On Wed, Feb 29, 2012 at 04:17:16PM -0500, grarpamp wrote:
>
> And Msr. Syverson seems to indicate that it can be.
>
Some abbreviation I'm not familiar with for Monsignor? I'm
pretty sure I've not been called to the RC priesthood, or for
that matter the RC church in general. I prefer Sagamore or
On 29 February 2012 13:33, Runa A. Sandvik wrote:
> On Mon, Feb 27, 2012 at 8:54 PM, Runa A. Sandvik
> wrote:
>> The Tor Cloud [1] images for all the seven regions have been updated to
>> include the latest cloud image for stable Ubuntu release 10.04.4 LTS
>> (Lucid Lynx). These new images are a
>>> It may take a while for a clientA to use said entry but when
>>> they do it seems it would be quite easy to time/count correlate
>>> or munge the HS traffic of clientA. And only require two nodes
>>> (hs, entry) and no GPA taps to do so.
>> That's why guards were introduced: They will not comp
On Tue, 28 Feb 2012 00:30:36 -0500
and...@torproject.org wrote:
> Indeed, see
> https://blog.torproject.org/blog/kazakhstan-upgrades-censorship-deep-packet-inspection
>
> You need the obfsproxy bundle,
> https://www.torproject.org/projects/obfsproxy.html.en.
Here's slightly more data on .kz. A vo
On 2012-02-29, MacLemon wrote:
> On 29.02.2012, at 18:34, Roger Dingledine wrote:
>>> Would it hurt to implement obfsproxy into a relay?
>> Somebody needs to sit down and solve
>> https://trac.torproject.org/projects/tor/ticket/1776
>> first
>
> May I draw the following conclusion from that or hav
On 29.02.2012, at 18:34, Roger Dingledine wrote:
>> Would it hurt to implement obfsproxy into a relay?
> Somebody needs to sit down and solve
> https://trac.torproject.org/projects/tor/ticket/1776
> first
May I draw the following conclusion from that or have I fallen for a
misunderstanding?
Impl
On 2012-02-29, MacLemon wrote:
> I was wondering if building tor with obfsproxy would make any sense for a
> relay. The documentation suggests that obfsproxy is rather exclusive for
> bridges yet isn’t absolutely clear about that.
>
> The only scenario I can fabricate is someone blocking tor by D
On Wed, Feb 29, 2012 at 05:04:47PM +0100, MacLemon wrote:
> I was wondering if building tor with obfsproxy would make any sense for a
> relay. The documentation suggests that obfsproxy is rather exclusive for
> bridges yet isn?t absolutely clear about that.
>
> The only scenario I can fabricate
On 29/02/12 14:57, Koos Huisman wrote:
> Can someone tell me how I can setup a Magnet application in the TOR
> Browser.
>
> I need to able to "download" torrent files by the magnet application.
> This is not available in the TOR browser.
Strangely timed with the changes on The Pirate Bay..
___
On 29/02/12 14:57, Koos Huisman wrote:
> Can someone tell me how I can setup a Magnet application in the TOR Browser.
>
> I need to able to "download" torrent files by the magnet application.
> This is not available in the TOR browser.
I believe that in order to use magnet URLs, you need to be a
Hi!
I was wondering if building tor with obfsproxy would make any sense for a
relay. The documentation suggests that obfsproxy is rather exclusive for
bridges yet isn’t absolutely clear about that.
The only scenario I can fabricate is someone blocking tor by DPI, being
confident that they can
OK, so taking that all into account, is it more likely that you will be
de-anonymized using public services through tor (ie browsing the web) or
using hidden services through tor?
On Wed, Feb 29, 2012 at 9:14 AM, Ralf-Philipp Weinmann
wrote:
>
> On Feb 29, 2012, at 11:17 AM, grarpamp wrote:
>
> >
On 29.02.2012 15:57, Koos Huisman wrote:
> Can someone tell me how I can setup a Magnet application in the TOR
> Browser.
> I need to able to "download" torrent files by the magnet application.
> This is not available in the TOR browser.
https://blog.torproject.org/blog/bittorrent-over-tor-isnt-go
Can someone tell me how I can setup a Magnet application in the TOR Browser.
I need to able to "download" torrent files by the magnet application.
This is not available in the TOR browser.
Thanks,
Koos
___
tor-talk mailing list
tor-talk@lists.torprojec
On Wed, Feb 29, 2012 at 05:17:34AM -0500, grarpamp wrote:
> > The main problem, besides the overhead, is that padding doesn't work
> > if an adversary can do something as trivial as very briefly delaying
> > It is too easy for an adversary to put a traffic signature on a
> > circuit in one place, a
On Feb 29, 2012, at 11:17 AM, grarpamp wrote:
>> The main problem, besides the overhead, is that padding doesn't work
>> if an adversary can do something as trivial as very briefly delaying
>> It is too easy for an adversary to put a traffic signature on a
>> circuit in one place, and look for it
On Mon, Feb 27, 2012 at 8:54 PM, Runa A. Sandvik wrote:
> The Tor Cloud [1] images for all the seven regions have been updated to
> include the latest cloud image for stable Ubuntu release 10.04.4 LTS
> (Lucid Lynx). These new images are available on the Tor Cloud website.
And I just updated the
> The main problem, besides the overhead, is that padding doesn't work
> if an adversary can do something as trivial as very briefly delaying
> It is too easy for an adversary to put a traffic signature on a
> circuit in one place, and look for it elsewhere. If he owns, e.g., the
> first node and a
> ORIGINAL COMPLAINT BELOW
> StopForumSpam report for LEASEWEB ASN16265
It seems pretty clear leaseweb signed themselves up to receive this
report. Or maybe sfs did, but then they'd be spamming leaseweb :)
> We have many other customers that operate anonymous VPN services
> and none of them had a
Mostly a summary...
> http://tools.ietf.org/html/rfc1751
http://en.wikipedia.org/wiki/S/KEY
http://en.wikipedia.org/wiki/OPIE_Authentication_System
http://en.wikipedia.org/wiki/OTPW
These still work well for simple OTP systems.
The words are also simple English.
> http://www.sinic.name/docs/
20 matches
Mail list logo