On 04/01/2011 09:39 AM, grarpamp wrote:
> For those not tracking this... it appears to have been
> resolved and committed. I've no idea when it might
> appear in an actual release?
> https://bugzilla.mozilla.org/show_bug.cgi?id=280661
On 04/02/2011 09:53 PM, Boris Zbarsky wrote:
> This fix _will_
* Jérémy Bobbio [2011:04:14 08:29 +0200]:
> Here is a possible solution that quickly came to me, but I have no real
> clue on how much work it would need (and if every party involved would
> accept it):
>
> 1. Apply specific Tor patches against Firefox 4 in Debian iceweasel
> package. The c
I've been thinking about a Tor nymserver. It would work like this: POP, IMAP,
and SMTP ports are accessed through a hidden service. From the outside it
looks like a normal mailserver; it sends and receives mail on port 25. The
only way to send email out through it is to connect through the hidde
* Jim [2011:04:14 23:52 -0600]:
> Mike Perry wrote:
> >I now no longer believe even this much. I think we should completely
> >do away with the toggle model, as well as the entire idea of Torbutton
> >as a separate piece of user-facing software, and rely solely on the
> >Tor Browser Bundles, exce
On 2011-04-11 13:04, folkert wrote:
> ssh: connect to host SECRET.onion port 22: Connection refused
Is that on each and every try?
I've seen it a small number of times but the torsocks test works most of
the time.
Udo
___
tor-talk mailing list
tor-talk@
> > ssh: connect to host SECRET.onion port 22: Connection refused
>
> Is that on each and every try?
> I've seen it a small number of times but the torsocks test works most of
> the time.
Yes, each try.
The tor-server on the ssh side has been running for weeks.
Folkert van Heusden
--
MultiTai
Apologies in advance. This is not directly related to Tor. However,
it's inspiring and is related to the circumvention of bad actors
attempting to restrict people's communication. And, maybe they did use
Tor, too! ;-)
Excerpt:
The Wall Street Journal today brings us an amazing story of a few s