On 9/26/12, meh. wrote:
> After implementing the torchat protocol and seeing how bad it is, but
> how nice the idea is, I started thinking it would be cool to have a
> more general protocol for P2P use through hidden services.
>
> My question is, how would it scale and what would be the implicati
meh. writes:
> After implementing the torchat protocol and seeing how bad it is, but
> how nice the idea is, I started thinking it would be cool to have a
> more general protocol for P2P use through hidden services.
>
> My question is, how would it scale and what would be the implications
> of su
I'll be short because I'm not used to mailing lists, it's 6 AM and I
haven't slept yet.
After implementing the torchat protocol and seeing how bad it is, but
how nice the idea is, I started thinking it would be cool to have a
more general protocol for P2P use through hidden services.
My question
You cam lock down your .onion using this feature:
HiddenServiceAuthorizeClient auth-type client-name,client-name,…
If configured, the hidden service is accessible for authorized clients
only. The auth-type can either be 'basic' for a general-purpose
authorization protocol or 'stealth' for a less
This was something that has bothered me. I use VmBox for linux When
Im running a machine there is a windows that shows me a "preview" of the
current screen. Do admins have access to this "preview" or
something similar?
I intend to run a linux server console only. (no gui) so most o
On 09/25/2012 04:00 PM, irregula...@riseup.net wrote:
> On 09/25/2012 10:18 PM, Matthew Finkel wrote:
>> On 09/25/2012 01:42 PM, Flo wrote:
>>> +1
>>> This.
>>>
>>> The problem is especially on container-virtualizations like OpenVZ is
>>> that the admins of the hostnodes must just type something li
On 09/25/2012 10:18 PM, Matthew Finkel wrote:
> On 09/25/2012 01:42 PM, Flo wrote:
>> +1
>> This.
>>
>> The problem is especially on container-virtualizations like OpenVZ is
>> that the admins of the hostnodes must just type something like 'vzctl
>> enter 123' and they have a shell in your VPS...
>
On 09/25/2012 01:42 PM, Flo wrote:
> +1
> This.
>
> The problem is especially on container-virtualizations like OpenVZ is
> that the admins of the hostnodes must just type something like 'vzctl
> enter 123' and they have a shell in your VPS...
>
> So you should have at least Xen/KVM where you can
Juppe writes:
> Hey,
>
> Few weeks ago I built a Tor network into my WAN lab environment and I'm
> using Tor version v0.2.3.17-beta. Today I wanted to change nodes DirPorts
> to use 80 and OrPorts to use 443 (before they were between 5000-6000) but I
> had the following output when I tried to sta
+1
This.
The problem is especially on container-virtualizations like OpenVZ is
that the admins of the hostnodes must just type something like 'vzctl
enter 123' and they have a shell in your VPS...
So you should have at least Xen/KVM where you can use encryption
On 09/25/2012 07:35 PM, SiNA Rabba
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
This is a good start :)
https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs
Cheers!
David
Webmaster:
> Can anyone suggest a vps provider that is friendly to tor hidden
> services. This would not be for an exit node.
>
> _
Also make sure the ISP does not have root login to your VM.
Some ISPs like Gandi install special daemons that can be used to login
to the VM :/
I like Amazon EC2 service very much!
--SiNA
On 09/25/2012 10:33 AM, Moritz Bartl wrote:
> On 25.09.2012 19:31, Webmaster wrote:
>> Can anyone suggest a v
On 25.09.2012 19:31, Webmaster wrote:
> Can anyone suggest a vps provider that is friendly to tor hidden
> services. This would not be for an exit node.
Hidden services should not be a problem for just about any VPS provider.
Just make sure you stay within the bandwidth limits.
--
Moritz Bartl
Can anyone suggest a vps provider that is friendly to tor hidden
services. This would not be for an exit node.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
esolve esolve:
> Generally there are three TOR nodes are being used by a TOR client, entry,
> middle and the exit
> where can I find the IPs of these three TOR nodes
In the case you want to know what IP addresses you connected to to build
a circuit. you can do this:
Open Vidalia, then click on "
On Tue, Sep 25, 2012, at 14:26, and...@torproject.is wrote:
> Likely, the update checks just occur through Tor. I haven't investigated
> personas on tbb. My approach would be to open the web console and watch
> for all requests from an idle tbb.
I don't care about updates. It's about if a site can
HI again,
Problem solved, authentication method for SMTP must be set to Normal.
Thanks anyway,
Hi,
tor user22:
Hi all,
My GMail account configured on Thunderbird,whether TORBirdy is enabled or
not I can't send any message but receiving is ok, SMTP error screen
appears, even ask me to enter
On Tue, Sep 25, 2012 at 02:04:02PM +0200, antispa...@sent.at wrote 0.8K bytes
in 22 lines about:
: > This depends on your desktop environment. Some pile all of the icons
: > together.
:
: Icons. I wrote desktops. So you have to deal with windows, not icons.
Right. Gnome and Win7 seem to pile all
Hey,
Few weeks ago I built a Tor network into my WAN lab environment and I'm
using Tor version v0.2.3.17-beta. Today I wanted to change nodes DirPorts
to use 80 and OrPorts to use 443 (before they were between 5000-6000) but I
had the following output when I tried to start my directory server and
On Tue, Sep 25, 2012, at 13:06, and...@torproject.is wrote:
> On Tue, Sep 25, 2012 at 09:35:13AM +0200, antispa...@sent.at wrote 1.1K
> bytes in 23 lines about:
> : I forgot to answer that: have more desktops. And do not click on hide.
> : That way each instance is clearly separated.
>
> This depe
On Tue, Sep 25, 2012, at 13:06, esolve esolve wrote:
> I'm just wondering how can the website know your ISP or location?
One way is just to interrogate some tables. That points out the ISP for
sure, but the qality of the location is variable.
Another way is to use the information provided by your
On Tue, 25 Sep 2012 13:06:10 +, esolve esolve wrote:
> I'm just wondering how can the website know your ISP or location?
Website sets up DNS server for its dns entries with low ttl, so it gets
asked every time. Trace where requests come from: gotcha. Depending on
the DNS setup you get the ISP
On Tue, Sep 25, 2012 at 09:35:13AM +0200, antispa...@sent.at wrote 1.1K bytes
in 23 lines about:
: I forgot to answer that: have more desktops. And do not click on hide.
: That way each instance is clearly separated.
This depends on your desktop environment. Some pile all of the icons together.
I'm just wondering how can the website know your ISP or location?
在 2012年9月25日星期二, 写道:
> On Tue, Sep 18, 2012, at 15:13, adrelanos wrote:
> > Jerzy Łogiewa:
> > > How dangerous are the DNS leak for some user?
> >
> > Very dangerous!
> >
> > http://www.howdoihidemyip.com/dnsleak.htm
> > "The DNS
On Tue, Sep 18, 2012, at 15:13, adrelanos wrote:
> Jerzy Łogiewa:
> > How dangerous are the DNS leak for some user?
>
> Very dangerous!
>
> http://www.howdoihidemyip.com/dnsleak.htm
> "The DNS leak provides your ISP name and location to the website that
> you are visiting, thus undermining your a
On Mon, Sep 10, 2012, at 14:11, and...@torproject.is wrote:
> On Mon, Sep 10, 2012 at 12:03:48PM +0200, antispa...@sent.at wrote 0.5K
> bytes in 12 lines about:
> : This is a silly idea. But how about it? Can I tweak the pack somehow so
> : I get two TorBrowser windows working independent of one an
26 matches
Mail list logo