On 2/25/16, blacklight . wrote:
> hello there! i don't know if this mailing list works but i thought of
> giving it a try.
>
> i was lately reading an article (
> http://www.pcworld.com/article/3037180/security/tor-users-increasingly-treated-like-second-class-web-citizens.html
> )
> and it was ab
i wonder if you could recommend me what i can do to make such a thing, or
someone who can, you see i am an it student and im eager to learn how i can
make these kind of things and contribute to the tor project, but i need
help from other people to accomplish this.
This email has been sent from a v
As far as I can tell, this would work, and you could do it without any
changes to the Tor network. Just set up a hidden service where the
service is an open proxy.
It wouldn't be transparent to clients, however - they'd need to do some
proxychains-style juggling to connect to their local onion pro
About the issue of exit nodes needing to know to which bridge they need to
connect to, could we not make a system that similair to hidden services,
so that the nodes can connect to them without knowing the actulle ip
adress? If we could design an automatic system in which flash proxies could
be co
You may be interested in the following from the FAQ:
https://www.torproject.org/docs/faq.html.en#HideExits
You should hide the list of Tor relays, so people can't block the exits.
There are a few reasons we don't:
a) We can't help but make the information available, since Tor clients
need to us
hello there! i don't know if this mailing list works but i thought of
giving it a try.
i was lately reading an article (
http://www.pcworld.com/article/3037180/security/tor-users-increasingly-treated-like-second-class-web-citizens.html
)
and it was about tor users getting blocked from accessing a