On 09/10/2011 10:22 PM, Andre Risling wrote:
I've noticed a lot of people that are concerned about privacy and
security are using Gmail accounts.
Do you really trust Google not to read your email and tell THE MAN what
you've been saying?
No.
But technologies like Tor are general purpose and u
Hi
On Sun, Sep 11, 2011 at 11:22 AM, Andre Risling wrote:
> I've noticed a lot of people that are concerned about privacy and
> security are using Gmail accounts.
>
> Do you really trust Google not to read your email and tell THE MAN what
> you've been saying?
One can use encrypted mail with Gma
On Saturday, September 10, 2011 9:55 PM, and...@torproject.org wrote:
> On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K
> bytes in 16 lines about:
> : Forgive my ignorance but why would there be any need to inspect
> : packets for tunnels? Would the authorities not just ask
I've noticed a lot of people that are concerned about privacy and
security are using Gmail accounts.
Do you really trust Google not to read your email and tell THE MAN what
you've been saying?
--
http://www.fastmail.fm - Access all of your messages and folders
wherev
On Sat, Sep 10, 2011 at 10:08:35PM +0100, pump...@cotse.net wrote 0.7K bytes in
16 lines about:
: Forgive my ignorance but why would there be any need to inspect
: packets for tunnels? Would the authorities not just ask every ISP
: to monitor the IPs to which their clients are connecting and if t
On Sun, Sep 11, 2011 at 12:06:08AM +1000, har...@violaceo.us wrote 3.3K bytes
in 75 lines about:
: For a while I've had my eye on a system that abuses the open nature of DNS
requests to tunnel data out of a firewalled / censored environment. It would be
interesting to see this implemented into t
grarpamp wrote:
>> EVERYONE should be running NTP, of course, not the relatively few that do.
>> If you happen to still be on a windows machine, here is a FREE utility
>
> And if you prefer the open source NTP standard that everyone else uses...
>
> http://support.ntp.org/bin/view/Main/ExternalTi
On Sat, 2011-09-10 at 22:08 +0100, Matthew wrote:
> >> It would be good to know what technologies these ISPs will implement to
> >> do the packet inspection for encrypted tunnels. Half the problem is you
> >> don't really know what they'll be looking for and so you don't know how
> >> to circumven
Thus spake David Carlson (carlson...@sbcglobal.net):
> Yesterday I downloaded tor-browser-2.2.32-3_en-US.exe and set it up on a USB
> stick. When I try to start it, it gives a connection refused by peer message
> just after parsing the GEOP. If I retry, it says Tor stopped
> unexpectedly. Vid
It would be good to know what technologies these ISPs will implement to
do the packet inspection for encrypted tunnels. Half the problem is you
don't really know what they'll be looking for and so you don't know how
to circumvent.
Forgive my ignorance but why would there be any need to inspect
Hi
> I've noticed in Ubuntu that when the computer is booted up and before I
> connect to the web the computer needs the "keyring" password. No matter
> whether I try to change my mac address that stupid keyring thing won't
> let me do anything until it gets the "answer it wants". So the passwo
- Original Message -
> From: "and...@torproject.org"
> Sent: Saturday, September 10, 2011 2:29 PM
> Subject: Re: [tor-talk] Dutch Police Investigation & Tor Spike: Correlation
> Or Also Causation?
>
> The current rumors around this spike in bridge queries and usage is:
>
> 1. Someone c
For a while I've had my eye on a system that abuses the open nature of DNS
requests to tunnel data out of a firewalled / censored environment. It would be
interesting to see this implemented into tor bridges as an additional method of
circumventing blocking.
I can't think of any reason that th
On Sat, Sep 10, 2011 at 05:13:32AM +, moeedsa...@gmail.com wrote 4.5K bytes
in 111 lines about:
: would using bridges prevent the ISP from knowing that a person is using tor?
Yes. However, any analysis of the traffic using deep packet inspection
will show it is using encryption which is illeg
On Sat, Sep 10, 2011 at 08:20:39AM +0200, k...@uva.nl wrote 1.8K bytes in 40
lines about:
: I know, mind the last part (see below) of my post, which was probably
: WAY too long. I'm wondering whether, in lack of a better explanation,
: the bridge spike might have been caused by undisclosed activit
On Sat, Sep 10, 2011 at 08:20:39AM +0200, Matthijs R. Koot wrote:
> > : Requests: Why? [1] from the Tor-talk mailinglist. Some believe (credits
> > : to @ly_gs for enlightening me) that the August 2011 spike in Tor users
> > : via bridges may be related to the Dutch police investigation on Tor
> >
> EVERYONE should be running NTP, of course, not the relatively few that do.
> If you happen to still be on a windows machine, here is a FREE utility
And if you prefer the open source NTP standard that everyone else uses...
http://support.ntp.org/bin/view/Main/ExternalTimeRelatedLinks
And I'm qu
> I recently setup my own Tor relay, and its exciting!
Yes.
> (1) I read in a recent list posting that paid "private" VPN services
> provides no anonymity. According to some of those providers, they
> don't keep any log of your connections. Is this just a marketing
> gimmick, or are there other r
Hi Andrew,
> : Requests: Why? [1] from the Tor-talk mailinglist. Some believe (credits
> : to @ly_gs for enlightening me) that the August 2011 spike in Tor users
> : via bridges may be related to the Dutch police investigation on Tor
> : hidden services hosting child pornography, which also took p
19 matches
Mail list logo