On Thu, Oct 11, 2012 at 11:06 AM, wrote:
> On Thu, Oct 11, 2012 at 07:18:47AM +0900, rgc.srvr...@gmail.com wrote
> 2.4K bytes in 72 lines about:
> : I'm living now in Japan. The new law, to me, is still confusing.
> : I had a Tor relay (non-exit) setup which I temporarily disabled partly
> for
>
On Thu, Oct 11, 2012 at 07:18:47AM +0900, rgc.srvr...@gmail.com wrote 2.4K
bytes in 72 lines about:
: I'm living now in Japan. The new law, to me, is still confusing.
: I had a Tor relay (non-exit) setup which I temporarily disabled partly for
: fear that ISPs and law enforcement doesn't know much
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
Alternative startup scripts for the Tor Browser Bundle.
For starting up Tor Browser without Tor and Vidalia.
Start multiple instances of Tor Browser.
Tor Browser behind a transparent proxy or Tor Router.
https://github.com/adrelano
Hi all,
I was running a non-exit relay a while back. It is now down for maintenance and
other reasons.
I ran bleeding edge tor 0.2.4.3-alpha (git-d3277286698ebd37) before I turned it
off.
I've been poking around the log files and found some logs that I don't quite
get. These are some of snipp
Saito-san, All,
On Tue, Oct 9, 2012 at 9:24 AM, Hideki Saito wrote:
> As far as I know, Winny was (and probably is) still leading file
> sharing client in Japan, followed by Share.
> I think an issue of Perfect Dark was that it is relatively hard to
> configure compared to Winny/Share, and given
On 10/10/12 10:59 PM, || ΣΖΟ || wrote:
> but everyone who buys it from itunes can be traced from Itunes
> logfiles and payment info etc.
That maybe absolutely ok in your risk context.
In any case i suggest to look for the alternative (to CovertBrowser)
Onion Browser:
http://itunes.apple.com/us/app
but everyone who buys it from itunes can be traced from Itunes
logfiles and payment info etc.
that's not very anonymous...
On Mon, Oct 8, 2012 at 8:00 PM, SiNA Rabbani wrote:
> Has anyone checked this software out?
> http://itunes.apple.com/us/app/covert-browser/id477438328?mt=8
>
>
> When I
On Wed, Oct 10, 2012 at 6:36 PM, eliaz wrote:
> Thanks, it's helpful to know they're not of the Tor Project. Still, they may
> be people like me, interested in distributing our bridge addressess safely
> to those who can use them well. The admins at the host have high standards
> of safety and use
Runa A. Sandvik:
> This list is not run by anyone at the Tor Project.
SiNA Rabbani
> Can you post the invitation email with full headers?
Thanks, it's helpful to know they're not of the Tor Project. Still, they
may be people like me, interested in distributing our bridge addressess
safely to t
Sounds like someone is trying to get you to give up your bridge IP
addresses, I wonder if that someone is related to one of those countries
mentioned in the email x)
Can you post the invitation email with full headers?
--SiNA
Runa A. Sandvik:
> On Wed, Oct 10, 2012 at 5:48 AM, eliaz wrote:
>> I
On Wed, Oct 10, 2012 at 5:48 AM, eliaz wrote:
> I hope tor-talk is an appropriate place to post this query.
>
> I've been invited to a mailing list that is purportedly for bridge
> runners. The introduction to the list states:
>
> This list will be devoted to providing TOR bridges to help pe
Sorry for the delay in answering. I overlooked the message.
On Sun, Oct 7, 2012, at 01:09, tagnaq wrote:
> > Sukhbir, could you make a small tutorial on how to test TorBirdy?
> > I'm willing to create one or two free accounts via TBB and do the
> > checking, but I have no idea how.
>
> thanks f
> Your phone messages presumably have a
> fixed format and can be logged by the network; drawing attention to Tor
> usage is not the goal and I can see that being a serious problem.
I think you can also opt to receive a phone call that says something
like "Your verification code is 12345". It does
> The phone portion of this is extremely problematic - to tie a username
> to a phone may create a direct link with a government issued ID card.
Yes, we know.
For the following discussion when I say "Tor" you can assume I mean
any anonymizing proxy service. We don't have any policies specific to
Hello Mike,
On Wed, 10 Oct 2012 13:47:14 +0200
Mike Hearn wrote:
> I work for Google as TL of the account security system that is
> blocking your access.
Thank you for contributing to this discussion!
> Access to Google accounts via Tor (or any anonymizing proxy service)
> is not allowed unless
Dear Mike,
Mike Hearn:
> Hello,
>
> I work for Google as TL of the account security system that is blocking
> your access.
Thanks for joining the discussion; I've talked with a number of people
from Google about this and you might be the person we've been looking to
contact.
>
> Access to Goog
Hello,
I work for Google as TL of the account security system that is blocking
your access.
Access to Google accounts via Tor (or any anonymizing proxy service) is not
allowed unless you have established a track record of using those services
beforehand. You have several ways to do that:
1) With
17 matches
Mail list logo