://mail2tor2zyjdctd.onion/
Mailbox.org - https://mailbox.org/ (30 days free).
Quite often, when using Google to search with Tor (yes I know I can use
DuckDuckGo, etc!) I get the following error:
Our systems have detected unusual traffic from your computer network.
This page checks to see if it's really you sending the requests, and not
a robot. Why did this happen?
T
I was looking at exit nodes on http://www.ip-score.com/ which checks
dozens of blacklists. Typically, each exit node is considered bad by
about five blacklists. I've checked about 15 exit nodes and all are
blacklisted by xbl.spamhaus.org and, by extension, zen.spamhaus.org (zen
is a compendium
Please see below for my response to your helpful comments.
On 2016-08-08 11:18, Ben Tasker wrote:
If you're using Firefox, one thing you want to consider is DNS leakage.
If you go into about:config, see whether network.proxy.socks_remote_dns
exists. If not create it and set to True.
Without th
I, like many other uses of Tor, have become increasingly frustrated with
sites like Craigslist which discriminate against Tor. It makes these
sites hard to use. I therefore decided to discover if it is possible to
use Tor but end up with a non-Tor IP.
I use Torsocks to login to a VPS server vi
Sure, I get the logic. I'm just wondering when it started. I'm sure that
even a few weeks ago there was one IP used irrespective of how many
pages you had opened simultaneously in the TBB.
On 2016-07-22 15:44, David Olofsson wrote:
I assume that it is so that data entered on an assumed http web
Has the TBB changed the way that IP addresses are allocated?
It used to be that, if you opened five sites in TBB, all five would use
the same exit node. Now it appears that each of the five sites has the
IP address of a different exit node.
Is this a new policy? What is the purpose?
--
tor-ta
Hello,
I am looking for professionally-managed hosting providers that are
Tor-friendly and accept bitcoin. Namecheap is bitcoin friendly but
anti-Tor and VPNs.
I have noticed that a few hosting providers are somewhat unprofessional
probably because they are one-person operations.
Any sugge
I find that Google gives better results than DuckDuckGo. I used to use
Scroogle before they closed down.
I get the 403 error from time to time. It depends on the exit node
rather than Tor per se.
The 403 is different to being forced to do a CAPTCHA and then obtaining
the search results. The
1. Does the TBB incorporate the anti-phishing and anti-malware
blacklists integral to Firefox (which I believe are provided by Google's
SafeBrowsing)?
2. I note that the recent update (30 May) kept my NoScript settings
which I always personalize. Is that a deliberate new policy? I know I
alwa
Earlier this week I attempted to buy a domain with Namecheap since they
accept bitcoin and, helpfully, have WHOISguard free for the first year.
Sadly Namecheap do not like proxies which includes Tor and will prevent
you from purchasing.
Can anyone suggest a reputable (i.e. one that works) dom
On 2016-05-26 04:46, grarpamp wrote:
On 5/25/16, blo...@openmailbox.org wrote:
Can anyone suggest a reputable webmail provider that is not totally
anti-Tor.
Are you, and other readers of this thread,
willing to pay anonymously via bitcoin or
cash in the mail?
I personally have no problem wi
Can anyone suggest a reputable webmail provider that is not totally
anti-Tor.
Cock.li and Sigaint and Unseen.is and Mail2Tor are out as the names look
weird to "normal" people.
Ruggedinbox is unreliable as the site is often down. VFEmail used to
work but I can't seem to sign-up now.
Proton
On 2016-05-03 01:34, Mirimir wrote:
On 05/02/2016 02:41 PM, blo...@openmailbox.org wrote:
I signed up for Proton Mail only to be asked for SMS validation (just
as
Gmail does). Tutanota did not ask for SMS checks, but my account has
been suspended for up to 48 hours while they manually check it
On 2016-05-03 01:34, Mirimir wrote:
On 05/02/2016 02:41 PM, blo...@openmailbox.org wrote:
I signed up for Proton Mail only to be asked for SMS validation (just
as
Gmail does). Tutanota did not ask for SMS checks, but my account has
been suspended for up to 48 hours while they manually check it
I signed up for Proton Mail only to be asked for SMS validation (just as
Gmail does). Tutanota did not ask for SMS checks, but my account has
been suspended for up to 48 hours while they manually check it (which
doesn't sound too unreasonable since it's free). However, both these
services procl
Years ago, in the pre-TBB days, the Vidalia client had a nice graph that
showed one's throughput in the Tor network. It was fun to see how fast
Tor was.
Is there a way to do this now that there is no separate Vidalia client?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscrib
On 2016-04-05 17:33, blo...@openmailbox.org wrote:
On 2016-04-03 12:32, Nicolas Vigier wrote:
On Sun, 03 Apr 2016, blo...@openmailbox.org wrote:
Just to check: I am using TBB and I download a file (PDF, EXE,
whatever) and
the box comes up which says "Tor Browser cannot display this file.
Yo
On 2016-04-03 12:32, Nicolas Vigier wrote:
On Sun, 03 Apr 2016, blo...@openmailbox.org wrote:
Just to check: I am using TBB and I download a file (PDF, EXE,
whatever) and
the box comes up which says "Tor Browser cannot display this file. You
will
need to open it with another application", pr
Just to check: I am using TBB and I download a file (PDF, EXE, whatever)
and the box comes up which says "Tor Browser cannot display this file.
You will need to open it with another application", presumably if I
click "OK" then the download happens via the Tor network.
In other words: the do
The reason, simply, is that I have never used the -D of ssh before!
So am I running torsocks ssh to the VPS and then ssh -D to 8080 at the
same time?
Why would the local SOCKS run on 8080? Tor runs, I think, on 9150?
I'm sure you're right but could you please spell it out for me. Thanks!
On
Let's say I want to access a website and appear to be from country X. I
can't use Tor because there are no exit nodes for Country X.
Can I:
a) buy a VPS from a hosting company that provides an IP that is from
Country X?
b) use torsocks to login to my VPS via ssh.
c) download a browser that
User agent is Mozilla/5.0 (Windows NT 6.1; rv:38.0) Gecko/20100101
Firefox/38.0
AIUI, NT 6.1 is Windows 7 and current Firefox version is 44.0.
Also, does that mean that TBB used an "old" version of Firefox?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other
On 2016-03-11 00:11, Roger Dingledine wrote:
On Thu, Mar 10, 2016 at 02:39:20PM -0800, Green Dream wrote:
By default (i.e., StrictNodes is false) Tor will bypass your declared
ExitNodes if it needs to do so in order for traffic to reach its
destination. Imagine the scenario where all the exit no
I am wondering if using an exit node IP increases the possibility that
sending email from a webmail provider is more likely to end up in the
recipient's spam folder. For example, sending email from
he...@vfemail.net to good...@hotmail.com
I think not because, from the email headers I have seen
Here is a message from Outlook.
Someone may have used your account xxx_...@outlook.com to send out a lot
of junk messages or done something else that violates the Microsoft
Services Agreement.
For the record, I never sent any e-mail from that account. It's of note
that you can setup an Outlo
On 2016-02-26 23:28, Coyo wrote:
On Fri, 26 Feb 2016 13:57:55 -0800
AMuse wrote:
You can also use IMAP with GMail over TOR.
I was just about to suggest that.
I think only the web interface kicks Tor users out. I always use gmail
through IMAP (for PGP mail cryptography), and i've never had a
What do you mean by these 30 onion mailservers.
He means "OnionMail": http:// en.onionmail .info/directory.html
Presumably they are
.onion webmail providers? Are they public? Can anyone use them?
They are mail servers running behind onion services. Not necessarily
"web".
Thank you for
Some websites like Craigslist and Fiverr refuse to accept Tor
connections. They may either explicitly state this (Craigslist) or not
let you create a new account with Tor (Fiverr).
Is there a way around this? For example, one can do: home IP ---> VPN IP
---> Tor node ---> Tor Node ---> Tor exi
On 2016-02-17 23:17, Alec Muffett wrote:
Hi All!
I just wanted to confirm that facebookcorewwwi is working and is under
active development; we are currently working on scaling bandwidth so
that we can support more people who want to use Facebook over Tor.
The facebookcorewwwi URLs use (and need
On 2016-02-17 21:45, Jens Kubieziel wrote:
* blo...@openmailbox.org schrieb am 2016-02-17 um 21:17 Uhr:
Because I've tried https://www.facebookcorewwwi.onion/ and I get a
neverending loop in which the site loads and loads and loads...
I have this endless loops from time to time. Usually it hel
Does Facebook still provide an onion link?
Because I've tried https://www.facebookcorewwwi.onion/ and I get a
neverending loop in which the site loads and loads and loads...
Any ideas?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https:
Hello,
Here are some Tor friendly e-mail providers. None of these want SMS
validation. Some have onion links but please check yourself for the
correct URL.
Do you know of any we can add to this list? Any onion only sites? Any
comments on these services?
Bitmessage.ch - https://bitmessage.c
On 2016-02-14 13:02, Cain Ungothep wrote:
For those who wish to update manually, is it sufficient to toggle
app.update.auto in about:config to false?
Seems so. You will still be prompted to update through the MAR
system,
but it won't happen automatically.
Today I discovered that TBB 5.5.2 a
"Yes. We have direct peering (email doesn't leave Tor at all) with
Torbox, Lelantos, bitmessage.ch, mail2tor, ruggedinbox.com, and any
other mail server that is reachable on a .onion address."
My impression is that .onion servers thus operate as their own DNS hence
this claim from http://sigai
Please see below for a couple of questions. Thanks for your input.
Sigaint.org is an excellent option. Their onion mailservers peer with
some of the other onion mailservers. And they have a clearnet gateway,
unlike many of the other other onion mailservers. But users can only
access their onio
On 2016-02-12 06:57, Cain Ungothep wrote:
On 02/08/2016 01:36 AM, Georg Koppen wrote:
Mirimir:
When automatically updating, does Tor browser check GPG signatures
of
downloaded updates before installing them?
The update files are not using GPG signatures (see:
https://wiki.mozilla.org/Softw
Thanks. Looks like this IP for example is OK:
http://www.dnsstuff.com/tools#spamDbLookup|type=ipv4&&value=84.255.239.131
Look at the entry that marks it as spam. Try to connect to the site when
using Tor. I guess it says "SPAM" only because the operator of the
TORDAN-EXIT is anti-Tor.
On 20
Is there a resource that can tell me whether e-mails from the IP of a
particular exit node are likely to be flagged by the recipient mail
server as spammy.
I've noticed that sometimes mail gets sent to the spam folder. Sending
the very same email from a different exit node goes to the inbox.
Hello!
I am looking for Tor friendly webmail operators. By this, I mean ones
that do not insist on SMS verification and do not block Tor.
I used to be happy with openmailbox.org but they now block new sign-ups
that use Tor.
I like ruggedinbox.com which is very Tor friendly but they are ofte
Can someone please explain why services like Facebook and Gmail are so
wrong when they attempt to geo-locate exit nodes.
As an example, I set ExitNodes to {ru} and logged into my Facebook. This
locked my account. When I logged in Facebook told me there was a
suspicious login. It claimed the IP
On 2015-04-03 20:13, Alexis Wattel wrote:
Sure! Glad to help!
PS. I know this is vague but please ask away for anything you guys are
not clear about or something.
Malicious uses of Tor include child raping through the use of an
anonymising onion condom.
This is not funny. I was raped by
In the Preferences section of the TBB, the proxy is SOCKS 5 on
127.0.0.1.
Since the TBB is a web browser and the web uses HTTP(S), why is the HTTP
settings not used.
I understand that Tor also uses SOCKS (e.g. torsocks). But, even so, the
browser uses HTTP(S). Why does the browser require SO
On 2015-03-16 23:01, Richard Leckinger wrote:
On 2015-03-16 11:33, Sukhbir Singh wrote:
Mike Hearn from Google addressed this issue on the tor-talk mailing
list
in October 2012, where he said this:
"Access to Google accounts via Tor (or any anonymizing proxy service)
is
not allowed unless
On 2015-03-16 11:33, Sukhbir Singh wrote:
I have noticed that when I try to login to my Gmail or Hotmail
accounts with
Tor, I invariably get asked to validate myself (e.g. receive an SMS).
This
is understandably due my IP being in a different country from the
"usual"
IPs that I use to sign in.
I have noticed that when I try to login to my Gmail or Hotmail accounts
with Tor, I invariably get asked to validate myself (e.g. receive an
SMS). This is understandably due my IP being in a different country from
the "usual" IPs that I use to sign in.
However, I have experimented with StrictE
The rest of the server doesn't need to be a hidden server, and SSH can
still listen as both a Tor hidden server and a regular public server,
but by making it a hidden server within Tor, you remove one of the
major risk factors of using Tor: The exit node.
How about running torsocks via a VPN
On 2015-02-16 22:56, Dave Warren wrote:
On 2015-02-16 03:30, blo...@openmailbox.org wrote:
On 2015-02-16 02:31, Dave Warren wrote:
On 2015-02-15 16:35, Mirimir wrote:
On 02/15/2015 02:22 PM, blo...@openmailbox.org wrote:
I want to login to my VPS over SSH.
Is torsocks still a safe way to do
On 2015-02-16 02:31, Dave Warren wrote:
On 2015-02-15 16:35, Mirimir wrote:
On 02/15/2015 02:22 PM, blo...@openmailbox.org wrote:
I want to login to my VPS over SSH.
Is torsocks still a safe way to do this? A lot of the documentation
(such as it is) is several years old.
I prefer to run an SS
I want to login to my VPS over SSH.
Is torsocks still a safe way to do this? A lot of the documentation
(such as it is) is several years old.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/lis
I know there are some Russian members in this forum.
Link:
http://torrentfreak.com/vpn-and-tor-ban-looming-on-the-horizon-for-russia-150212/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/list
On 2015-02-04 00:02, Mirimir wrote:
On 02/03/2015 04:59 AM, Alfredo Palhares wrote:
VPN -> Tor
VPN connection to Tor == Tor connection through VPN
getting your anonymity (Tor) more privately (VPN)
easy setup; VMs not needed; firewall prudent; use PayPal for VPN
safe with Tor browser;
https://blockchainbdgpzk.onion/wallet has been down since yesterday.
It just says "quota exceeded".
Very annoying especially since you cannot use the non .onion site if you
are using Tor!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
htt
Is this a valid app for using Tor on the iPhone?
https://mike.tig.as/onionbrowser/
Thanks!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 2014-08-14 00:18, Roger Dingledine wrote:
On Wed, Aug 13, 2014 at 10:06:00AM +, blo...@openmailbox.org wrote:
If it's possible for the owner of a hidden service (whether the FBI
or a regular person) to install malware which grabs visitors' IPs,
then what is stopping any hidden service own
A recent story in Wired is entitled "Visit the Wrong Website and the FBI
Could End Up in Your Computer" by Kevin Poulsen
(http://www.wired.com/2014/08/operation_torpedo/). The story involves
the FBI uncovering the IP addresses of numerous users of a Tor hidden
service.
I know this was mention
67 matches
Mail list logo