Chris, actually it is pretty simple.
Here is the guide:
https://www.torproject.org/docs/debian.html.en#development
Cheers,
dope457
On 9.9.2013 6:49, Chris Patti wrote:
I realize this is release candidate code, and the answer may well be "if
you need to ask this question you shouldn't be runnin
On Mon, 9 Sep 2013 00:49:15 -0400
Chris Patti wrote:
> I realize this is release candidate code, and the answer may well be "if
> you need to ask this question you shouldn't be running it" but is there any
> way to get the latest RC builds installed via the usual apt-get mechanisms
> on my Ubuntu
I realize this is release candidate code, and the answer may well be "if
you need to ask this question you shouldn't be running it" but is there any
way to get the latest RC builds installed via the usual apt-get mechanisms
on my Ubuntu box without building from source?
I want to keep enjoying the
in https://www.torproject.org/docs/faq#EntryGuards say:
...
So, what should we do? Suppose the attacker controls, or can observe,
*C*relays. Suppose there are
*N* relays total. If you select new entry and exit relays each time you use
the network, the attacker will be able to correlate all traffi
On 09/07/2013 07:10 PM, Benedikt Gollatz wrote:
> On 2013-09-07 19:03, Nick Mathewson wrote:
>> On Sat, Sep 7, 2013 at 12:44 PM, Martin Skjöldebrand
>> wrote:
>>> On Friday, September 06, 2013 10:28:22 PM Nick Mathewson wrote:
>>>
Yup. Please upgrade, people. 0.2.4 is looking pretty go
Is it possible for me to force my client to connect to my tor exit as the
middle node?
On Sun, Sep 8, 2013 at 1:11 PM, Paul Syverson wrote:
> On Sun, Sep 08, 2013 at 11:47:06AM -0400, Nathan Suchy wrote:
> > Would my traffic still be secure?
> >
>
> To do what, and secure against whom and to wha
On 08.09.2013 18:08, Noilson Caio wrote:
> for what reason china has not felt this
> impact?
China is blocking normal Tor user. You need obfusproxy to circumvent the
Great Firewall. May be, the botnet doen't use obfusproxy.
cane
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusb
interesting analysis, Sebastian.
The top 5 COUNTRIES WITH HIGHEST NUMBER OF INTERNET USERS in the tor
metrics:
CHINA
-https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2013-06-10&end=2013-09-08&country=cn#userstats-relay-country
USA -
https://metrics.torproject.org/u
Hey I'm averaging 1.5MBPS Up and Down, 1001 inbound, 628 outbound, and 28
exit connections. Is this normal traffic? I know Tor is under heavy load
from the new bot net but this is a huge amount of traffic...
--
Nathan Suchy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe
On Sun, Sep 08, 2013 at 11:47:06AM -0400, Nathan Suchy wrote:
> Would my traffic still be secure?
>
To do what, and secure against whom and to what degree?
It is reasonable to assume that if NSA is running Tor nodes, then they
are probably using good operational security. So against someone
brea
So if the NSA controls the guard middle then exit could they track me?
Sent from my Android so do not expect a fast, long, or perfect response...
On Sep 8, 2013 12:56 PM, "harmony" wrote:
> Nathan Suchy:
> > Would my traffic still be secure?
> >
> > Sent from my Android so do not expect a fast,
Nathan Suchy:
> Would my traffic still be secure?
>
> Sent from my Android so do not expect a fast, long, or perfect response...
>
The answer is the same as when you asked 'how private is Tor' - what
does 'secure' mean?
The attacker would be able to identify your location and destination in
all
08.09.2013 17:47, Nathan Suchy:
> Would my traffic still be secure?
>
Assuming "all nodes" means you hit guard, middle and exit relays that
are run by the NSA and the NSA is your thread-model then no.
(Guard and exit would be enough to correlate traffic).
Sebastian G.
--
tor-talk mailing list
Hey,
On 09/08/2013 05:47 PM, Nathan Suchy wrote:
> Would my traffic still be secure?
that depends on your traffic. Sending your data unencrypted into the tor
network is always a problem. Not just on NSA nodes. You have to
distinguish between content encryption, transport encryption and the
tor-co
On 9/8/13, Nathan Suchy wrote:
> Would my traffic still be secure?
On two occasions I have been asked,
'Pray, Mr. Babbage, if you put into the machine wrong figures, will
the right answers come out?'
I am not able rightly to apprehend the kind of confusion of ideas that
could provoke such a ques
Would my traffic still be secure?
Sent from my Android so do not expect a fast, long, or perfect response...
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- Forwarded message from "D. Joe" -
Date: Sun, 8 Sep 2013 15:15:48 +
From: "D. Joe"
To: linux-eliti...@zgp.org
Subject: Re: [linux-elitists] Surveillance
User-Agent: Mutt/1.5.20 (2009-06-14)
On Sun, Sep 08, 2013 at 06:58:08AM -0700, Don Marti wrote:
> begin Greg KH quotation of Sat,
On Sat, Sep 7, 2013 at 8:09 PM, Gregory Maxwell wrote:
> On Sat, Sep 7, 2013 at 4:08 PM, anonymous coward
> wrote:
>> Bruce Schneier recommends *not* to use ECC. It is safe to assume he
>> knows what he says.
>
> I believe Schneier was being careless there. The ECC parameter sets
> commonly used
Hi,
(Probably only Karsten knows).
The new estimated directly connecting users graph (beta) [1] shows a
little slow-down in growth, a little spike and a little decline in
counted users.
The performance graph for 50KiB pieces [2] shows also a decline in
download time, which seems to be starting b
s:
> Sep 07 17:36:05.834 [Notice] Your Guard KOPA
> ($2386038C4233F8900768EDC03AB6050AD2A04CF0) is failing more circuits
> than usual. Most likely this means the Tor network is overloaded.
> Success counts are 174/263. Use counts are 68/69. 185 circuits
> completed, 1 were unusable, 10 collapsed, a
On Saturday, September 07, 2013 07:10:44 PM Benedikt Gollatz wrote:
> On 2013-09-07 19:03, Nick Mathewson wrote:
> > On Sat, Sep 7, 2013 at 12:44 PM, Martin Skjöldebrand
> >
> > wrote:
> >> On Friday, September 06, 2013 10:28:22 PM Nick Mathewson wrote:
> >>> Yup. Please upgrade, people. 0.2.4
21 matches
Mail list logo