On 05/20/12 02:17 AM, Mike Perry wrote:
> For example, I sure wish I could buy a fucking book without
> being tracked these days. There are no major brick and mortar
> bookstores left in my city, and I live in a pretty big city.
Buying stuff semi-anonymously is easy with giftcards, prepaid
cellph
wrote:
>> On Sun, May 20, 2012 at 08:50:57PM +0200, || ΣΖΟ || wrote:
>>> A user visits a site wants to log in, but to have an account you are
>>> NOT anonymous anymore..
>>
>> You can try http://www.bugmenot.com/
>> which shares accounts for sites that require registration.
>>
well i had a good
On Mon, May 21, 2012 at 12:31 AM, krishna e bera wrote:
> On Sun, May 20, 2012 at 08:50:57PM +0200, || ΣΖΟ || wrote:
>> A user visits a site wants to log in, but to have an account you are
>> NOT anonymous anymore..
>
> You can try http://www.bugmenot.com/
> which shares accounts for sites that
Sounds like there is some caching action on onion.to.
--SiNA
On 05/20/2012 02:50 PM, Jesus Cea wrote:
> I am thinking about deploying a few "*.onion" services, and I am
> getting a quite surprising result: accessing the services from the
> open web via "onion.to" proxy is *FAR* faster that going
On Sun, May 20, 2012 at 08:50:57PM +0200, || ΣΖΟ || wrote:
> A user visits a site wants to log in, but to have an account you are
> NOT anonimous anymore..
You can try http://www.bugmenot.com/
which shares accounts for sites that require registration.
> What about a auto login if user is anonim
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I am thinking about deploying a few "*.onion" services, and I am
getting a quite surprising result: accessing the services from the
open web via "onion.to" proxy is *FAR* faster that going TOR native.
What am I doing wrong?.
Example of accessing "bur
Strange that nobody can reproduce that ...
The 100 % CPU usage may come from the SSL uncompression.
I tested on an other computer (always runing the poc on the same host than
the relay) and it works.
My version of Tor on this computer is :
---
May 20 22:55:19.829 [notice] Tor v0.2.2.35 (git-7
On Sun, May 20, 2012 at 8:01 PM, HardKor wrote:
> It was sent with the mail ...
> http://pastebin.com/xwp2S7wA
Created https://trac.torproject.org/projects/tor/ticket/5934
--
Runa A. Sandvik
___
tor-talk mailing list
tor-talk@lists.torproject.org
http
On Sun, May 20, 2012 at 7:34 PM, HardKor wrote:
> Hello,
Hi,
> I found a strange behavior in Tor relays that allow me to make a remote Tor
> relay crash or at least have a 100 % CPU usage.
> It crashes only if it is possible to send more data than RAM (and swap) can
> store in 300 s (5 minutes)
offtopic:
>
> Almost no one wants to solve the real technical problem, it seems.
>
> Sick sad world.
>
hehe i always wonder why there is still no fresh e-mail protocol
update that only allows known people, ans just refuses all the spam,
spam is the biggest waste of bandwith and on-server-mailbox-
It was sent with the mail ...
http://pastebin.com/xwp2S7wA
HardKor
On Sun, May 20, 2012 at 8:54 PM, SiNA Rabbani wrote:
> Please send the attachment file.
>
> Thanks,
> SiNA
> On 05/20/2012 11:34 AM, HardKor wrote:
> > Hello,
> >
> > I found a strange behavior in Tor relays that allow me to mak
Please send the attachment file.
Thanks,
SiNA
On 05/20/2012 11:34 AM, HardKor wrote:
> Hello,
>
> I found a strange behavior in Tor relays that allow me to make a remote Tor
> relay crash or at least have a 100 % CPU usage.
> It crashes only if it is possible to send more data than RAM (and swap)
Tor crew,
I am having this idea:
A user visits a site wants to log in, but to have an account you are
NOT anonimous anymore..
What about a auto login if user is anonimous..
I realise it might be one hell of a task to do such a thing
Some kind of button, or plugin for browser and website CMS (l
Hello,
I found a strange behavior in Tor relays that allow me to make a remote Tor
relay crash or at least have a 100 % CPU usage.
It crashes only if it is possible to send more data than RAM (and swap) can
store in 300 s (5 minutes) to the relay.
I attach a proof of concept.
HardKor
___
Hi,
I've started a DNS/DNSSEC hidden service at b36iqwi6e4l4eyvf.onion. The
service listens on two ports:
- 53 (plain DNS over TCP)
- 44353 (DNS over TLS)
The TLS version is an experiment - paradoxically not for security
(unbound currently does not check the certificate), but as a hackish
attemp
>>> or are you thinking of a shell script using socat?
>> Socat does not provde a SOCKS server, only a client, so it can't
>> be used. I mentioned it only as an example of an interesting shim-like
>> tool that might be out there. Not as one that could be used in this
>> case.
> I use msmtp + socat
May I ask what ISP?
>>> University ISP.
Have you tried specifying bridges, or selecting the option that says "My ISP
blocks tor"?
Yes! Doesn't work whether I get the bridges from
https://bridges.torproject.org/ or whether I e-mail brid...@torproject.org
I also cannot obtain bridge
From: Joe Btfsplk
To: tor-talk@lists.torproject.org
Sent: Saturday, May 19, 2012 12:55 AM
Subject: Re: [tor-talk] Is my ISP censoring my access to Tor?
> Socks listener listening on port 50364
> Is this correct? Shouldn't it be Socks listening on port 9050
On May 20, 2012, at 9:32 AM, BigTor wrote:
> People,
>
> Because I guess there's a better way to build Tor from source on my
> Ubuntu 12.04 box than I do, I ask for some help. I want to build Tor
> from source with my build-from-source openssl 1.0.1c. My OpenSSL install
> is in /usr/local/ssl/ ,
People,
Because I guess there's a better way to build Tor from source on my
Ubuntu 12.04 box than I do, I ask for some help. I want to build Tor
from source with my build-from-source openssl 1.0.1c. My OpenSSL install
is in /usr/local/ssl/ , there are the libcrypto.a and libssl.a files.
I try to
20 matches
Mail list logo