Iain Learmonth wrote on 5/5/19 04:29:
This might be related to the extensions certificate issue we're
currently in the progress of fixing. Can you try the workaround here:
https://blog.torproject.org/noscript-temporarily-disabled-tor-browser
and let us know if that fixes it?
No this was a dif
Lee wrote on 5/5/19 10:46:
note from my firefox user.js:
// dunno what gfx downloadable fonts are, but don't do it
// user_pref("gfx.downloadable_fonts.enabled", false);
// breaks umatrix icons, so make sure they're unbroken
user_pref("gfx.downloadable_fonts.enabled", true);
For tbb y
I installed ublock origin since I like that more than Noscript, but it
doesn't display all the parts of the interface, like the big power
button is missing as well as some other buttons. I attached some
screenshots, normal.png is what the interface normally looks like and
torbrowser.png is wha
grarpamp wrote on 03/10/2017 01:04 PM:
On Fri, Mar 10, 2017 at 8:05 AM, Udo van den Heuvel wrote:
My system was used for Dorkbot traffic.
How could I block that?
1) 'Exitpolicy reject' the people complaining to you about "bots".
2) Reply to the email they spammed you with by attaching the exit
Anyone know about this and how to block it? usually there is a dst_ip
field but not in this case
infection => 'bots', subtype => 'dorkbot', port => 'tor-node', naics =>
'518210', public_source => 'AnubisNetworks', asn => '209', tag =>
'sinkhole', sector => 'Communications', family => 'dor
Jon Tullett wrote on 03/03/2017 10:47 AM:
On 28 February 2017 at 06:07, scar wrote:
I believe we should encourage
sinkhole/honeypot operators to just block/ignore Tor exit IPs that connect
to their traps. what do you all think?
Wouldn't that risk giving away the fact that it's
I receive notice quite often (1-2 times/month) from my ISP that they
'detected malicious software' from my IP, ranging from virus, drones,
worms, robots, etc. I am using the 'reduced exit policy' for the node.
Fortunately i am able to update my exit policy with a reject entry. in
hopes it wil
today when tried to play some videos on Hulu, i got a message that
anonymous proxies are not allowed and that i need to use a computer in
the USA. similar issue to what Joshua was experiencing a year ago[1].
my computer is in the USA but the problem is i am running an exit node
so there's no way t
hi i have been running an exit node for several years now. from time to
time i will get banned/warned from sites who decide they want to
ban/block Tor from their servers. usually this is resolved by blocking
access to said sites in my exit policy, and ensuring the sites are using
a tool like TorB
hello i would like to use Skype from my Tor exit node (which is running
Linux) but, for whatever reason, the powers that be at Skype have banned
my IP address. i would therefore like to know how to block access to
Skype in my torrc, so i can resume using Skype.
i've tried asking in the Skype foru
David H. Lipman @ 08/23/2012 01:40 PM:
> Whatever the case, malicious bot activity is being detected and thus you
> should stop using Tor and you should make sure you computer(s) are clean.
well, no, i'm not gonna do that. ;) the server is running linux and not
infected.
when i started running thi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
hi all, i operate the "cave" router from my home DSL connection, and
from time to time it will get suspended because CenturyLink will
notice mailicious traffic from viruses routed thru the Tor network.
most of the time i can block these because my th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Kyle Williams @ 01/28/2011 02:29 PM:
> I'm not sure if anyone has said this yet, but THANK YOU.
>
> You are one of the few who is fighting a big ISP for the sake of
> everyone else. In doing so you spend your time, energy, and reputation
> to help g
13 matches
Mail list logo