On Mon, 26 Aug 2013 17:48:57 -0300
Juan Garofalo wrote:
> Yeah. I find it kind of odd that no one here is saying
> anything about freedom hosting. I saw some discussion in Roger
> Dingledine's blog, but it was just one post (plus hundred of
> comments), but a blog isn't the best medium fo
Thank you for your information.
I uninstalled the "PirateBrowser".
Instead I downloaded the Browser bundle from
https://www.torproject.org/download/download-easy.html.en
I hope this will get me started on the Tor network.
Thanks again.
Rusty
> On Mon, Aug 26, 2013 at 05:58:22PM -0500, Misso
On Mon, Aug 26, 2013 at 05:58:22PM -0500, Missouri Anglers wrote:
> I downloaded and installed "PirateBrowser" which is a Firefox browser
>configured to use vidalia/tor.
Not quite -- it is a bundle that includes a variety of software
including Firefox, Vidalia, and Tor, configured in the way they
I downloaded and installed "PirateBrowser" which is a Firefox browser
configured to use vidalia/tor.
I assume this is simply just a browser set up to use an anonymous proxy?
I am not exactly a beginner when it comes to using anonymous proxies.
I have been gathering proxy lists, scanning them wit
It's sad what happened to FreedomHosting. I guess that's just our
government. Will anything happen to the poor admin?
On Mon, Aug 26, 2013 at 4:48 PM, Juan Garofalo wrote:
> At 05:05 PM 8/25/2013 -0400, you wrote:
> >The US feds did actually take down FH, which was a HIDDEN SERVICE! They
> >fou
At 05:05 PM 8/25/2013 -0400, you wrote:
>The US feds did actually take down FH, which was a HIDDEN SERVICE! They
>found it and arrested the admin! Period!
>
>Hidden services vaporize like water in death valley these days. And don't
>you guys want answers?? It's time to take off the blinders and ta
On 8/22/2013 2:06 PM, krishna e bera wrote:
On 13-08-22 05:01 PM, ziggy wrote:
I use a service that doesn't allow Tor. But I'd like to use Tor anyway,
except at the end of the path where, hopefully, there is a way to use an
exit that won't be detected as Tor. Is something like that possible?
T
Just don't manage or store PGP keys. That would destroy security!
On Aug 26, 2013 11:35 AM, "Fabio Pietrosanti (naif)"
wrote:
> Il 8/26/13 1:29 PM, Nathan Suchy ha scritto:
> > First off Edward Snowden did not need anonymity. He went public on this.
> > Second gateways compromise network security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/01/2013 03:37 PM, lee colleton wrote:
>
> If I run multiple relays, shouldn't they be grouped into a node
> family? I see no way of doing this with Orbot on Android, which
> lists only an option for setting the node nickname.
Just saw this comm
On Mon, Aug 26, 2013 at 9:09 AM, Eugen Leitl wrote:
>
> I've managed to lay my hands onb a couple of Lenovo X60's that are
> in pretty good shape and would like to use them as a moderately secure
> communication/development system. (I'm not trusting my desktops,
> servers or mobile devices for ob
On 08/26/2013 10:50 AM, Lars Noodén wrote:
> Yes, selecting a New Identity, either via the button of via Vidalia,
> seems to clear the tracking. Interestingly doing that enough times will
> bring up other people's etags.
We've also finally implemented NEWNYM / new identity support in Orbot.
(You
OK. Tracking even to protect the law is stupid...
On Aug 26, 2013 10:23 AM, wrote:
> >Date: Mon, 26 Aug 2013 07:37:32 -0400
> >From: Nathan Suchy
> >To: tor-talk@lists.torproject.org
> >Subject: [tor-talk] Discrimination of Tor Traffic,
>
> >Why do services such as Google discriminate or block T
Il 8/26/13 1:29 PM, Nathan Suchy ha scritto:
> First off Edward Snowden did not need anonymity. He went public on this.
> Second gateways compromise network security by granting outsiders internal
> access. Encryption is another thing but would be pretty easy. I'm not
> saying this is a bad project
I'm using a very back-level version of Tor Browser Bundle, because every
time I've installed a current version, it refuses to remember passwords,
or allow me to change the default of remembering passwords.
I install TBB on a PGP encrypted disk, so there is no security exposure
of passwords or
I've managed to lay my hands onb a couple of Lenovo X60's that are
in pretty good shape and would like to use them as a moderately secure
communication/development system. (I'm not trusting my desktops,
servers or mobile devices for obvious reasons). I'm loath to modify
the hardware at this po
On 26.08.2013 17:41, Moritz Bartl wrote:
> On 26.08.2013 14:16, Lars Noodén wrote:
>> This etag trick seems to work ok even against TBB:
>
> Are you sure? It is "by design" that you can "track" TBB users within
> one session. Did you try "New Identity", and restarting TBB?
>
> https://trac.torpro
On 26.08.2013 14:16, Lars Noodén wrote:
> This etag trick seems to work ok even against TBB:
Are you sure? It is "by design" that you can "track" TBB users within
one session. Did you try "New Identity", and restarting TBB?
https://trac.torproject.org/projects/tor/ticket/1579
--
Moritz Bartl
ht
>Date: Mon, 26 Aug 2013 07:37:32 -0400
>From: Nathan Suchy
>To: tor-talk@lists.torproject.org
>Subject: [tor-talk] Discrimination of Tor Traffic,
>Why do services such as Google discriminate or block Tor Traffic? It does
>not truly prevent abuse as crimals buy and sell better networks for that.
>
This etag trick seems to work ok even against TBB:
http://lucb1e.com/rp/cookielesscookies/
Should TBB have the option to scrub E-tags?
Regards,
/Lars
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-
OK. Why not setup some automatic internal routing so we don't waste exit
bandwidth?
On Aug 26, 2013 8:00 AM, "Kostas Jakeliunas" wrote:
> On Mon, Aug 26, 2013 at 2:46 PM, Nathan Suchy <
> theusernameiwantista...@gmail.com> wrote:
>
> > I don't want this for piracy as I have a paid VPN account tha
On Mon, Aug 26, 2013 at 2:46 PM, Nathan Suchy <
theusernameiwantista...@gmail.com> wrote:
> I don't want this for piracy as I have a paid VPN account that is much
> faster for that if I decide to pirate. I think we need BitTorrent though to
> work on Tor so Tor Users can securely share files with
Why don't we make hidden services more like clients where it connects to
hs-relays and they proxy the traffic? It would make hidden services more
secure. Also we talk about location staying the same well connecting to 3
hs-relays that proxy would solve this problem.
--
tor-talk mailing list - tor-
I don't want this for piracy as I have a paid VPN account that is much
faster for that if I decide to pirate. I think we need BitTorrent though to
work on Tor so Tor Users can securely share files with one another.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change
First off Edward Snowden did not need anonymity. He went public on this.
Second gateways compromise network security by granting outsiders internal
access. Encryption is another thing but would be pretty easy. I'm not
saying this is a bad project but you need to put protections in it.
On Aug 19, 20
I agree. Even if Tor was illegal then just set it up and make a new gmail
and use it for tor-talk with a fake identity. Many of us use Tor for our
safety.
On Aug 21, 2013 7:13 AM, "mick" wrote:
> On Tue, 20 Aug 2013 23:35:39 -0400
> William Conlow allegedly wrote:
>
> > I'm a bit of a newb at th
Why do services such as Google discriminate or block Tor Traffic? It does
not truly prevent abuse as crimals buy and sell better networks for that.
Tor can be abused but it is not the best platform for it.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other set
Yep Skype probably checks the Tor DNSBL. Have you considered running a Tor
Bridge instead?
On Aug 24, 2013 4:02 PM, "ra" wrote:
> On Friday 23 August 2013 20:56:09 scar wrote:
> > hello i would like to use Skype from my Tor exit node (which is running
> > Linux) but, for whatever reason, the powe
If you need a truly secure contact method why not run a micro forum and use
SSL instead? You could install LAMP and phpBB and then manually approve
sign ups and use complex permissions.
On Aug 21, 2013 9:31 AM, "Griffin Boyce" wrote:
> On 08/21/2013 03:44 AM, Matej Kovacic wrote:
> > All mail sen
If you would trace Tor Clients which if you stay safe and smart then you
can't. A lot of Tor Traffic may in fact be illegal but what good is that
information unless you have the magic power to trace Tor?
On Aug 23, 2013 4:11 PM, wrote:
> On Fri, Aug 23, 2013 at 01:46:51PM -0400, pse...@gmail.com
If the protocol was more secure we would not have to keep it in the same
place. Why not make hidden services more client like? A lot of servers of
exploit do why not a bundled server and php and mysql that goes through
Tor? If we did that it would secure hidden services.
On Aug 26, 2013 4:45 AM, "g
On Sun, Aug 25, 2013 at 5:05 PM, wrote:
> And don't you guys want answers??
Sure, please post your answers in the form of links to verifiable
reports of hidden services being 'found and taken down' due to
*exploited vulnerabilities in the Tor protocol*, not some other, or
as yet unknown, reason.
31 matches
Mail list logo