On Tue, 6 Aug 2013 20:14:13 -0400
Nathan Suchy wrote:
> Admin of Tor Forums
> http://www.torforums.tk/
The amount of seriousness and dedication with which you approach this project
truly shines through the fact that you couldn't even spare $7 for a real
domain -- using a free .tk TLD instead, wh
Nima:
> Why not helping the official forum[0] grow instead of creating new ones?
I am not involved in this forum, but one reason could be the
half-hearted attempt by The Tor Project to get the stackexchange forum up.
They could already have enough users to start it, if they advertised the
forum i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/08/2013 11:34, Nima wrote:
> Why not helping the official forum[0] grow instead of creating new
> ones?
>
SE sites are great for getting answers to specific questions but the
Q&A format doesn't encourage open-ended discussion.
On 07/08/2013 10
B
ecause it's not a full forum! Plus an easier URL :-)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Why not helping the official forum[0] grow instead of creating new ones?
[0]-
http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security?referrer=Vph2zDf3JM5W0VuASrAkNA2
--
Nima
0xA4D4C009DB191C92A77B
"I disapprove of what you say, but I will defend to the death y
I
have taken the time to setup an Internet Discussion Board on Tor. It will
be as secure as possible and uses the PhpBB Forum Software. We will not
modify the PhpBB Software in any way other than adding Tapatalk but that
will not happen for a while. We are hosted by NFSN, Inc are cannot be taken
do
Hi,
Roger told during the SummerDev meeting that Windows users have no
secure way to download a copy of GnuPG. I contacted Intevation, the
company which hosts GnuPG and other projects and got the following info.
If you are using Windows and want to download GnuPG, there is
http://gpg4win.org/>. T
Doesn't that seem something that a network of telecoms in cahoots with a
global, quasi-governmental intelligence apparatus could pull off, without much
stress?
And worse, doesn't the above imply something close to the capability required
to achieve monitoring of the entire network at once, thus
I'd like to announce the availability of Tortilla, a free open-source tool
that allows users to securely, anonymously, and transparently route all
TCP/IP and DNS traffic through Tor.
Though the Tor client natively supports transparent proxying on Linux-based
systems, Tortilla allows Tor users t
Hi Jon,
A few of your assumptions look incorrect. Here's some of my
understandings.
Jon Tullett:
> My understanding is that NoScript shipped disabled in the TBB
NoScript itself is enabled in the Tor Browser Bundle, configured to
allow JavaScript globally. This configuration already adds protecti
On Tue, 06 Aug 2013 10:46:01 +, Wendell wrote:
> So if I could somehow convince the network that my nodes were the fastest, I
> could capture all of the Tor traffic?
You need to actually provide the bandwith to convince the network. If
you manage to bring up that many machines (and not gettin
Hi all
I have a couple of questions related to the Freedom Hosting saga.
Disclosure: I'm a journalist and I'm writing about this, but I won't
quote anyone without prior permission.
So:
My understanding is that NoScript shipped disabled in the TBB because
that would reduce the likelihood of the b
ra:
> On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> > Thank you. I ended up stopping tor, deleting everything in
> > DataDirectory/, and starting tor. It's crude, but it works.
>
> I implemented a ctrl-command for dropping all guard nodes[0]. If it is
> possible for you to patch the Tor cli
>> If relays were homogeneous distributed among the globe, two random relays
>> will be 1/4 earth circumference apart on average.
>
> That assumption is a bit skewed. Most of the time fast relay will be
> selected, and they aren't quite randomly distributed. (Also bear in mind
> that one half o
So if I could somehow convince the network that my nodes were the fastest, I
could capture all of the Tor traffic?
-wendell
grabhive.com | twitter.com/grabhive | gpg: 6C0C9411
On Aug 6, 2013, at 9:40 AM, Andreas Krey wrote:
> That assumption is a bit skewed. Most of the time fast relay will be
Hi,
Gregory Maxwell wrote (06 Aug 2013 06:47:03 GMT) :
> This is basically the threat model that whonix's isolation is intended
> to address, it would be good to see tails improve wrt this.
Sure. The Live environment and our wish to support not-so-powerful
hardware may get in the way, but I'm cur
On Sun, 04 Aug 2013 15:39:40 +, Arian Sanusi wrote:
> Hi Jerzy,
>
> If relays were homogeneous distributed among the globe, two random relays
> will be 1/4 earth circumference apart on average.
That assumption is a bit skewed. Most of the time fast relay will be
selected, and they aren't qui
On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> Thank you. I ended up stopping tor, deleting everything in
> DataDirectory/, and starting tor. It's crude, but it works.
I implemented a ctrl-command for dropping all guard nodes[0]. If it is
possible for you to patch the Tor client, the patch m
On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> Thank you. I ended up stopping tor, deleting everything in
> DataDirectory/, and starting tor. It's crude, but it works.
I implemented a TorCtl command for dropping all guard nodes[0]. If it is
possible for you to patch the Tor client, the patch
Hi,
VakVarjucska wrote (05 Aug 2013 22:52:18 GMT) :
> What do you think about new vidalia GUI features like:
You need to be aware that Vidalia currently lacks a maintainer.
A new one was on his way to take care of this piece of software,
but I've not been able to reach him for a few weeks.
Cheer
Hi,
mirimir wrote (06 Aug 2013 05:46:37 GMT) :
> If this exploit had included a Linux component, Tails would not have
> protected you.
I've not studied the attack code but this appears to be mostly
correct. Our shortest-term plan to address this is to contain [1] the
web browser; this is part of
On Mon, Aug 5, 2013 at 11:41 PM, intrigeri wrote:
> mirimir wrote (06 Aug 2013 05:46:37 GMT) :
>> If this exploit had included a Linux component, Tails would not have
>> protected you.
> I've not studied the attack code but this appears to be mostly
> correct.
I believe it would have had to also
22 matches
Mail list logo