On 9/19/2012 6:18 PM, Anthony Papillion wrote:
> It's widely believed that an attacker with a sufficiently wide view of the
> Internet could unmask and identify Tor users. For example, if 3195 bytes go
> into a specific entry node and 3195 bytes come out of an exit node a few
> seconds later, ch
Hi adrelanos,
thanks for responding & suggestions.
sorry, NONE are applicable for this case.
anyway, let me repeat & explain with another set of words for others,
again (if some confusion exist in my explanations):
my local dns-server (127.0.0.1:53) (in windows xp), is already
configured to use T
On Wed, 19 Sep 2012 22:17:18 +, David H. Lipman wrote:
> From: "David H. Lipman"
>
>
> >On the WGET command line add the following switch parameter after Tor has
> >been loaded.
> >
> >--execute=http_proxy=http://127.0.0.1:8118/
That looks like telling wget to use an http proxy, not a sock
From: "David H. Lipman"
On the WGET command line add the following switch parameter after Tor has
been loaded.
--execute=http_proxy=http://127.0.0.1:8118/
The other way is via the WGETRC configuration file by adding the following
directives
http_proxy=http://127.0.0.1:8118
use_proxy = on
From: "Webmaster"
Hello. If this is the wrong place for this question, please let me know
where to go.
Can wget be used to download from a .onion site? Where could I setup the
proxy information for it?
I currently use the Tor Browser Bundle, Ubuntu 12.04 64bit.
thanks.
On the WGET com
On Thu, Sep 20, 2012 at 12:00 AM, Webmaster wrote:
> Hello. If this is the wrong place for this question, please let me know
> where to go.
>
> Can wget be used to download from a .onion site? Where could I setup the
> proxy information for it?
>
> I currently use the Tor Browser Bundle, Ubuntu
It's widely believed that an attacker with a sufficiently wide view of the
Internet could unmask and identify Tor users. For example, if 3195 bytes go
into a specific entry node and 3195 bytes come out of an exit node a few
seconds later, chances are pretty good it's you.
I'm wondering if there
Hello. If this is the wrong place for this question, please let me know
where to go.
Can wget be used to download from a .onion site? Where could I setup
the proxy information for it?
I currently use the Tor Browser Bundle, Ubuntu 12.04 64bit.
thanks.
_
Apologise for subject/thread hijacking.
On 9/19/12 10:13 AM, t...@lists.grepular.com wrote:
> On 19/09/12 06:36, grarpamp wrote:
>
> >> People use robots.txt to indicate that they don't want their site
> >> to be added to indexes.
>
> > They use it to indicate that they don't want their site to be
> In almost all cases (99% or higher), robots.txt is used to indicate
> that a site shouldn't be crawled, *because* they don't want it
> to be indexed. The intention is painfully clear...
Not really, maybe they could care less about the index, but don't
want crawlers looping through all their band
On Wed, 19 Sep 2012 02:05:30 -0400
Gregory Maxwell wrote:
> It seems to me that there is a common expectation is that onion urls
> provide a degree of name privacy— generally, if someone doesn't know
> your name they can't find you to connect to you. If someone violates
> that expectation it risk
On 9/19/12 9:41 PM, Paolo Palmieri wrote:
> It is also interesting to note that, after this, a sizable portion of
> Italian Internet users now uses a DNS other than the one supplied by
> their ISP, and usually a foreign one. This reduces the impact any
> further censorship imposed at the DNS level
> Somehow in August, Italy got a few thousand additional Tor users and
> became third as far as usage of Tor:
> [...]
> Any insight?
A major local filesharing website (hundreds of thousands active users)
was blocked at the DNS level in the country around that time. Among the
solutions to circumven
On Wed, Sep 19, 2012 at 10:00:33AM -0700, SiNA Rabbani wrote:
> Somehow in August, Italy got a few thousand additional Tor users and
> became third as far as usage of Tor:
France and Spain show similar growth.
We've seen some overall growth in total Tor user count too, perhaps due
to the recent g
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/19/2012 01:36 AM, grarpamp wrote:
> They use it to indicate that they don't want their site to be
> crawled. Tor2Web isn't crawling anything, thus they have no need or
> obligation to fetch and consider anyone's robots in the first
> place.
Hid
Somehow in August, Italy got a few thousand additional Tor users and
became third as far as usage of Tor:
> https://metrics.torproject.org/users.html?graph=direct-users&country=it#direct-users
> Country Mean daily users
> United States 60769 (14.30 %)
> Iran
Bry8 Star:
> Hi, please help me to solve this:
>
> On Windows (XP) i have a ("Unbound") DNS Resolver Server software
> (running on 127.0.0.1:53), which is configured to send its TCP DNS
> queries via an "outgoing" ip address (lets say, 192.168.0.10, which is
> my (NetIntrfAdptr) Network Interface
You can run a hidden service and make that service only accessible
through Tor:
https://www.torproject.org/docs/tor-hidden-service.html.en
Then you would block all traffic to that port except traffic coming from
127.0.0.1.
Good luck!
-SiNA
On 09/19/2012 01:26 AM, atra...@mailtor.org wrote:
>
Hi,
I currently remove the old Tor Browser Bundle and install the new one
when there is an update, but my relay settings are lost every time. Is
there a way to update the bundle and preserve the settings?
Thanks,
Marius
signature.asc
Description: OpenPGP digital signature
_
On Wed, Sep 19, 2012 at 01:00:27PM +, adrela...@riseup.net wrote 0.5K bytes
in 13 lines about:
: Pretty interesting. Since JonDo is Open Source as well, couldn't Tor
: consider their solution as well?
http://arstechnica.com/tech-policy/2012/04/tor-traffic-disguised-as-skype-video-call-to-fool
"JonDo 00.18.001 uses Skype for circumventing Internet censorship" [1]
Old, but found nowhere on torproject.org.
Pretty interesting. Since JonDo is Open Source as well, couldn't Tor
consider their solution as well?
[1]
https://anonymous-proxy-servers.net/blog/index.php?/archives/340-JonDo-00.18.
Hi, please help me to solve this:
On Windows (XP) i have a ("Unbound") DNS Resolver Server software
(running on 127.0.0.1:53), which is configured to send its TCP DNS
queries via an "outgoing" ip address (lets say, 192.168.0.10, which is
my (NetIntrfAdptr) Network Interface Adapter's IP address, c
On 09/19/2012 10:13 AM, t...@lists.grepular.com wrote:
> On 19/09/12 06:36, grarpamp wrote:
>
>>> People use robots.txt to indicate that they don't want their site
>>> to be added to indexes.
>
>> They use it to indicate that they don't want their site to be
>> crawled.
>
> In almost all cases (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 19/09/12 09:26, atra...@mailtor.org wrote:
> I am running Tor and dovecot (mail) on debian. No I can let listen
> the dovecot server on "Listen *:1234"
> The problem is, that you also can access this server without tor.
> Is there a way to only
Hello,
I am running Tor and dovecot (mail) on debian.
No I can let listen the dovecot server on "Listen *:1234"
The problem is, that you also can access this server without tor.
Is there a way to only accept tor connections?
___
tor-talk mailing list
t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 19/09/12 06:36, grarpamp wrote:
>> People use robots.txt to indicate that they don't want their site
>> to be added to indexes.
>
> They use it to indicate that they don't want their site to be
> crawled.
In almost all cases (99% or higher), ro
26 matches
Mail list logo