On 2019-09-13 6:17 p.m., nusenu wrote:
> I suspect these non-exit relays are up to no good
What was risky about those relays? They all seem to be running Tor
0.3.5.8 with no contact given. Is that a
Btw your message looked corrupted like a binary virus or some such until
i turned on enigmail;
On Sat, Sep 22, 2018 at 5:49 PM, qubenix wrote:
> I've notice over (at least) the past few days that while using tbb all
> links to Reuters that I follow end up on a "Page not found". Even
> https://reuters.com shows it. This is with or without scripts allowed.
>
> Have others noticed this? Is
On 27/12/17 12:51 PM, Fernando Fernández Mancera wrote:
> Hi,
>
> about point 2 if I am not wrong, in your tor browser path you should find
> the torrc file that it uses.
Not shown in manual but if you have TBB check at
./tor-browser_en-US/Browser/TorBrowser/Data/Tor/torrc
ExcludeNodes isnt in
On 03/11/17 03:38 AM, Jon Tullett wrote:
> On 31 October 2017 at 07:07, x9p <t...@x9p.org> wrote:
>> On 2017-10-30 23:47, krishna e bera wrote:
>>>
>>> I tried to donate by Paypal via TBB (medium security setting) and got an
>>> error page when it was
I tried to donate by Paypal via TBB (medium security setting) and got an
error page when it was almost done:
"
Method not allowed
Method not allowed. Must be one of: POST
"
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
There can be no guarantees - all software has bugs. However Tor Project
people are making best efforts to help users get anonymity and security.
https://blog.torproject.org/tor-social-contract
TorBrowser cannot protect you against exit relay operators who sniff the
contents of traffic. You
On 21/09/17 11:25 AM, grarpamp wrote:
> https://netzpolitik.org/2017/secret-documents-reveal-german-foreign-spy-agency-bnd-attacks-the-anonymity-network-tor-and-advises-not-to-use-it/
>
>
On 20/09/17 06:00 AM, Alec Muffett wrote:
> In certain respects this can be read as "TBB's threat model excessively
> trades-off consistency and usability in favour of protections which
> $SOME_MAJORITY of its userbase do not actually need" - but I'm okay with
> the status quo.
>
> I would rather
On 13/09/17 11:41 AM, "I" wrote:
> https://zerodium.com/tor.html
Anyone caught selling Tor bugs and exploits to anyone but TorProject
should be subject to some kind of severe penalty. It is an offence
against the right to privacy, in other words a crime against humanity.
Well, a misdemeanor
On 30/08/17 10:07 AM, Ben Tasker wrote:
> On Wed, Aug 30, 2017 at 2:55 PM, Jon Tullett wrote
>> For example the "China Dissident Blog" could choose a stable site hosted
> in the United States or Europe and have it point to the current unvalidated
> name. Or they can just
On 12/08/17 07:59 AM, eric gisse wrote:
> Please don't use OpenDNS. They insert ads into lookups.
thanks, fixing.
>
> On Fri, Aug 11, 2017 at 7:07 PM, krishna e bera <k...@cyblings.on.ca> wrote:
>> On 11/08/17 06:42 PM, blo...@openmailbox.org wrote:
>>> I am a
On 11/08/17 06:42 PM, blo...@openmailbox.org wrote:
> I am a little confused when using Tor with https://browserleaks.com/ip
>
> My exit node is ogopogo in Canada. But the "DNS leak test" component of the
> above page says that my DNS servers are in Belgium:
>
> 74.125.181.9 n/a Google
Followup: laws passed.
"
President Putin has signed a law that, as of November 1st, bans
technology which lets you access banned websites, including virtual
private networks and proxies. Internet providers will have to block
websites hosting these tools.
...
Accordingly, the President has signed
On 22/07/17 08:14 AM, Udo van den Heuvel wrote:
> Hello,
>
> Where can I find the tor ReleaseNotes for 0.3.0.9 that actually mention
> details about changes in 0.3.0.9?
>
> Kind regards,
> Udo
>
These?
https://lists.torproject.org/pipermail/tor-announce/2017-June/000133.html
--
tor-talk
On 04/07/17 02:13 AM, intrigeri wrote:
Answered on tails-...@boum.org.
That shows as a mailto: link. Perhaps meant to point to
https://mailman.boum.org/pipermail/tails-dev/2016-August/010898.html
which leads to these issues:
https://labs.riseup.net/code/issues/7380
On 18/06/17 05:50 AM, Alec Muffett wrote:
In other news, the FB Onion, for some time after it launched, geolocated to
London. I can't imagine why.
How can a .onion geolocate anywhere? Arent they supposed to be entirely
in cyberspace and hidden?
--
tor-talk mailing list -
Am 08.06.2017 um 21:16 schrieb Suhaib Mbarak:
> My task goal is to show how Tor works and to proof that it
> relay anonymise user traffic...
> My question is to make sure wether tor source code is open and
> available for public or not?
> In case it is open source and can be modified how it is
A blog post that envisions Tor working as part of mainstream infrastructure.
https://medium.com/@alecmuffett/tor-is-end-to-end-encryption-for-computers-to-talk-to-other-computers-34e41d81c9e2
"
Tor protocol enables end-to-end encrypted communications between
computers — eg: Tor Browser on your
On 25/04/17 05:37 AM, c...@browserprint.info wrote:
I'm a PhD student.
I have no employer other than my university.
All my work is done with the intention of publishing it in academic journals,
conferences, my blog, and my thesis.
Going to the site we can see this project purports to be run
On 01/04/17 10:12 PM, neokulak wrote:
So the Tor mailing list is now being used to promote anti-Semitic spam?
How lovely.
This mailing list is not filtered through a moderator, which means stuff
gets through and abusers of the list get removed after the fact.
Some hate propaganda like that
"The Department of Justice filed a motion in Washington State federal
court on Friday to dismiss its indictment against a child porn site. It
wasn’t for lack of evidence; it was because the FBI didn’t want to
disclose details of a hacking tool to the defense as part of discovery.
Evidence in
""Year Zero" introduces the scope and direction of the CIA's global
covert hacking program, its malware arsenal and dozens of "zero day"
weaponized exploits against a wide range of U.S. and European company
products" [0]
The good news is no mention of exploits against Tor, TorBrowser, TAILS,
On 10/01/17 11:44 AM, Joe Btfsplk wrote:
On 1/10/2017 3:53 AM, Georg Koppen wrote:
Joe Btfsplk:
How does Browserspy.dk get the correct local time & time zone from TBB
6.08 on my PC?
I guess https://trac.torproject.org/projects/tor/ticket/20981 is a good
candidate for explaining this.
On 10/01/17 08:30 PM, grarpamp wrote:
Rather than disclose the source code that the FBI used to target a
child porn suspect, federal prosecutors in Tacoma, Washington recently
dropped their appeal in United States v. Michaud.
The case is just one of 135 federal prosecutions nationwide involving
On 02/12/16 01:28 PM, Flipchan wrote:
Hidemyass did deanonymize and gave out information to the goverment
about One if their own users. If dns is your problem run dns throw
Tor. Use dnscrypt throw Tor . A cpanel is often just some php script
sure it might record ur ip and useragent But that is
On 12/11/16 04:40 PM, John Doe wrote:
Recently, Istumble relatively often over a message by my Antivirus
that a file was removedfrom the TB “doomed” cache, where binary
files like images are cached. These filesseem to contain an exploit
like “Win32/ShellCode.A”. Firstly Iassumed a bad exit node
On 02/11/16 09:17 PM, grarpamp wrote:
On Tue, Oct 25, 2016 at 5:04 PM, krishna e bera <k...@cyblings.on.ca> wrote:
Perhaps our new Board member from CMU can provide more details
Tor is not transparent. Sorry. Move along.
(Or contact the press office for some unfreespeech.)
On 25/10/16 01:55 PM, tort...@arcor.de wrote:
http://www.theregister.co.uk/2016/10/25/judge_orders_fbi_to_reveal_whether_exploits_were_okayed_by_white_house/
"The case is one of several the Feds are pursuing against more than 100 alleged
users of the child sex abuse material exchange network
On 11/10/16 12:17 PM, Flipchan wrote:
Hi *:)
I have been playing around with some telnet and ssh honeypots lately and caught
some malware to learn More about reverse Engineering. And i thought it would be
cool to run a Tor honeypot , something that listens on port 9001 and is ofc not
On 04/10/16 10:03 PM, Joe Btfsplk wrote:
In TBB 6.0.5 (Win), NoScript 2.9.0.14 it seemed to be misbehaving.
It wasn't showing many trackers in the icon drop list, on sites where
there would be plenty.
I UNchecked "Allow Scripts Globally."
I uninstalled it - closed TBB. Removed NoScript
We are already starting to see people switching away from Google for
privacy reasons and soon it will also be because of censorship
(nationstate edicts and EU "right to forget") and biasing (due to
Google's political involvement, e.g. suppressing typeaheads negative to
Clinton). The alternative
On 26/09/16 03:02 PM, Joe Btfsplk wrote:
> But several current, relevant technical questions I've asked about Tor
> issues get no comments.
> Questions I'm pretty sure a lot of people would be interested in. And
> that at least some advanced users would have partial answers or
> suggestions for,
On 20/09/16 01:28 PM, Andrew F wrote:
> How do i check the archives? thanks
Look at the bottom of every message on the list (including this one):
there is a link to the website that contains the archives.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other
On 14/08/16 05:23 AM, shirish शिरीष wrote:
at bottom :-
On 13/08/2016, grarpamp wrote:
Общество шифропанков
http://vabu56j2ep2rwv3b.onion/
BitTorrent трэкер.
http://vabu56j2ep2rwv3b.onion/Tracker.html
Это одна из его установок которую вы можете использовать в своих torrent
When trying to login to Youtube from TBB, NoScript blocks a bunch of
stuff seemingly related to fonts (see screenshot at
https://postimg.org/image/c0sfrf2kh/41fa1875/ ), and i cannot proceed
(the Sign In button doesnt work. Otherwise Youtube works fine with
HTML5 videos.
The website's font
> Should add that users with NoScript enabled would not have been
> vulnerable - I get the "noscript decreases privacy" argument, but I'd
> still kinda like it to be on by default to protect users. Maybe with a
> big red "Turn on Javascript because I'm happy to get pwned by
> malicious ads, FBI
On 07/05/2016 06:51 PM, grarpamp wrote:
> On 7/5/16, gdfg dfgf wrote:
>> how accurate are this results?
>> https://imgur.com/a/6cZjf
>
> Be sure whatever tool you're using is not in fact bypassing tor.
> Browsers are often a quick hack, better standalone tools exist
> for more
On 07/05/2016 12:30 AM, Paul Syverson wrote:
> On Mon, Jul 04, 2016 at 10:55:25PM +, Cannon wrote:
>>
>> Just a paper I found, thought you all might find it interesting.
>> What are your thoughts on this?
>>
>>
>> http://www.ohmygodel.com/publications/usersrouted-ccs13.pdf
>
> A work of
On 06/26/2016 04:59 AM, grarpamp forwarded some links:
> https://www.reddit.com/r/TOR/comments/4pw7bz/tor_infiltrated_by_cia_agent/
Incident summary.
> http://pastebin.com/WPAmqkW8
Can one of participants verify that as an authentic unedited transcript
of the tor-internal irc? I'm guessing a
On 06/17/2016 03:39 PM, Florian Weimer wrote:
> Is there a constellation of bugs which recently conspired in such a
> way that a web server might receive a flood of HTTPS requests on port
> 80/TCP instead of 443/TCP?
It is only a convention (common practice) that HTTPS listens on port
443. A
On 05/18/2016 11:40 AM, Joe Btfsplk wrote:
> I'm surprised there are no discussions or questions on tor-talk about
> this issue .
> Since any exploits - whether due to "flaws" in Firefox or TBB, or not -
> potentially have broader implications & applications.
>
> Normally, there'd be many
followup-
Mozilla files brief in the case to get disclosure before defendant:
https://blog.mozilla.org/blog/2016/05/11/advanced-disclosure-needed-to-keep-users-secure/
Since the case involves TorBrowser more directly than Firefox, will Tor
Project legal team also file an /amicus curiae/ ?
(The
On 05/06/2016 08:53 PM, Jonathan Wilkes wrote:
>> Go to https://www.torproject.org/download/download and click on 'source
> code'.
> Starting from the frontpage I click on the "Download" button and arrive
> here:https://www.torproject.org/download/download-easy.html.en
> And no obvious links to
(quote from article [0])
The rule change, sent[1] in a letter to Congress on Thursday, would
allow a magistrate judge to issue a warrant to search or seize an
electronic device if the target is using anonymity software like Tor.
Over a million people use Tor to browse popular websites like
On 04/03/2016 10:06 PM, grarpamp wrote:
> https://www.thestranger.com/slog/2016/03/30/23885710/police-go-on-fishing-expedition-search-the-home-of-seattle-privacy-activists-who-maintain-tor-network
> https://twitter.com/seattleprivacy
>
quote:
> Robinson said the authorities should have known
"In February 2015, the FBI seized a dark web child pornography site and
ran it from their own servers for 13 days. During this time, the agency
deployed a NIT against people who visited specific, child pornography
threads, which grabbed their real IP address, among other technical
details."
On 03/26/2016 07:32 AM, CANNON NATHANIEL CIOTA wrote:
> Seeking technical information on how hidden services were de anonymized
> and what updates to HS protocol was applied as a mitigation.
> Thanks,
https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous
--
tor-talk
On 03/17/2016 03:09 AM, Ben Stover wrote:
> Assume I wrote some instructions into "torrc" file with wrong syntax.
>
> How do I get informed about this mistake?
>
> Is there a logilfe?
>
> Can I enable a warning prompt?
>
> Or are such invalid instructions simply silently ignored?
tor
On 03/19/2016 07:02 AM, Oskar Wendel wrote:
> Roger Dingledine :
>> The third question you might ask is: can I inject these signals in a
>> way that they're still recognizable to me, but observers don't realize
>> that anything weird is going on with the traffic? That is, can I do
>>
On 03/12/2016 10:18 AM, Spencer wrote:
> 1 de·sign verb \di-ˈzīn\
> ...
> Copied -dev, -ux, and -teachers once for relevance but, should there be,
> responses live on -talk.
Dictionaries and etymology can be fun and controversial and offtopic.
What are you trying to say about "Design" and Tor?
Are developers working on the mouse wheel browser leak?
http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html
https://www.rt.com/viral/335112-tor-mouse-movements-fingerprint/
When i tried the demo, Noscript was blocking javascript on the page.
--
tor-talk mailing
On 02/22/2016 04:03 PM, Guido Witmond wrote:
> If either the blogger or responder wishes to send a private message,
> they can use the others' persons public key after validating there is no
> MitM. Message transport goes through the site. After a few round trips
> of messages, there is certainty
https://user.riseup.net/forms/new_user/first
- works with Tor
- does not require alternate email or phone
- does not tolerate spamming
- supports StartTLS
- does not send or log ip addresses
- requests donations, bitcoin accepted
more info:
https://help.riseup.net/email
On 02/09/2016 01:15 PM,
A recent Schneier blog points to this research
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2700347
Summarizing, it seems possible to match anonymized users (at least in a
marketing profile sense) to registered users or past purchasers, by
analyzing how they interact with a site. I wonder
On 02/07/2016 07:25 AM, nusenu wrote:
> Fabio Pietrosanti (naif) - lists:
- it is *not* a good idea to run exits from your home (limited exit
policies are no guarantee for no troubles)
>> It depends only on how finely we can be capable of precisely defining
>> the destinations to which
On 15-03-10 08:38 PM, z...@manian.org wrote:
Fred says the deterministic builds for iOS are impossible because Apple's
FairPlay DRM.
RAM can't be trusted either.
Everytime I think we've hit local peak dystopia, we go deeper.
On Tue, Mar 10, 2015 at 3:17 PM, Mike Perry
On 15-03-05 02:07 PM, t...@t-3.net wrote:
On 03:05:2015, Travis Bean wrote:
Stuff
I wonder if this giant pile of mess you've posted in this mailing list
is related to the products/services you are trying to sell on the web
site linked in your sig?
I didn't like what I read there. You
On 15-02-07 02:29 PM, grarpamp wrote:
On Sat, Feb 7, 2015 at 5:01 AM, Mirimir miri...@riseup.net wrote:
if you ever need info about anyone at harvard just ask.
i have over 4000 emails, pictures, addresses, sns.
They trust me — dumb fucks.[0]
They are tapping the cables and getting ip addresses of browsers, then
sharing that with other intelligence agencies. E.g. you could be
stopped at the border if someone in your house clicked on a monitored site.
Another reason to use Tor (not an uppercased acronym) all the time.
The new copyright law in Canada would seem to require anyone claiming
ISP safe harbour protection to log data of users for 6 months and to
forward alleged copyright violation notices to them.
What about making a TorProject filter list for Adblock* users so that
we all look the same to sites visited?
Or go further and include (or add some functionality of) RequestPolicy
into TBB. Its purpose is to ensure no URLs outside the domain you
intended to visit are opened, and the user has to
On 14-12-21 06:54 PM, Thomas White wrote:
Ok now the dust has settled a little, a few updates on the situation:
1. The likelihood of this being the work of law enforcement seems to
be lower than originally anticipated. This is good in many ways but
asks more questions than it solves right
On 14-09-23 12:45 PM, Fabio Pietrosanti (naif) wrote:
Il 9/22/14, 11:42 PM, grarpamp ha scritto:
Whether clones or worse, there's something
very weird going on with these guys.
Here an OSINT notes/analysis on several of that suspicious software:
On 14-09-11 04:36 PM, John Pinkman wrote:
It all started 4 days ago, when PinkMeth site posted a profile with the
self-taken nudes of the daughter of the company owners.
[http://pinkmethuylnenlz.onion/us/pa/ligonier-pa/jeanne-markosky]
The company, Markosky Engineering of Ligonier, PA and
On 14-09-10 12:26 AM, Griffin Boyce wrote:
Things that are important to note for hidden service operators:
- Firewall rules are really useful for keeping out unwarranted scrutiny.
Would it be better to have a separate firewall appliance to ensure the
hidden service box cannot be as easily
On 14-09-03 05:46 AM, bao song wrote:
10.6 still supports Rosetta to run old apps.
10.7 means having to upgrade EVERYTHING.
That's why I still run 10.6
(and there was even more to be said for 10.4 which ran pre-OSX apps, but my
10.4 machine died).
Do these old apps need to be
On 14-09-03 10:25 PM, Roger Dingledine wrote:
On Wed, Sep 03, 2014 at 04:10:13PM -0700, Virgil Griffith wrote:
https://docs.google.com/document/d/1SaBK664SchhZOP9XBsB8KK63k4xlmMTlkhfF28f2204/pub
[...]
- Figure 3 is a bit weird. Our bandwidth-per-relay stat is a function of
how many total
On 14-08-30 02:31 AM, elrippo wrote:
Very nice :)
My browser, rekonq, reports that your certificate is not valid. Maybe you
check
that.
Kind regards,
elrippo
Am Samstag, 30. August 2014, 02:28:22 schrieb Juris - torservers.net:
Update:
https://www.torservers.net/wiki/tshirt/index
On 14-08-30 07:31 AM, Patrick Schleizer wrote:
Cypher:
On 08/24/2014 09:43 PM, Michael Wolf wrote:
The article was very interesting - except the part about 'here's how you
might want to fix this'. I certainly hope that the Tor project /is not/
accepting patches submitted by NSA or GCHQ! Sure,
On 14-08-24 11:56 PM, I wrote:
Fair enough, although it was published elsewhere.
One thing revealed is that this list doesn't get the full facts from the
TOR core.
Huh? That's a good thing, because this is not a trusted list.
Would be nice to see Tor media coverage linked to from TWN
On 14-08-13 10:26 AM, Ben Healey wrote:
I came across 2 connections that were able to stay established with my
hardware disabled.
The software keeps trying for a while before it gives up.
Secondly, netstat for Windows may be reporting the last active
connections rather than the current state
On 14-08-13 12:28 PM, t...@skrilnetz.net wrote:
Hi,
Not sure if that has been discussed yet... the site torbundlebrowser.org
is a almost perfect copy of the TOR webpage and has a TBB download which
has malware in it. (down at the moment)
http://dustri.org/b/torbundlebrowserorg.html
The
On 14-08-08 04:01 AM, grarpamp wrote:
[Rant aside, people have a right to be forgotten, and those, like CL,
who willfully disregard that right, without verbosely or obviously
saying so in context (ie: mailing lists obviously have self-run, even
public, archives... that you cannot 'delete'),
On 14-08-07 05:57 AM, Andreas Krey wrote:
On Wed, 06 Aug 2014 23:38:54 +, Yuri wrote:
...
So what is the reason that UDP isn't supported?
Because what you describe is a transparent proxy/router, while tor
only offers a SOCKS5 interface and doesn't (and doesn't want to)
care about
On 14-08-07 11:06 AM, mick wrote:
This is worrying.
http://www.theregister.co.uk/2014/08/07/london_cops_close_down_site_arrest_suspect/
If this reporting is accurate, it implies that UK City of London Police
may be co-operating with copyright enforcers in closing down a service
which
On Tue, Aug 5, 2014 at 3:20 PM, Roger Dingledine a...@mit.edu wrote:
On Tue, Aug 05, 2014 at 03:09:29PM -0400, Andrew Lewman wrote:
Given the resources of a national police force, it seems probable they
can create a crawler to simply crawl every permutation of hidden service
addresses on port
On 14-08-02 01:48 PM, Mirimir wrote:
I've been playing with JAP/JonDo routed through Tor. The JonDo client
has a SOCKS proxy option, and it works well with Tor v0.2.3.25
SocksPorts in Ubuntu 14.04.1 x64. I installed Tor from the Ubuntu 12.04
repository, by the way.
After upgrading Tor to
On 14-07-29 04:44 PM, cav78 wrote:
I would like to know if it's necessary to
install or configure a web proxy (privoxy or polipo) with Tor Browser
Bundle 3.6.3 in order to have more privacy or to prevent Dns leaks.
Orbot
(a software for Android) includes Polipo, but I don't see it in Tor
On 14-07-29 07:51 PM, ideas buenas wrote:
Do you mean TBB over a VPN?
No, but if i did mean that, polipo would be even less relevant.
On Tue, Jul 29, 2014 at 9:01 PM, krishna e bera k...@cyblings.on.ca wrote:
On 14-07-29 04:44 PM, cav78 wrote:
I would like to know if it's necessary
On 14-07-24 01:51 PM, s7r wrote:
Using Tor will encrypt your data totally with multiple layers, this
means that your ISP can see that you are using Tor, and nothing more.
They can't see what sites you visit, what data you download,
intercept, modify or alter the data you download, can't see if
On 14-07-24 06:29 PM, ideas buenas wrote:
I don't trust Gmail nor Yahoo. Roger, found another way. No excuses, please.
I am curious why Riseup.net isnt in the list of popular and relatively
secure email providers. Also there must be several large european and
asian free email providers, but
On 14-07-23 07:05 PM, Tempest wrote:
Kristy Chambers:
Have I written, that there is anything creepy about that?
The basic question is, in how the tor project can be trusted if we look
on suspicious activities of tor developers (e.g. choosing worse design
decisions).
the fundamental logical
On 14-07-02 10:59 PM, Seth David Schoen wrote:
ideas buenas writes:
Why is markmonitor.com and its derivates in my TBB? How can I do to delete
this ? Are they watching me?
Hi,
Are you talking about seeing a markmonitor.com rule in the HTTPS Everywhere
Enable/Disable Rules menu?
The same thing happened to Yahoo and AOL users in tor-relays:
https://lists.torproject.org/pipermail/tor-relays/2014-June/004752.html
To summarize, your only practical remedy at this time is to use an email
address not on Yahoo or AOL.
On 14-07-01 04:41 PM, Bobby Brewster wrote:
What does this
On 14-07-03 02:05 PM, grarpamp wrote:
You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget
Alexander Volynkin / Michael McCord
if they have followed a responsible disclosure process, tor developers
should already be working on remedies...
--
tor-talk mailing list -
(tl;dr: humor, no content)
On 14-06-30 02:14 PM, Mark McCarron wrote:
Mick,
I would be very careful what you claim in your emails. I have the capability
of suing you into oblivion, that email constitutes defamation. Nothing like
that was ever said, either retract it or I will take you
On 14-06-20 06:30 AM, Erik de Castro Lopo wrote:
George Kadianakis wrote:
Hello friends,
this is a brief post on recent and upcoming developments in the PT
universe.
Err, sorry, what is PT?
pluggable transport
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
On 14-06-18 07:04 AM, Lunar wrote:
Collecting statistics from Tor exits in a privacy-sensitive manner
--
Optimizing the Tor network to better support the most common use-cases
could make a real difference to its perceived
On 14-06-16 03:17 PM, Joe Btfsplk wrote:
In at least the last couple TBB versions, or longer, I've found
FlashPlayerPlugin_x.x.exe (latest *13_0_0_214.exe) running in background
- numerous times.
Actually, 2 instances of flash exe files are always shown running.
Biggest question is, what is
On 14-06-14 01:00 PM, Collin Anderson wrote:
On Sat, Jun 14, 2014 at 10:07 AM, Joe Btfsplk joebtfs...@gmx.com wrote:
I'm not a legal or embargo rules expert, but I wonder if an embargoed
country or individuals in it, giving money to a non-profit for which they
receive nothing valuable, or
On 14-06-11 04:23 AM, Wayland Morgan wrote:
4) you trust the users ?
5) you trust the websites they will visit ?
Yes. I don't really want or need to know what sites they will be
visiting and nightly rebuilds are a major success factor IMO with
regards to this implementation. If I go the
On 14-06-10 02:12 PM, Wayland Morgan wrote:
I have been considering potentially building some type of remote
jumphost for a University research setting that automatically connects
its users to the Tor network and am looking for feedback/implementation
ideas.
A few assumptions:
1) the
On 14-06-02 12:26 PM, Gerardus Hendricks wrote:
On 6/2/14 3:59 PM, David Rajchenbach-Teller wrote:
I'm curious, how does this fingerprinting technique work?
Like this:
http://www.w2spconf.com/2012/papers/w2sp12-final4.pdf
What if all the HTML5 and CSS3 calls to read back any data in
On 14-05-31 12:59 PM, Tempest wrote:
Bobby Brewster:
What do people who use .onion addresses use to communicate?
bitmessage.ch, which runs the bitmail onion you listed, has been usable
for me. however, the accessibility of the onion has not been consistent
and, at one point, the project
Seems clear to me, the right thing to do is boycott the event or at least
deplore the ban, individually and as organizations. Any chance of Tor
Project signing onto such thing?
On Mon, May 26, 2014 at 9:37 PM, Griffin Boyce grif...@cryptolab.netwrote:
Juan wrote:
I once was told that the
On 14-05-27 01:29 PM, Patrick wrote:
How can any true assessment be made of illegal content if it is encrypted?
I'm curious about this too. What exactly is being measured here?
Exit nodes can catch the domain names of sites being accessed. They can
snoop the contents which would include
On 14-04-12 02:53 AM, elrippo wrote:
Though this doesn't relate directly to TOR, [snip]
Then do not post it here, please.
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
On Sun, Mar 30, 2014 at 4:44 PM, AK aka...@gmail.com wrote:
Hi
I was expecting you to ask something like that :). Well for now it just an
alpha version, so I would not count on it for robust security. In fact,
security is not the main focus of this project (unlike Tails and Liberte).
Of
On Sat, Mar 29, 2014 at 9:48 PM, Ondrej Mikle ondrej.mi...@gmail.comwrote:
On 03/29/2014 01:34 PM, Kus wrote:
FYI, today OpenDNS and Google public DNS servers are blocked too. Other
than that, they're redirecting DNS queries to ISP servers automatically
if
you try to use Google or OpenDNS
On 14-03-22 11:48 PM, Nick Mathewson ni...@torproject.org wrote:
(I'm trying to take some load off of Roger's shoulders by doing
releases myself. This means that the signatures on the release are be
made with my PGP key, not Roger's. Please don't freak out.)
Hmm, it seems the release was
1 - 100 of 187 matches
Mail list logo