-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Brandon Wiley wrote:
> This is
> an interesting method of obfuscation as it seems like it would interfere to
> some extent with the three most popular DPI techniques: string matching,
> packet lengths, and packet timings. However, like most obfuscation
From: "Damian Johnson"
> Never heard of them. If it can talk to the control port to send a
> NEWNYM signal then yes. But in the unpleasantly likely event that this
> is for SEO or the like, please keep in mind that usually a new
> identity != new IP and circuit creation places a high burden on th
On 5/17/2011 12:13 PM, Joe Btfsplk wrote:
>
>
> On 5/14/2011 9:03 AM, David Carlson wrote:
>> Yahoo seems to be changing their e-mail log in security features so that
>> I now get a message that I have an incorrect user name/ password
>> combination on a screen that has a captcha. Trying again wit
Never heard of them. If it can talk to the control port to send a
NEWNYM signal then yes. But in the unpleasantly likely event that this
is for SEO or the like, please keep in mind that usually a new
identity != new IP and circuit creation places a high burden on the
network.
-Damian
On Tue, May
How can I use the KiXtart scripting laguage to change identities ?
DDE ?
COM Automation ?
--
Dave
Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.
On 5/17/2011 3:13 PM, le...@safe-mail.net wrote:
>
> Original Message
> From: David Carlson
> Apparently from: tor-talk-boun...@lists.torproject.org
> To: tor-talk@lists.torproject.org
> Subject: [tor-talk] 504 Proxy loop detected by Polipo
> Date: Tue, 17 May 2011 13:51:42 -0500
On Tue, 17 May 2011 13:51:42 -0500
David Carlson wrote:
> I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received
> the following error message when trying to access
> www.stcharlessingers.com. I was able to access the site when I used
> TorButton to bypass Tor with my Firefox 4.0.
Original Message
From: David Carlson
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: [tor-talk] 504 Proxy loop detected by Polipo
Date: Tue, 17 May 2011 13:51:42 -0500
> I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12.
Some happy Android users out there today... a sample of the reviews of
Orbot 1.0.5.2 from the Android Market
===
It's fixed on Cyanogen 7 now! Well done devs!
by Sheridan– May 17, 2011
Brilliant! Tor everything now works without a custom rom!
by Locky– May 17, 2011
Update fixed every
Sniffjoke looks interesting. I'm having trouble finding a clear description
of what it actually does to the packets to get them past DPI filters. The
best description I could find mentions insertion of fake packets which will
be discarded by the receiver but which will confuse the filter. [1] This
I am using Tor 0.2.2.25-alpha with Vidalia Bundle 0.2.12. I received
the following error message when trying to access
www.stcharlessingers.com. I was able to access the site when I used
TorButton to bypass Tor with my Firefox 4.0.1 browser
The following error occurred while trying to access
ht
On 5/14/2011 9:03 AM, David Carlson wrote:
Yahoo seems to be changing their e-mail log in security features so that
I now get a message that I have an incorrect user name/ password
combination on a screen that has a captcha. Trying again with the
captcha also fails. Turning off Tor with Torbutt
On 5/17/11 11:12 AM, vecna wrote:
> Hi tor guys,
>
> encrypted traffic analysis is an analysis apply to an encrypted session
> in order not to disclose the protected data, but to detect the protocol
> protected.
COOL
> 1) try a blocked TOR version in IRAN, to verify if the session is
> protec
On Sun, 15 May 2011 22:17:50 -0400
katmagic wrote:
> On Thu, 2011-05-12 at 21:42 -0400, Lu Yu wrote:
> > I know how these weights (Wgg, Wgm .) are calculated. But then what?
> >
> > How to choose the path using the weights? My understanding is to
> > calculate the weighted sum of the bandwi
Hi tor guys,
encrypted traffic analysis is an analysis apply to an encrypted session
in order not to disclose the protected data, but to detect the protocol
protected.
the IRAN attack in TOR was, more or less, an attack like them. (more or
less because was based on the HTTPS pattern, not in an an
15 matches
Mail list logo