Hello,
The signature file here:
https://dist.torproject.org/tor-0.4.7.10.tar.gz.sha256sum.asc
Has two signatures, one from an outdated key (expired in 2020) belonging
to Nick Mathewson (2133 BC60 0AB1 33E1 D826 D173 FE43 009C 4607 B1FB) and
the other I can't find anywhere: 11F4 8D36
What
:
On Mar 30, 2022, at 10:36 AM, Alessandro Donnini via tor-talk
wrote:
Hi,
I apologize in advance if this question (see below) was asked (and answered)
previously. I could not find any information on it.
I would like to incorporate a proxy server in my Androd app to perform gate
keeping and t
vides an HTTP Proxy for connecting web browsers and
other HTTP client applications into the Tor SOCKS interface. ..."
Could (a modified) Orbot be used as a device-based proxy server without
interfacing with the Tor network?
Thanks for any thoughts and suggestions about this,
Alex Donn
connection*. I assumed Tor would keep a tunnel open to one guard node,
and that each new session/connection would pass through it.
*In hindsight this I should've only done the GET requests inside the loop.
Here's the script I was running:
https://gist.github.com/maqp/0e5dcf542ebb97baf98d198115e931ea
Hi,
Yikes, I wonder if this is my fault.
I've been experiencing weird behavior with Tor + Stem + Flask Onion
Services dying randomly once every 1..5 days. I wrote a script that's
making connections to a test an Onion Service to see when exactly the
servers disappear -- and creating logs
Yes, run Anonsurf on Linux, Tallow on Windows or some other software that
allows you to route your whole system through Tor and than configure your web
browser to use a proxy.
Poslano sa ProtonMaila
Izvorna poruka
Dana 10. sij 2022. 12:27, Matt via tor-talk napisao/la
Hello,
Is there a way to have HTTP(S) content run through Tor then through a
proxy (HTTPS or SOCKS). For example:
a) Run Tor (entry node, middle node, exit node).
b) In browser (TBB or any other browser) set the proxy settings to a HTTPS
or SOCKS proxy.
c) Connect to a site.
So:
a) website
Dear Tor community,
I came across a post on the Whonix forum recently. Since I am also interested
in this question I copied it here:
https://forums.whonix.org/t/math-behind-honest-tor-nodes/12464
http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/t/math-behind-honest
a
German authority to stop blocking the access to their website via
Tor.
I'm sure it was on one of the torproject mailing lists and this one
seems
the most likely.
Could anybody please send me the link again? Sadly I didn't bookmark
it and
it's no longer in my inbox.
do you by chance mean
d have been quicker, too.
> What, if anything, would I need in a torrc to only get US (or non-EU)
> exit nodes?
A quick internet search leads you to ExitNodes and ExcludeExitNodes
directives.
https://2019.www.torproject.org/docs/tor-manual.html.en#ExcludeNodes
See for instance this sim
ks for the Info.
From a UX perspective its clumsy, because it occupies space that could
be used, otherwise. I prefer the old approach (warning before maximising
tor-browser). The gray letterbox catches my attention. Maybe a different
color, resizing behaviour (e.g. docking to letter boxes) would do
have a Security Clearance but you don't specify what type but I wonder why
someone with a SECURITY CLEARANCE would want to work with Tor
Teor called you out months ago as a US Government Spy and I'm glad that the Tor
Community Council is calling you out with. People can post all
Interesting.
https://notabug.org/themusicgod1/cloudflare-tor/src/master/what-to-do.md
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
My guard is Geoff2 and is failing lots of circuits. Looked it up on tor
atlas and found this
https://metrics.torproject.org/rs.html#details/C66F6BA1877D12F5EE4BCCABF3FC0BC1499C4248
Anyway that I can configure Tor so as not to use nodes with the not
recommended flag (without having to resort
ug=FLAGS GTK+ debugging flags to set
--gtk-no-debug=FLAGS GTK+ debugging flags to unset
Application Options:
--display=DISPLAY X display to use
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi
Hello!
I'm looking for a tool to replace my use of the deprecated/unmaintained vidalia.
Do you know of any tool that:
- displays tor circuits and the streams attached to it?
It is not required to display them on a map, but it should display the 3
nicknames with
country information
Hi,
is there a official meek-client package for debian available?
Regards
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
csis-murdering-ring-cia-operation-russia.html
(banned user)
http://www.scienceforums.net/topic/94483-unification-theory-postulates-and-thought-experiments/
(thread closed by moderator)
Tor-talk is a mailing list specific to Tor. Maybe this is not the best
mailing list for what you need. I found som
)
RelayBandwidthBurst 8000 KB # But allow bursts up to 8000KB/s (64Mbps).
Do you know why atlas is showing 54 KiB/s, only?
Thanks,
Greetz, yanpsz
--
For those of you without hope, we have rooms with color TV,
cable and air conditioning
--
tor-talk mailing list - tor-talk@lists.torproject.org
it to work because it doesn't work "out of the
box" for Mac OS X.
Thanks--
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> Op 17 sep. 2016, om 21:41 heeft Joe Btfsplk <joebtfs...@gmx.com> het volgende
> geschreven:
>
> On 9/17/2016 11:23 AM, Tor Dev wrote:
>>
>> So the bandwidth is probably not sufficient of your relay.
> @ Tor Dev
> Just curious. I received 14 copies of
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
. Also, how can my relay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down fr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sadly, an attack run through tor destined for a uk2 hosting provider is
being met with a null routes for exit nodes under a policy of "wont' be
lifting it any time soon". The group owns several brands spanning data
centers in a variet
Hi,
I know it might be something strange, but still so interesting, you have to see
it here <http://quastugopro.campassure.net/drug.php?dey>
My Best, tor-talk-boun...@lists.torproject.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other setti
Metrics portal shows a drop of around half million direct connecting users:
https://metrics.torproject.org/userstats-relay-country.html
Does someone has a good explanation what happened? The top 5 countries show
the same drop. Is this another botnet that got knocked out?
torland
--
tor-talk
On Sunday 03 January 2016 18:52:29 Nurmi, Juha wrote:
> Hi,
>
> I released refactored new version of Ahmia search engine :)
>
Thanks. It seems that Ahmia does not like adding hidden services with https
URLs.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscri
Hi,
I have my nick registered with OFTC. How do I configure tor-messenger that it
uses the client certificate on connecting to OFTC?
Thanks/regards,
torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi
s mailing list for your
perceived problem (but seem to not have accepted it, being hostile
instead) (IE: getting a separate, portable machine). That really is
the best starting point if you are worried about hardware compromise.
Moving along now, perhaps?
--
tor-talk mailing list - tor-ta
Or maybe they do realize.
We already know that the NSA/GCHQ do not appreciate Tor (per their own
Tor Stinks report included within the Edward Snowden released
content). A process which over time encourages the internet at large
to reject Tor connections (plus makes ISPs generally unwilling
.
With the rest of your mail I fully agree.
-n
p.s. I also concur that an ideal network should always have way more
available than used capacity in order to provide a decent level of
service.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https
/
This one seems specially nasty in the context of Tor. Notice the following
sentence:
Mozilla has received reports that an exploit based on this vulnerability
*has been found in the wild*.
As long as the Mozilla fix is not consumed by TBB you can prevent TBB from
opening PDF document using pdf.js
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20.05.2015 05:10, Paul A. Crable wrote:
I suppose I sound like a disapproving fussbudget, but I have
trouble understanding how and why we allow TOR to be used this way.
I'm all for free speech, but it's still illegal to falsely yell
Fire
On 04/30/2015 09:15 PM, Frederick Zierold wrote:
Hi,
I am very curious how a vendor is detecting Tor Project traffic.
My questions is what are they seeing to alert upon? I have asked
them,
but I was told that is in the special sauce.
Is the connection from the users computer
) to
determine everybody else's uses for Tor).
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
with the type of product you're presenting. Instantly stop
NSA spying with this powerful software orly?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
policy influence may be a better route.
How about Let's encrypt? Are they willing to sign .onion?
Regards,
torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Monday 29 December 2014 09:11:20 Cypher wrote:
The client must not be running a Tor router of their own...
That made me thing of a few questions but I'm specifically wondering
what they mean here.
1. Do they mean that it is confusing to them if I am connecting to the
Tor network from
On 2014-12-26 11:43, Justaguy wrote:
what should happen to these all
Slap 'em all with BadExit flags?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
I have already a web server running to serve clearnet and I want to
provide access to the same site on the same machine via onion service.
What is the easiest way to do so?
Thanks,
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
. How it is
actually done is exactly the critical point, in particular if someone
is trying to declare a plague on all Tor hidden services.
Another possibility, for example - we don't know how well these
darknet sites were set up. If they had the same developer(s), maybe
more than one
+AI6hbylxl3/KQaQZRqa65OkM/2h6EEGEyVGc3MACI
RRGbJXsOSPIhzwW1knGfbJ7rOW1Tvu0rDpj7U6Jm5K5YysZGhxYefXljkOo5uuTd
QrF7dS4d7I1ZapS1oi0m
=vnUr
-END PGP SIGNATURE-
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin
9KFej5j8/sDr1YA6mLdf
=3AVZ
-END PGP SIGNATURE-
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
[Short answer]
As an individual user, I don't need Tor on Mac OS 10.6, but as a developer of a
soon to be released Tor-dependent project I would like to see support continue.
[Long answer]
We are developing a system called HideMeta that relies on Tor and other proven
security components
The question was whether any users need Tor on Mac OS 10.6, and I made the case
for the users of a new system we are about to announce. Also, all we really
want is the tor executable, not the browser component, but we want it to be
signed by the Tor Project (or an equally trustworthy authority
Hi,
This work could be of interest for the TOR project.
https://gnunet.org/sites/default/files/ma_kirsch_2014.pdf
Quote:
TCP Stealth replaces the traditional random TCP SQN number with a token
that authenticates the client and (optionally) the first bytes of the TCP
payload. Clients
regarding bad-relays discussion should be tighter than even a
closed mailing list, is my thought.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 7/21/2014 10:40 AM, ttzeqq wrote:
I am in US.What can I do?
You could try using a VPN before using tor.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
associated with my project (and
I'm not hiding my association with it), so it is fine if the unusual exponent
marks them as such.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/11/2014 11:12 PM, Helder Ribeiro wrote:
4. Make the Popcorn Time fork also **be a relay by default*
whenever possible**.
Nobody would agree to do this on the main tor software for a
thousand reasons, but it's an *app* and you can decide
got.
Your choice.
Regards,
Mark McCarron
All he did was use the word stupid.
-
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
About tor-talk
English (USA)
This mailing list is for all discussion about theory, design, and
development of Onion
...@cryptolab.net
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor
Security andAnonymity
Mark McCarron wrote:
Tor was designed to fit into that global view and provide US
intelligence with the locations of both users and hidden services,
whilst
This is wrong in so many ways.
Edward Snowden's info, hand-in-hand with Prism's details, shows how
NSA/GCHQ hates Tor because they can't break it very well. They have to
exploit browser flaws and/or go around Tor to get what they want. If
they owned Tor from the network perspective
can be stolen there, and redirected
elsewhere for examination.
Anything going out in plaintext had best not be particularly
de-anonymizing or useful to someone who is sniffing (such as logins
would be), let's just say that.
--
tor-talk mailing list - tor-talk@lists.torproject.org
On 25 Jun 2014, at 11:09 PM, Mirimir miri...@riseup.net wrote:
... any Tor user can host a
hidden service. But few people, even experienced web engineers, know
enough to do it securely enough. Also, hidden services are far more
vulnerable than Tor users, simply because they serve stuff.
OK
I did run a tor exit with only port 25 blocked, did push 850 tb in 4 months
and did got 3 abuses so far, 3 % bad traffic is much to high i think
Am 25.05.2014 12:11 schrieb Griffin Boyce grif...@cryptolab.net:
Hi all,
Is there a good reference for the assertion by DOJ that 3% of Tor's
I'm a bit of a newb at this (all of it). But this email thread
(tor-talk) is completely unencrypted, right? And it has to be that
way?
You can see this thread securely using lynx with this URL:
snews://news.gmane.org:563/cacykwb0hzfvsa_k_a6dp4-ppoacjonn+htntlbvxymmrpon...@mail.gmail.com
Hi,
the metrics page shows that the performance of the Tor network degraded during
the last 7 days from around 1.5 sec per 50kb towards 2 secs to complete a 50kb
request:
https://metrics.torproject.org/performance.html?graph=torperfstart=2013-02-18end=2014-02-16source=allfilesize=50kb#torperf
+0.2.4.8-alpha +0.2.4.11-alpha +0.2.4.16-rc
Does it make sense to still recommend 0.2.4.X-alpha/rc client versions now
that 0.2.4 is stable? Or am I misunderstanding the notice.
regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
On Friday 07 February 2014 09:50:52 Sebastian Hahn wrote:
The idea is to recommend all versions which aren't known to be bad, so
that an operator who reads their Tor logs will realize their Tor really
needs to be upgraded in order to remain secure/operational when theysee
it. So, if an -rc
Hi,
What happened to the fast exit statistics on https://metrics.torproject.org?
Why was it removed?
Regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
What happened to the fast exit statistics on https://metrics.torproject.org?
Why was it removed?
Regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/16/2014 09:50 PM, Tim Chorney wrote:
When asked how to run Filezilla through Tor to protect website
passwords, Tim Kosse of Filezilla advised I should “use FTP over
TLS (FTPS) or SSH File Transfer Protocol (SFTP) to connect to your
server
Hi,
the metrics page provides a graph about tor relay versions and shows that
version 0.2.4 goes straight up. I am wondering if there are statistics
about the different client versions that are used by end users.
thanks regards,
torland
--
tor-talk mailing list - tor-talk
is that this is not a technological issue.
it's a user issue that will, in the end, breakdown at the rtfm point.
currently, the tor browser bundle has a link on the opening page which
documents the standard tips on remaining anonymous. outside of writing
more detailed instructions on identity correlation and linking them
powerful. If there was a checkbox client side where I could select
such a behavior, I would . Not saying it's feasible, or a good idea to
do it that way, or even necessary. But in theory, sure.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
On Friday 03 January 2014 18:25:32 C B wrote:
Incomplete list
Blocking access from Tor Browser
Also blocking access from Tor exit nodes
https://www.healthcare.gov/
https://www.kohls.com/
I can access both with TorBrowser via this exit:
https://atlas.torproject.org/#details
Exim or postfix are not so hard to learn and roundcube is pretty
easy to install :)
Postfix does not work with tor.
There are a few problems:
- Postfix does not have a SOCKS4a proxy option (in fact, no proxy
option)
- TorDNS cannot handle MX lookups. So running postfix on a
transparent
the power, it may need a
FCC certification. In which case you would need someone to finance
the certification every time a new version of the Gnu firmware is
released (FSF perhaps?).
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https
Hi,
in October I tried to access the blog of Neelie Kroes with Tor browser. Neelie
Kroes is Vice-President of the European Commission and responsible for the
Digital Agenda for Europe. At that time she asked the public in her blog about
their views:
http://ec.europa.eu/commission_2010-2014
1) Create a list of tor exit nodes that do not block port 25
2) Command the tor daemon to exit those nodes exclusively.
SSL-SMTP configured to works over 465 port in most cases.
On Windows Yes.
SMTP over ssl/tls is configured on port 25. Starttls, aca
submission, is configured for port
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/19/2013 06:50 AM, Mark McCarron wrote:
Date: Mon, 18 Nov 2013 21:11:40 +0100 From:
t...@unterderbruecke.de To: tor-talk@lists.torproject.org Subject:
Re: [tor-talk] New TOR Service Suggestions and Enhancements
-BEGIN PGP SIGNED MESSAGE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/19/2013 07:04 PM, Mark McCarron wrote:
Date: Tue, 19 Nov 2013 11:47:06 +0100 From:
t...@unterderbruecke.de To: tor-talk@lists.torproject.org Subject:
Re: [tor-talk] New TOR Service Suggestions and Enhancements
-BEGIN PGP SIGNED MESSAGE
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/18/2013 05:23 PM, Mark McCarron wrote:
With all the recent crack downs on civil liberties, seizure of TOR
services and general censorship that is now hitting even
mainstream search engines, I would like to propose a set of new
services
is
sent. This means it should make attempts in this order:
1) Create a list of tor exit nodes that do not block port 25
2) Command the tor daemon to exit those nodes exclusively.
3) Send the message SSL over Tor, direct to the recipients mail server.
4) If that fails, SSL without Tor
on the fly while connected to Tor?
You can use the Tor Compass page to get a nice overview of all fast exit
nodes:
http://is.gd/1kmZRB
On the Torstatus page you can see all currently running relays:
http://torstatus.blutmagie.de/index.php?SR=BandwidthSO=Desc
For node selection please check the FAQ
DER SPIEGEL has an article (german) about how to setup a Tor router
using Rasperry Pie:
http://is.gd/FhUEQ4
It is interesting to see how this kind of news reaches mainstream
media after the PRISM disclosure.
Regards,
Torland
___
tor-talk mailing
there,
I have a concern regarding exit nodes in Tor. In my mind it is possible
for an attacker to run a malicious exit server that gathers information
at the exit point. Of course, this does not compromise anonymity per se,
but it still can reveal sensitive data to malicious people. I think
Yesterday evening the German TV magazine ttt showed a
program about the darknet and Tor. Online there is a
recording available:
http://is.gd/eofnVF
Unfortunately only in German. But the page also provides a
German transcript of the TV program.
Regards,
Torland
? a trusted
organization is needed to run web-tor relay and hidden service.
if inbox size is limited to a few mbs
I'd maybe want to limit the amount of email a user can *send* in a given
time span.
right, 20 mails a day will do. the service does not need to be free.
any cheap vps
I would
think? the setup is easy to maintain. if inbox size is limited to a
few mbs any cheap vps thats like 20$ a year can be used to service hundreds of
thousands of accounts. a trusted umbrella organization is needed to maintain
the server as anonymity is increased by increasing users count. is the tor
I would think that simply finding a mail server that doesn't log
ANYTHING (like what StartMail is about to offer) and encrypting
everything should be enough. Of course, you'd need to trust that the
service really isn't logging anything but that could be solved by
accessing it via Tor.
So
administrator to make sure the proxy server is
working.
Surely it's already been covered in Forums for raw beginners like me?
JT
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Many thanks, Moritz.
You are spot-on.
I deleted all my existing Tor stuff, downloaded a new Bundle and - hey,
presto - Tor Browser is connecting again!
Most grateful.
JT
On Mon, Apr 15, 2013, at 04:38 AM, Moritz Bartl wrote:
Hi,
Tor Browser Bundle should work without any configuration
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 06/03/13 20:00, Griffin Boyce wrote:
Hidden services are definitely weaker than regular Tor
circuits, a) because the adversary can induce them to speak,
Care to elaborate on that? You mean timing attacks (based on the
fact that hidden
On Saturday 23 February 2013 19:03:17 Nam Su wrote:
As I know, Tor is slower than normal Internet. However, when I tried to open
Tor website http://torproject.org;, I couldn't open it. However, when I
tried to open Tor website with Tor, it opened successful.
I know Tor http website redirects
/UvMTJCXMAm0BC4jHZBOH3a5aXtDjKH0m8zmUHcWQH/+Grz3dlm5dq139
cAc9PDN9/1Ol
=lMQy
-END PGP SIGNATURE-
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 16/12/12 17:06, Jerzy Łogiewa wrote:
Why not good idea?
To be true, all free Wifi user should be suspicious. Why this would
be any different?
The problem is, there seems to be a much higher ratio of bad:good Tor
exit nodes than bad:good
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/12/12 15:12, Jerzy Łogiewa wrote:
I would like to do some small experiment hiding distributed
database server (2 or 3) with .onion. Every server should synchro
over Tor exclusive and not know actual IP of any other. Database
would
1 - 100 of 214 matches
Mail list logo