On Thu, Nov 03, 2011 at 02:45:40AM +, Gozu-san wrote:
> Expert review of OpDarknet's "The Honey Pawt" malware, and precisely how
> The Mozilla Foundation was involved, seems crucial. Perhaps The Tor
> Project's "Onion Logo" trademark was infringed, and perhaps The Mozilla
> Foundation did not
Expert review of OpDarknet's "The Honey Pawt" malware, and precisely how
The Mozilla Foundation was involved, seems crucial. Perhaps The Tor
Project's "Onion Logo" trademark was infringed, and perhaps The Mozilla
Foundation did not exercise due diligence. Or maybe OpDarknet just said
that for lul
On 11/02/2011 05:54 PM, Gozu-san wrote:
Is it really possible that over 100 fools would have downloaded a
purported Tor security update from Hard Candy in one day? In the middle
of an attack by OpDarknet? Seriously?
Mozilla stats https://addons.mozilla.org/en-US/statistics/addon/2275
seem t
nobody ever said people were smart, especially when they believe they
are totally secured
Sent from my iPhone 4
On Nov 2, 2011, at 6:59 PM, Gozu-san wrote:
> On 02/11/11 21:00, Perforin wrote:
>
>> Hey watch this!
>>
>> http://pastebin.com/hquN9kg5
>
> Is it really possible that over 100 fools
OK, I get that. Notwithstanding, there is the warning:
"Advice for editors: this page is subject to constant vandalism; before
editing the page, please check history and make sure you don't
contribute on top of the vandalized versions."
Anyway, I note that there is no pornography on the Hard Can
On 02/11/11 21:00, Perforin wrote:
> Hey watch this!
>
> http://pastebin.com/hquN9kg5
Is it really possible that over 100 fools would have downloaded a
purported Tor security update from Hard Candy in one day? In the middle
of an attack by OpDarknet? Seriously?
Hey watch this!
http://pastebin.com/hquN9kg5
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> "[Mike Perry,] you are probably the only one in the Tor Foundation that
> has the technical knowledge to build a dynamic Tor .onion addressing
> hosting service running on PHP aka Freedom Hosting."
>
> ROFLMAO.
Yep. And if you include the lists, we're probably up to what, say, four people.
Oh, y
Thus spake hi...@safe-mail.net (hi...@safe-mail.net):
> According to their latest blog, they've found the Freedom Hosting admin. And
> even Mike Perry seems to be involved in their claims.
>
> http://pastebin.com/qWHDWCre
Hahah. By involved, I guess you mean "mentioned near?" This post seems
to
1) Freedom Networking LLC has the Apache backend.
2) Freedom Hosting server has ngnix front cache to proxy a
backend Apache with PHP safemode on...
...
4) Freedom Server has as business IP internal NAT of 10.0.1.X
Wow, what will happen when these guys find out something about
Conspiracy Theory?!
On Oct 30, 2011 1:16 PM, wrote:
> There also seems to be lots of data missing for them to go from 10.0.1.2
> to claiming it's Mike Perry's server.
Ah, sounds like the "underpants gnomes" method of character assassination.
Step 1: There's a crime! Step 2: Step 3: Profit^WAccusations!
(If
On Sun, Oct 30, 2011 at 11:46:47AM -0400, hi...@safe-mail.net wrote:
> According to their latest blog, they've found the Freedom Hosting admin. And
> even Mike Perry seems to be involved in their claims.
Do we really have to have unsubstantiated allegations by
anonymous script kiddies who really
On 30/10/11 15:46, hi...@safe-mail.net wrote:
> This is starting to get utterly interesting. Is the whole Tor network being
> owned and cracked by the Anonymous hackers?
Don't be stupid.
Take a pile of easily obtainable information. Post it on pastebin with
the insinuation that it adds up to som
Moritz, I don't get the quote (from the pastebin site). What are you
trying to point out?
OK, maybe I'm the only one in the dark. So they named Mike - so what?
So he hosts exit nodes.
I'm all for catching criminals, but to be fair, we'd need to start at
the top & lock up many politicians at
"[Mike Perry,] you are probably the only one in the Tor Foundation that
has the technical knowledge to build a dynamic Tor .onion addressing
hosting service running on PHP aka Freedom Hosting."
ROFLMAO.
On 30.10.2011 16:46, hi...@safe-mail.net wrote:
> According to their latest blog, they've foun
On Sun, Oct 30, 2011 at 01:02:22PM -0400, and...@torproject.org wrote 0.8K
bytes in 23 lines about:
: : http://pastebin.com/qWHDWCre
I should add, Mike Perry can answer with his own psyops message. And I
wonder who is this 'Tor Foundation'?
There also seems to be lots of data missing for them to
On Sun, Oct 30, 2011 at 11:46:47AM -0400, hi...@safe-mail.net wrote 0.4K bytes
in 11 lines about:
: According to their latest blog, they've found the Freedom Hosting admin. And
: even Mike Perry seems to be involved in their claims.
: http://pastebin.com/qWHDWCre
: This is starting to get utterly
On 10/30/11 4:46 PM, hi...@safe-mail.net wrote:
> According to their latest blog, they've found the Freedom Hosting admin. And
> even Mike Perry seems to be involved in their claims.
hahahhaha, it's very fun to see attempt to bring shame against Tor
Project with useless claim!! :)
That's stuff a
According to their latest blog, they've found the Freedom Hosting admin. And
even Mike Perry seems to be involved in their claims.
http://pastebin.com/qWHDWCre
This is starting to get utterly interesting. Is the whole Tor network being
owned and cracked by the Anonymous hackers?
___
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/30/2011 04:46 PM, hi...@safe-mail.net wrote:
> According to their latest blog, they've found the Freedom Hosting admin. And
> even Mike Perry seems to be involved in their claims.
>
> http://pastebin.com/qWHDWCre
>
> This is starting to get ut
20 matches
Mail list logo