On Wed, Sep 19, 2012 at 1:36 AM, grarpamp wrote:
>> People use robots.txt to indicate that they don't want their site to
>> be added to indexes.
> And if a site is so concerned about someone else publishing a link,
> however obtained, then they should name it something innocent and
> password prot
> People use robots.txt to indicate that they don't want their site to
> be added to indexes.
They use it to indicate that they don't want their site to be crawled.
Tor2Web isn't crawling anything, thus they have no need or obligation
to fetch and consider anyone's robots in the first place.
Nobo
One machine runs Tor and Tor offers SocksPort(s). It doesn't offer any
Trans- or DnsPorts. Another client machine runs a client software, such
as Tor Browser. Machine stands for a computer, either a virtual machine
or for or another machine. Both machines are connected through a private
(virtual) L
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 18/09/12 17:23, grarpamp wrote:
>>> similar features to facilitate indexing of visited TorHs by
>>> 3rd
>> If you do this, please honour peoples robots.txt files.
>
> No, they are publishing a list of onions/urls visited, not doing
> the indexi
> That code comes from another thread that you missed:
Less than a month ago too, that's pretty funny :)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> similar features to facilitate indexing of visited TorHs by 3rd
> If you do this, please honour peoples robots.txt files.
No, they are publishing a list of onions/urls visited, not doing
the indexing themselves, robots has nothing to do with t2w.
___
[bouncing back to the list because I think it's useful]
On Tue, Sep 18, 2012 at 12:10 PM, Paul Syverson
wrote:
> On Tue, Sep 18, 2012 at 11:21:13AM -0400, Gregory Maxwell wrote:
>> On Tue, Sep 18, 2012 at 11:01 AM, Paul Syverson
>> wrote:
>> > Logic persnickitiness: 'IFF' is not a more emphatic v
On Tue, 18 Sep 2012 10:26:21 +, Chris Smart wrote:
> not for blind users using screen reader software, who don't want to
> hear tons of quoted material first. :)
I don't like tons of quoted material either and would rather
have it trimmed to the referenced part. But some lists seem
to be diff
On Sep 18, 2012 11:26 AM, "Gregory Maxwell" wrote:
>
> On Tue, Sep 18, 2012 at 11:01 AM, Paul Syverson
> wrote:
> > Logic persnickitiness: 'IFF' is not a more emphatic version of 'if'.
>
> I meant if and only if, thank you very much.
> I grouped my clauses poorly indeed. It is dangerous if and o
On Tue, Sep 18, 2012 at 11:47 AM, grarpamp wrote:
> But I never would
> have guessed your hint that there was some
> sort of common header being deleted from
> the key itself...
That code comes from another thread that you missed:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025409
On Tue, Sep 18, 2012 at 11:01 AM, Paul Syverson
wrote:
> Logic persnickitiness: 'IFF' is not a more emphatic version of 'if'.
I meant if and only if, thank you very much.
I grouped my clauses poorly indeed. It is dangerous if and only if
(the warning is not spurrious && your threat model cares a
Raviji:
> On Tue, 18 Sep 2012 13:32:43 +
> adrelanos wrote:
>
>>
>>> [Q] What is the iptables rule to redirect all 80 and 443 traffic through
>>> polipo 8118 port ? Then no configuration is
>>> required at browser level.
>>
>> You don't need iptables for that. Tor is running on a Gateway. To
On Tue, Sep 18, 2012 at 10:35:11AM -0400, Gregory Maxwell wrote:
> On Tue, Sep 18, 2012 at 9:13 AM, adrelanos wrote:
> > Jerzy Łogiewa:
> >> How dangerous are the DNS leak for some user?
> >
> > Very dangerous!
> >
> > http://www.howdoihidemyip.com/dnsleak.htm
> > "The DNS leak provides your ISP n
On Tue, 18 Sep 2012 13:32:43 +
adrelanos wrote:
>
> > [Q] What is the iptables rule to redirect all 80 and 443 traffic through
> > polipo 8118 port ? Then no configuration is
> > required at browser level.
>
> You don't need iptables for that. Tor is running on a Gateway. Tor
> Browser wit
On Tue, Sep 18, 2012 at 9:13 AM, adrelanos wrote:
> Jerzy Łogiewa:
>> How dangerous are the DNS leak for some user?
>
> Very dangerous!
>
> http://www.howdoihidemyip.com/dnsleak.htm
> "The DNS leak provides your ISP name and location to the website that
> you are visiting, thus undermining your ab
not for blind users using screen reader software, who don't want to
hear tons of quoted material first. :)
Not trying to argue, just giving a different perspective.
At 08:41 AM 9/18/2012, you wrote:
Top posting is confusing...
Bry8 Star:
> probably safer will be if you install a VM software
On Tue, Sep 18, 2012 at 03:13:26PM +0200, li...@infosecurity.ch wrote 2.5K
bytes in 57 lines about:
: It means that a TBB-like application could be securely delivered and
: updated during time via Mac App Store!
This is a false sense of security. I believe most of the time apple's cert
for update
On Tue, Sep 18, 2012 at 8:44 AM, Raviji wrote:
> Dear list,
>
> I wonder if I can setup a box which provides complete traffic enforcement
> through tor.
> The tails project has encouraged me to work in that direction. With the
> tails documentations and with
> some online guide like
>
> https://c
You question is already on the list. And answered.
Please don't resend... Check...
https://lists.torproject.org/pipermail/tor-talk/2012-September/thread.html
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 18/09/12 14:22, Fabio Pietrosanti (naif) wrote:
> We've been thinking for next release of Tor2web 3 to add such a
> similar features to facilitate indexing of visited TorHs by 3rd
> part projects https://github.com/globaleaks/Tor2web-3.0/issues/1
Dear list,
I wonder if I can setup a box which provides complete traffic enforcement
through tor.
The tails project has encouraged me to work in that direction. With the tails
documentations and with
some online guide like
https://cryptoanarchy.org/wiki/Build_your_own_livething
I am able to se
Sorry for mentioning about using Trial Windows.
I realized, Trial will expire even if not used or used, after 30 days,
or within 90 days with grace period(s).
But, i think (not 100% sure though), there is code given on Microsoft
site which can be used only for inside VM based Windows OS installati
Raviji:
> https://cryptoanarchy.org/wiki/Build_your_own_livething
That's a bit insufficient and some points clearly outdated, see below.
>
> obfsproxy issue
> =
>
> I have installed tor,pdnsd,ttdnsd,obfsproxy,polipo,vidalia
You don't need pdnsd,ttdnsd,polipo. Vidalia is a nice
On 9/17/12 1:22 PM, and...@torproject.is wrote:
> On Sun, Sep 16, 2012 at 04:03:36PM -0700, etanes...@gmail.com wrote 1.0K
> bytes in 19 lines about:
> : Clearly brute forcing would be way, way out of the question just based on
> : sheer size. I've read about the introduction points being stored o
Jerzy Łogiewa:
> How dangerous are the DNS leak for some user?
Very dangerous!
http://www.howdoihidemyip.com/dnsleak.htm
"The DNS leak provides your ISP name and location to the website that
you are visiting, thus undermining your ability to stay anonymous on the
internet. For example, if you vis
Yeah, onion browser is cool http://v3.mike.tig.as/onionbrowser/ .
It means that a TBB-like application could be securely delivered and
updated during time via Mac App Store!
The main issue is probably that TBB is "not an application" but rather
an integration of a different set/pieces of software
On Tue, 2012-09-18 at 01:02 +, r...@tormail.org wrote:
> Is the addon "unplug" safe to use with Tor for downloading videos? That
> is, will it (Unplug) provide anonymity?
Unplug is free software, so you can look at the source and see for
yourself. If you can't, maybe someone else on this lis
On Tue, Sep 18, 2012 at 7:12 AM, wrote:
> On Tue, Sep 18, 2012 at 12:08:12PM +0200, li...@infosecurity.ch wrote 1.3K
> bytes in 32 lines about:
> : the discussion above is related to iPhone iOS while i've been referring
> : to the Apple Mac OS X App Store, that can be used to deliver signed and
Top posting is confusing...
Bry8 Star:
> probably safer will be if you install a VM software (may be, VirtualBox,
> there are many others), and from beginning if you install guest/VM OS
> and used such configurations (including software & hardware ids), which
> will keep "Anonymity" intact for it'
Onion Browser is now the best Tor+Browser on iOS and it is on github and mostly
well done. Not sure it all the various ToS are being abided by but for now
Apple has allowed it to be.
and...@torproject.is wrote:
>On Tue, Sep 18, 2012 at 12:08:12PM +0200, li...@infosecurity.ch wrote 1.3K
>bytes
On 9/18/12 12:08 PM, Fabio Pietrosanti (naif) wrote:
>
> On 9/17/12 5:46 PM, Andrew Lewman wrote:
>> On Wed, 12 Sep 2012 23:35:53 +0200 "Fabio Pietrosanti (naif)"
>> wrote:
>>
>>> i am wondering if Tor is downloadable also trough Mac App Store
>>> and/or if some consideration has already been d
From: "adrelanos"
> New name will be: Whonix.
>
> Thanks to everyone for all the all suggestions!
Absolutely no imagination. Just another 'nix.
--
Dave
Multi-AV Scanning Tool - http://multi-av.thespykiller.co.uk
http://www.pctipp.ch/downloads/dl/35905.asp
On Tue, Sep 18, 2012 at 12:08:12PM +0200, li...@infosecurity.ch wrote 1.3K
bytes in 32 lines about:
: the discussion above is related to iPhone iOS while i've been referring
: to the Apple Mac OS X App Store, that can be used to deliver signed and
: sandboxed applications on Mac OS X machines.
Tr
On 9/17/12 5:46 PM, Andrew Lewman wrote:
> On Wed, 12 Sep 2012 23:35:53 +0200
> "Fabio Pietrosanti (naif)" wrote:
>
>> i am wondering if Tor is downloadable also trough Mac App Store and/or
>> if some consideration has already been done on that topic.
> It is not available in the app store. It has
> look correct to me. Hope this helps
Yes. Robert noted my former sleepy state
totally messed the use of string functions
which affected length and values. But I never would
have guessed your hint that there was some
sort of common header being deleted from
the key itself... I have no idea what it
Update: My nutty fruit bat now tells me I had 'trackhostexits .'
turned on in the original example. I think that explains the growth
of the matching exit (4th node) onto the second circuit.
Without that I get (with SessionGroup as default)...
r1 r2 r3
r4 r5 r6
r1 r2 r3
r4 r1 r5
r1 r2 r3
r1 r4 r
Dear list,
I wonder if I can setup a box which provides complete traffic enforcement
through tor.
The tails project has encouraged me to work in that direction. With the tails
documentations and with
some online guide like
https://cryptoanarchy.org/wiki/Build_your_own_livething
I am able to se
probably safer will be if you install a VM software (may be, VirtualBox,
there are many others), and from beginning if you install guest/VM OS
and used such configurations (including software & hardware ids), which
will keep "Anonymity" intact for it's user and it's host computer, then
use firefox
38 matches
Mail list logo