Oh that. Figures. That's always the last thing to notice when Windows
doesn't even warn you if it blocks a file.
--leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
Maybe also check DEP settings.
1. Click Start, click Control Panel, and then double-click System. (or
right-click My Computer and choose Properties)
2. Click the Advanced tab. Then, under Performance, click Settings.
3. Click the Data Execution Prevention tab.
4a. Click, Turn on DEP for
Hi,
Say I modify some software under Tor Project license. Can I
amend/update the copyright to include extra contributors without
removing existing content? Is this allowed or would this mean an EFF
lawyer is going to be unhappy?
thanks
--leeroy
--
tor-talk mailing list -
Hi,
At least for OFTC you should be able to connect using tor if you
authenticate. Authenticate during connect [0] and use SSL. Seems to
work well.
Hope that helps,
--leeroy
[0] http://www.oftc.net/NickServ/CertFP/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
Hi nusenu,
I'm glad you asked. Why don't they have the exit flag? It probably has
something to do with MinMeasuredBWsForAuthToIgnoreAdvertised being 500
by default. If you look at consensus-health [0] you see much more than
500. This means, and I'm only quoting the spec [1], that these relay
need
To add to what Roger said,
Roger Dingledine wrote:
But even full scale padding, ignoring the practical side
of how to get a Tor network that can afford to waste so
much bandwidth, doesn't provide protection in the face of
active attacks where you induce a gap on one side and
then observe
Hi,
So I was thinking, perhaps incorrectly, that ng-rend-spec doesn't do
enough to protect very public onion services. Sure, there are
advantages to the proposed changes. What if the adversary is also
someone who can derive the credentials? Encrypted descriptors don't do
much if you can throw
[0] https://www.torproject.org/projects/torbrowser/design/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hello,
To answer your question you might find the Tor Browser design document
[0] a useful read. Font support leads to browser/system
fingerprinting. Plugins and scripts can extract font support lists,
html5 canvas elements can be used together with font
support/rendering, and the way fonts are
Hello,
As described on the contact page of torproject.org:
If you found a security issue in one of our projects or our
infrastructure, please email the respective maintainer. You can find
their GPG fingerprint/key on our developer ldap search page. Due to
the many different projects we have, we
I'd like to point out that if you decide to use another SOCKS proxy
you may encounter another problem. Suppose I bypass the port assigned
to your custom proxy and instead point to the usual tor proxy. This
might occur if a user manually configures the proxy and cannot tell
the difference between
everything in the
plugin.
On 5/26/2015 at 6:40 PM, l.m wrote:I'd like to point out that if
you decide to use another SOCKS proxy
you may encounter another problem. Suppose I bypass the port assigned
to your custom proxy and instead point to the usual tor proxy. This
might occur if a user manually
:o
Oh, nevermind I see you're already associated with that team.
Cool extension. So why the shift from plugin to proxy?
--leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Hi,
Is the Socks-to-Socks proxy absolutely necessary? This could be done
as a browser plugin couldn't it? You might find the work of the
FreeSpeechMe team interesting. They have the objective of integration
with tor which sounds a lot like what you describe. It's probably not
vetted to your
Hi Jeremy,
Thank you for the thoughtful and thorough reply! I think the users of
your software will appreciate you wanting to minimize attack surface.
One thing I've noticed about mitmproxy is that it appears to only
support SOCKS upstream proxies *without* authentication. It's also a
http
If tor had a more modular path selection system like pluggable
transports then work like this would be easier. Instead of forking tor
(perfectly fine of course), researchers could propose alternative path
selection algorithms. The proposals could go through a review then
implementation stage. Then
Ben,
No, because, as I've said. Your deployment of www-front induces the
same design choices. A HS-front is nothing more than a gloriously
encrypted version of the www-front. Same challenges as www-front but
more resources, more computation, more headers, more proxying, more
concern for latency
Oh, there are many, *many* more reasons to have an onion site for
your website than just that. :-)
Such as? A hidden service is by definition hidden. So if you're
willing to have both a HS-front and www-front, how is it that it's not
the only consideration. A tor exit hides the client-origin so
Ben,
Oh wondrous challenges-by-example
About the https. I would just like to point out that FB using https
amounts to nothing more than a glorious kludge to win back people
who've moved on due to privacy concerns. So they try to prove identity
using a CA-cert, then wrap encrypted onion traffic
If you accept payments by certain methods
(non-anonymous) your liability skyrockets
when those payments are issued using the onion.
There you go, there's a reason against.
Incorrect. It's a reason to not accept those payment methods from the
onion.
I'd be curious whether you can find a
You plan to
deploy on a locally run user site yet you claim to be conscious of
breaking the production server. It does not follow.
More typo. You stated somewhere you intend to deploy to a test site
run locally. Something to that effect. I hope I'm not quoting you out
of context. Which would mean
Hi Chris,
Besides filling out a ticket you might try running TBB in debug mode.
Open a terminal and navigate to the folder you extracted TBB. It has a
folder called Browser and start-tor-browser.desktop. Now run:
./Browser/start-tor-browser --verbose
Which you will see from the script starts
Hi,
I think you're putting too much thought into making your site
available as both hidden service and on www. It's not about if you
can, or should you do it. It can be reduced to one thing: do you want
to hide the origin server for the hidden service? If yes, you have to
consider the complexity
Hi Cam,
What kind of web email? Could you be more specific?
--leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi Vincent,
However, how can I validate that the emails were
actually sent over the TOR network?
If you don't have access to the email on the other end you wont be
able to verify the headers. One way you might achieve your goal would
be to access the TorBirdy preferences and using the Test
Pretending an attempt didn't occur to force disclosure doesn't change
the fact that it didn't happen.
In before Andreas, that should be didn't-did
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
The people who operate them are public
figures too.
You're the only one claiming that.
Neither did Roger force the Aachen operator
out - nobody except for LE even can do that.
I'm pretty sure I defended the researcher's right not to disclose
anything. Had nothing been disclosed these relays
Dodgson, Dodgson, we've got Dodgson here!
... in other words, relays are inherently public.
What? did you actually contribute to the conversation? What the hell
does that even mean?
Fine. Relays are public. The people who operate them are public
figures too. To hell with privacy.
HS
I'm not trying to upset anyone but do we really have to stalk every
researcher who adds relays? Honestly, does there need to be a report
on x-number of relays were added, constituting a spike this month to
date? I mean this purely out of respect for tor-related research
worldwide. Engaging in
I didn't say wondering about an anomaly is disrespectful. Assuming you
have the right bring their relay's to everyone's attention is
disrespectful. This is a network around privacy and anonymity
after-all. Isn't there a better way to start a witch hunt? Like
discovering relay's that do something
Wow. You just blew my mind. So anonymity and privacy for users, but
not contributors that make said privacy features possible? By that
reasoning ContactInfo would be mandatory, which it's not. It also
follows that MyFamily would become a high-priority (mandatory) feature
to implement rather than
How hypocritical. You like to change the subject, again. You and Roger
crossed the line when you didn't accept the operator's response and
leave them alone. They only responded because you *forced* them to. A
relay descriptor is not a person. It's a machine processing digital
blips on a wire. A
Hi Yuri,
If this is the concern that request to check.torproject.org might
compromise security, this is the clear indication that TorBirdy/TBB
aren't adequate for the requirements. Clearly, such people should
switch
to VM isolation, and there is no need to ever go to
check.torproject.org
from
Hi Sophie,
If I would like to suggest to add a warning to the Before
using TorBirdy, where would be the right place to do so?
If you would like to submit the feature request what you would first
do is connect to Tor's bug tracker [0]. From there you can either
register for your own account or
Hi teor,
You could run TorBirdy through its own instance of the tor client
software, with a separate socks port.
This would avoid many of the issues you're trying to work around in
b) and c), as TorBirdy could happily send NEWNYM to its own client
instance all it liked. There is a slightly
Hi,
Lodewijk andré de la porte wrote:
And just trying not to be dragnetted at all times. It's important
to sometimes use Tor, just so that when you actually do (one
day, for whatever reason!) it doesn't seem suspicious :)
If you're trying to avoid suspicion you should use Tor for
*everything*.
The ip check hidden behind a warning dialog hinders obtaining
useful data. I'll keep that in mind.
On second thought there is an advantage to discouraging the use of the
check. If something went wrong with the socks port setting using the
check would leak the intention to use tor by connecting
Hi Sophie,
Options b) and c) would be very luxurious, but option a) really
solved my problem, and seems quite important for those who
come from a different background.
There's a strong correlation between the perceived usefulness to
end-users and their support for a FOSS project :) A simple
Hi Sophie,
Hmm...Perhaps Atlas isn't the best choice here. At any given time the
exits you can choose from are those you know of locally. It might be
better to focus on TorBirdy instead.
When using Tor Browser, the tor process is kind enough to take notice
when using certain ports
Hi again,
To demonstrate further the importance of port choice I think a
clarification is in order. From tor's spec [0] an exit may specify an
accept or reject policy. So the number of exits that may allow your
exiting traffic (in this case mail) is those that accept and those
that don't reject.
Hi Yuri,
Yuri wrote:
I understand your concerns. But I would also like to
point out that New Identity for most implies new
identity for everything. This is how, I believe, majority
of technically not very savvy mass users thinks.
The new identity feature is documented to make *new*
Hi Sophie,
Sophie Hassfurther wrote:
How do I look up which ports work on which exit
nodes? I tried searching Atlas, but I didn't find
out how to do a reverse search.
Glad to see the problem appears sorted. To find exit policies I used
the cat and grep commands on microdesc data. This data is
Hi Yuri,
I, er, don't think what you're proposing is the answer to the OP's
problem.
If they're using a port which is only supported by 3 exits they'll
still have the problem. If one exit is blocked and they choose that
one the mail server will see further attempts as possibly malicious.
At
Hi Yuri,
Yuri wrote:
I suggested adding new signal to also terminate old
connections.
https://trac.torproject.org/projects/tor/ticket/15660
The problem of closing the connections gracefully is generally left to
the application. In tor's spec it's explicitly stated that it's the
responsibility
Hi Sophie,
Sophie Hassfurther wrote:
[...] so far choosing a new
identity in Tor did not work for me, but restarting the
Tor Browser worked. So maybe some circuits did not
close?
Just a general question: is it normal to get connected to
the same exit node almost all the time, when I start my
Hi,
I would like to ask if you're using the Tor Browser bundle with or
without modification. When the new identity is used in Tor Browser
(it's my understanding--please correct if wrong) that the circuits
related to open tabs are allowed to close. This is because the NEWNYM
signal is issued while
You might also try exiting TorBirdy completely. Then use new identity
in Tor Browser. Then reopen TorBirdy and see if it's still reporting
the same exit.
--leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Hi,
evervigil...@riseup.net wrote:
If anyone has good intel on some really secure DNS
addresses that would be great currently I'm using
my VPN provider DNS servers and would like to
have some more numbers to add to my list.
You might consider security and DNS a bit of a joke in that
If you'd quote properly instead of cutting the context [...]
To put it bluntly. I read what you typed and saw a justification for
blocking tor. Whether you actually ascribe to the tactic is beside the
point. You typed: if I have no reason to accept tor on my server then
blocking it makes
https://pad.okfn.org/p/cloudflare-tor
That's a list of sites that use CF captchas. I meant CF-enabled sites
which block Tor access entirely with only a message box for the
site-admin. I just figured since the subject was Protest Blocking...
that there would be specific sites where this is
On Thu, 12 Mar 2015 14:16:44 +, ma...@wk3.org wrote:
On Wed, 11 Mar 2015 12:35:53 -0400
l.m wrote:
Which site blocks tor exit entirely? I haven't seen one recently.
https://pad.okfn.org/p/cloudflare-tor
You apparently don't know the difference between
'needs a captcha solved
Which site blocks tor exit entirely? I haven't seen one recently. Most
of the time I just get the copy/paste if Javascript is off. If
Javascript is on I either don't get the copy/paste or I get the
browser fingerprinting page. If I'm not mistaken the browser
fingerprinting site is the only one a
On 3/5/2015 at 5:41 AM, Dan Cristian Octavian wrote:
It's a novel idea to prevent detection of the PT-server by
tunneling in some other traffic instead of being sarcastic, maybe
you can focus on wording your message better, I find it quite hard to
follow what you write :)
I don't think it
ma...@wk3.org wrote:
This could be mitigated by configuring
the mailserver to require TLS, couldn't it?
Hi Malte,
It's certainly the case that you can enforce TLS. But which one? SMTPS
(TLS Wrapper) depends on the client enforcing and maintaining TLS on
port 465 using client-talks-first. It
Hi,
A good try at solving the problem but one which requires all mail
server to get onboard in the presence of established alternatives.
The proof of work system you propose doesn't address the problem of
tampered email contents or if the email was wanted. It *might* prevent
exits from being a
Hi, It would be useful to know how the email account is setup in
general. Whether POP, IMAP, SMTP is used. SSL (TLS Wrapper) or
STARTTLS. Have any changes been made to default configuration of
Torbirdy preferences or non-default tor ports.
--leeroy
--
tor-talk mailing list -
Hi Tomas,
There are two sources for certificates. The personal db and the
hard-coded db. Hard-coded is what TBB uses by default and is located
in the libnssckbi module. Also known as Builtin Object Token. This db
is read-only which is why those entries come back. The personal db is
disabled by
Hi,
It sounds like you need to do a little introspection on why you want
to torify your ssh. You've already confessed to having a lack of faith
in your own technical ability. You need to ask yourself the
question--what is my threat model? You want to connect to a VPS--how
did you pay for this
Wouldn't it be more accurate to say it's takes non-deterministic
latency and non-deterministic signalling to fix anonymity? Since if
either are deterministic by analysis of the application then said
anonymity is provably breakable by signals intelligence. So TCP isn't
enough, neither is padding or
I want to login to my VPS over SSH.
Is torsocks still a safe way to do this? A lot of the
documentation (such as it is) is several years old.
Hi,
I cannot comment on using torsocks but you can achieve the same result
using netcat and the proxycommand of ssh/ssh_config. I found a Tor
Wiki
Alas no. I'm aware this is suboptimal. I see GOOG search engine as
a
temporary-ladder just to get the ball rolling. I am open to using
any
other index. For what it's worth I'm very pleased with GOOG's
performance---right now it's searching an index of 650k onion pages
and the
number grows
Leeroy, to avoid being indexed by Googlebot et al, place the
appropriate /robots.txt at your root. It's described in the FAQ.
Yes I'm aware of the faq. It's just that in using google you'll always
be incomplete compared to ahmia.fi but thats ok by me.
--leeroy
--
tor-talk mailing list -
Hi,
Thanks for hosting a Tor2web proxy. I think I'm using the search wrong
though. What exactly is it supposed to do? If I type in duckduckgo I
don't find a useable link to the hidden service. If I type in the
onion for duckduckgo I don't get any indication that the link is,
well, duckduckgo. To
Patrick Schleizer wrote:
Being able to use the tor-launcher graphical user
interface is what this proposal is for.
You still can. Tor launcher is an extension for firefox. It's not the
same as Vidalia. You would still need to launch the tor process
separately for system use. You could use Tor
Larry Brandt wrote:
If anyone can penetrate their personnel firewall, please
disclose to this group. In most on my dealings, CenturyLink was too
under-employed to respond to my requests.
The problem hasn't even been confirmed as censorship of Tor and you
want to dox them publically using
Mirimir wrote:
Sorry, I wasn't clear. I meant that nobody here has made an argument
that VPN - Tor is definitely not good. I agree that leeroy seems
to
favor Case 2 aka Using a VPN to connect to Tor.
Well lets try to setup an experiment. I'll get you started. It doesn't
require you to be NSA :P
Ben Tasker wrote:
Leeroy - I think what he meant was that if anyone can actually get
through
to someone to talk to (and get a response) - as opposed to breaching a
real
firewall and leaking staff details, at least that's the way I read it.
Good point. My apologies if that's the case. I might
Actually, my apologies. I forgot that if you use the method I
mentioned previously you'll need to issue NEWNYM to the control port
and you won't be able to use the improved new identity feature of Tor
Browser. A better solution.
1. Use a separate script to launch the tor process as previously
nathan...@moltennetworks.co.uk wrote:
[...] I then enabled Pluggable Transports
(meet-google or something like that) and now I'm able to connect to
Tor without any issues. This really concerns me as I was able to
repeat the crash by launching Tor Browser Bundle and crash the router
again.
Patrick Schleizer wrote:
To rephrase this proposal in an alternative way... At the moment, when
you download the TBB package, your only chance to use
tor-launcher/Tor/pluggable transports is to also start Tor Browser. No
way to do that without starting Tor Browser. What is being suggested
here,
Joe Btfsplk wrote:
This VPN Tor (or Tor VPN) subject - and its discussion here has
become complex.
Maybe too complex for all but a handful of folks?
What's complex? Intelligence agencies are reportedly targeting all VPN
providers. Governments are targeting encryption of communications in
the
Joe Btfsplk wrote:
I gather the one with more variables in my favor is Case 2 - Using
VPN
to connect to Tor?
That is the one (some) have said is definitely not good - yes? Still
others may have said that VPN connecting to Tor, isn't as bad as some
have indicated?
Observation: There are a LOT
On 1/31/2015 at 11:13 AM, aka wrote:Hi,
I am using multiple Tor instances on the same machine and my CPU-usage
goes goes way up for a few seconds in exact one hour intervals. Is
this
regular behavior (generating new RSA keys?) or is it an anomaly of an
ongoing attack?
Every hour a new consensus
Patrick Schleizer wrote:
Being able to use the components, tor-launcher, Tor and pluggable
transports that come with the TBB tarball for system use on Debian.
For
use without or with the Tor Browser. Being able to use these
components,
without being forced to run Tor Browser.
Your main concern,
krishna e bera wrote:
They are tapping the cables and getting ip addresses of browsers,
then
sharing that with other intelligence agencies. E.g. you could be
stopped at the border if someone in your house clicked on a monitored
site.
Another reason to use Tor (not an uppercased acronym) all the
grarpamp wrote:
Lara wrote:
I have a OpenWRT router. And I can install tor on that. I would like
to
have a middle relay. Can I hook up my TBB (computer linked over
wifi) to
that tor session? Is it a bad idea? It would be on the same
subnetwork.
TBB likely deploys and expects a specific torrc, and
Joe Btfsplk wrote:
But what I find happens - more than a few times, when a
site doesn't like an Tor exit (it's IP, or it's location), using New
Identity often selects another circuit *very* similar to the
previous;
Yes, Tor attempts to reuse known good exits from the past hour.
It's because
Josef 'veloc1ty' Stautner wrote:Long story short: What type of
relay helps the TOR project more?
Exit-Relay or Middle-relay? Is it really the job from TOR to provide
an exit to the normal internet resources or should the focus be on
hidden services?
First, thank you for operating a Tor node.
Joe Btfsplk wrote:
I don't know that Vidalia is still considered anonymity safe, in
later TBB versions - like 4.02, 4.03.
COMMENTS on that?
Can someone explain about using the following methods - mentioned
earlier?
You might try adding TrackHostExits ..
You might also try AllowDotExit.
You're probably the only one viewing that site using Tor. That would
explain why you didn't have any problem at first. Now they've noticed.
It might be the changing exit node from new identity. Some exits get
listed in well known blacklists. Then the site operators start to pay
attention and they
I know it's off topic but if you do use DNSCrypt by forcing DNS over
TCP make sure you don't use OpenDNS servers. If you're familiar with
OpenDNS you know they have a control panel where you can admin the
service wrt it's external ip relation. DNS based filtering and
monitoring of requests. If you
After missing signature it's now not listed in current consensus. Did
I miss some event?
-- leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
i am concerned about https not being enough to protect tor2web
users. In particular, I am concerned about what subdomain a user is
visiting being leaked. Are there any established ways of preventing
the subdomain from being leaked? Because none spring to my mind.
Where might this be a
Nick Mathewson wrote:
Personally, if I were doing something like this, I'd aim closer to
Yawning's Basket protocol, which uses an established PQ
construction
(ntru in Basket's case) rather than trying to invent a novel one.
While you're asking --
Isn't that like saying who needs SHA-3
Virgil Griffith wrote
For example, if you run an exit node, your regular traffic is
disguised
by exit traffic also coming from your ip#
I'm not sure I would call that use case more private. An observer
could
categorize your traffic incoming from an intermediary relay and time
that
traffic
Hi Hartmut,
I tried to reproduce your problem on Windows. You may have stumbled
onto a bug. Here are my results. Upon loading Tor-Browser, and after
automatic resize, the window has an extra large 32 pixel border along
the bottom edge. The content area is 1000x600 (for my display).
Producing one
Hi, those are not good results. I recommend trying a couple more tests
on panopticlick.
1. After maximizing, then closing, then reopening Tor-Browser, it
resizes automatically--after a couple seconds. Test at this window
size.
2. Use Tor-Button to change identities. The window should resize
Fine I'll remove the replies.
If a normal browser--without Tor works. Then don't worry about the
rules I mentioned.
If the only problem is you get a broken site using the onion address.
Then what is your HiddenServicePort in torrc.
Finally. In a normal browser--without Tor. Do you connect using
Perhaps the new implementation of the hidden services will be better
?
How is it going ?
I don't see anything in the improvements suggested for hidden services
that would help this situation. Though I would be grateful for being
corrected.
First, I just want to say I only meant sheep(s) to
So a normal browser session works. When you try to access the server
by SSH key-based auth. you get a broken site-am I correct? How are you
redirecting/filtering traffic. It may be you need to adjust your
rules.
On 11/30/2014 at 5:39 AM, Umair Razzaq wrote:Hi, this is Umair.
I've posted my issue
To clarify. You have black sheep(s). Look for more than one.
-- leeroy bearr
On 12/1/2014 at 2:55 AM, Mirimir wrote:
In your torrc, create a new test hidden service, and comment out all
of
the rest. The new hidden service should be accessible. If it's not,
you
have other problems. If the new
with .onion address, than only
markup loads up, and images also not loading including scripts
stylesheets. About rules, what kind of rules do i need to set and how.
I
also have read Tor Relays Bridges, is that what you're are refering
to?
Please advise. thanks...
On Mon, Dec 1, 2014 at 2:39 PM, l.m
the HiddenServicePort that is..
-- leeroy bearr
On 12/1/2014 at 6:59 AM, l.m wrote:A normal browser session
(without tor) works? Then don't worry about
the rules.
When you use the .onion address you have problems? What is your hidden
service configuration in torrc?
-- leeroy bearr
On 12/1
I think it's also worth mentioning this may be an attack on your
service via your server's service provider. It's not impossible to
have one HS work fine but many cause timeouts as you begin to enable
all HS. As you begin to increase traffic to guards you give away that
your services are
ändern Sie dann Größe ist gut.
dass Sie
Maximieren Sie ist schlecht. Ist das besser?
-- leeroy bearr
[1] https://panopticlick.eff.org
On 11/30/2014 at 3:51 PM, l.m wrote:I will try to simplify the
explanation. See [1] for more information
on browser fingerprinting. Test with Tor Browser resized
...access to Tor is ambiguous even for a web server. Are you fishing
or looking for help with a forward-reverse proxy? I only ask because
you leave out what you're trying to achieve and it's a given you've
access to the docs. Is your web server a client or server w.r.t Tor?
Producer or consumer?
What do you mean, not really? If you look at number (7) as mentioned
you see the Design Goal *and* Implementation Status. Implementation
status shows the methods used to reach the goal. Clicking on the links
provides all the details you could need to change the behavior. These
are modifications to
.
--leeroy bearr
On 11/8/2014 at 2:00 PM, Soul Plane wrote:On Sat, Nov 8, 2014 at
10:44 AM, l.m wrote:
It's not broken. They explain clearly that the concurrent use of
ixquick/startpage by multiple Tor users at a given exit relay can
trigger automated abuse blocking. They're right. It could
bearr
On 11/8/2014 at 1:43 PM, Sam Pizzey wrote:On 08/11/2014 16:14, l.m
wrote:
How's the presence of a
darknet running on Tor hidden services supposed to make me feel
anyway? That's your freedom being used to poison kids and evade
punishment.
On the contrary, it makes me feel that my freedom
It's not broken. They explain clearly that the concurrent use of
ixquick/startpage by multiple Tor users at a given exit relay can
trigger automated abuse blocking. They're right. It could be abuse.
The same reason Google does it. Why is this a surprise? The problem
with Google is the connection
1 - 100 of 101 matches
Mail list logo