[I initially sent this just to Mike Cardwell. Sorry about that.]
On 09/09/11 10:36, Gregory Maxwell wrote:
On Fri, Sep 9, 2011 at 6:14 AM, Gozu-san g...@xerobank.net wrote:
Alternatively, one could run Tor on VMs that can only access the
internet via OpenVPN-based anonymity services.
On 01.09.2011 13:24, Roger Dingledine wrote:
Several people have asked us on irc about recent news articles like
http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
Apparently the Dutch police exploited vulnerabilities in the webservers
reachable
On 09/09/11 09:36, t...@lists.grepular.com wrote:
Set up a firewall on the VM to prevent all other network traffic
going in or out of it.
I meant to say set up a firewall on the *host* OS to prevent all other
traffic going in or out of the VM. I'd probably set up a firewall on the
VM it's self
On 09/09/11 06:43, Orionjur Tor-admin wrote:
Very intresting what is the vulnerabilities they used for breaking systems?
In the lite of that facts I don't know what I need to advice my clients
- setting up hidden services on their home computers or on overseas
vdses? (My clients are not
On 09.09.2011 08:36, t...@lists.grepular.com wrote:
On 09/09/11 06:43, Orionjur Tor-admin wrote:
Very intresting what is the vulnerabilities they used for breaking systems?
In the lite of that facts I don't know what I need to advice my clients
- setting up hidden services on their home
On Fri, Sep 09, 2011 at 05:43:50AM +, tor-ad...@orionjurinform.com wrote
2.2K bytes in 45 lines about:
: Very intresting what is the vulnerabilities they used for breaking systems?
This question can likely only be answered by the authorities. The
obvious attacks are against the webserver
Several people have asked us on irc about recent news articles like
http://wireupdate.com/wires/19812/dutch-police-infiltrate-hidden-child-porn-websites-in-the-u-s/
Apparently the Dutch police exploited vulnerabilities in the webservers
reachable over the hidden services. Some people are