On 10/8/2013 6:13 PM, Moritz Bartl wrote:
Is there a reason even stable Win versions never reference the OS in
file names?
.exe is a Windows(-only) extension. I agree that the OS could be added
to the file name to avoid confusion.
Thanks, but a question / comment.
Except in this case, the file
less flippantly,
if you want D-Central today, check out http://project-byzantium.org/
(why do they not have HTTPS?)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Tue, Oct 8, 2013 at 6:05 PM, David Green wrote:
> ... is McAfee ... doing his own tor system?
McAfee is doing lots of drugs. all other details yet to be confirmed...
;)
Portland++
[keep it weird! like my favorite machines...]
--
tor-talk mailing list - tor-talk@lists.torproject.org
To u
This I hear about; sounds like h/w which uses tor, or is McAfee maintaining
he is, effectively, doing his own tor system?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 10/09/2013 01:07 AM, Joe Btfsplk wrote:
> Is the only set of installers that doesn't list an OS, the one for Windows?
> https://archive.torproject.org/tor-package-archive/torbrowser/3.0a4/
Yes.
> Is there a reason even stable Win versions never reference the OS in
> file names?
.exe is a Wind
Is the only set of installers that doesn't list an OS, the one for Windows?
https://archive.torproject.org/tor-package-archive/torbrowser/3.0a4/
Is there a reason even stable Win versions never reference the OS in
file names?
Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To
On Tuesday 06 August 2013 13:06:54 Lunar wrote:
> ra:
> > On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> > > Thank you. I ended up stopping tor, deleting everything in
> > > DataDirectory/, and starting tor. It's crude, but it works.
> >
> > I implemented a ctrl-command for dropping all guard
On 10/8/2013 4:45 PM, sam wrote:
> On Tue, 08 Oct 2013 16:34:19 -0500
> Crypto wrote:
>
>>
>> Here ya go!
>>
>> Oct 08 16:02:01.769 [Notice] Bootstrapped 100%: Done.
>> Oct 08 16:02:01.769 [Notice] Now checking whether ORPort
>> 184.75.214.178:21357 and DirPort 184.75.214.178:9030 are reachable..
On Tue, 08 Oct 2013 16:34:19 -0500
Crypto wrote:
>
> Here ya go!
>
> Oct 08 16:02:01.769 [Notice] Bootstrapped 100%: Done.
> Oct 08 16:02:01.769 [Notice] Now checking whether ORPort
> 184.75.214.178:21357 and DirPort 184.75.214.178:9030 are reachable...
> (this may take up to 20 minutes -- look
On 10/8/2013 4:21 PM, sam wrote:
> On Tue, 08 Oct 2013 16:13:14 -0500
> Crypto wrote:
>
>> Hello Everyone!
>>
>> Ok! I've conquered the issues getting port 443 to map to a forwarded
>> port. It turns out that only certain VPN gateways support
>> port-forwarding. So I've changed things around so n
Hello Everyone!
Ok! I've conquered the issues getting port 443 to map to a forwarded
port. It turns out that only certain VPN gateways support
port-forwarding. So I've changed things around so now Orport is
forwarded to the VPN and I can "hear" it according to the logs. But what
about Dirport? I'm
On Tue, 08 Oct 2013 16:13:14 -0500
Crypto wrote:
> Hello Everyone!
>
> Ok! I've conquered the issues getting port 443 to map to a forwarded
> port. It turns out that only certain VPN gateways support
> port-forwarding. So I've changed things around so now Orport is
> forwarded to the VPN and I c
Oddly, it seems that VirtualBox (a recent exploration and use of) might be
able to provide most of what I might need. Certainly it can run Linux
VMs... and my 2nd Mac is really looking for a decent purpose in it's life.
I'll have a look at your link.
Thanks.
On 8 October 2013 10:39, Luther Bli
On Tue, 08 Oct 2013 01:20:36 +
mirimir allegedly wrote:
> On 10/06/2013 10:32 AM, mick wrote:
> >>
> > Forgive me, I'm not sure I understand this. Could you elaborate
> > please on the nesting of the VPN tunnels with Tor? Since Tor does
> > not (currently) support UDP, what architectural mode
There's also a transcript, farther down the page, on the link
http://www.democracynow.org/2013/10/7/lavabit_how_one_company_refused_to
for those that don't want to play / download the mp4 file. Lavabit
interview isn't that long - maybe 10 min.
On 10/8/2013 12:54 PM, Joe Btfsplk wrote:
Haven't
Am 8. Oktober 2013 19:36:39 schrieb Joe Btfsplk :
On 10/8/2013 12:13 AM, krishna e bera wrote:
> On 13-10-07 11:44 PM, Joe Btfsplk wrote:
>> Yes, the pages are timing out - immediately, repeatedly, spread out
>> dozenS of times over a week. Also happening on DDG. I would've used
>> dozens of
Haven't seen this mentioned, but the Lavabit email owner / provider
decided to shut it down, for now, rather than comply w/ request for
encryption keys for ALL customer accounts.
Link to live interview w/ Lavabit owner & (one) of his lawyers, on
Democracynow.org - couple days ago.
http://www
On 10/8/2013 12:13 AM, krishna e bera wrote:
On 13-10-07 11:44 PM, Joe Btfsplk wrote:
Yes, the pages are timing out - immediately, repeatedly, spread out
dozenS of times over a week. Also happening on DDG. I would've used
dozens of circuits & new identities. Some were U.S. exit relays. The
On Tue, 08 Oct 2013 12:29:00 -0400
Griffin Boyce wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> sam wrote:
> > > Was I blocked for using Tor? Considering the efforts by Tor team
> > > members and testimonies, is there any way to contact the EU
> > > sysadmins?
>
> Contacting
On Mon, 7 Oct 2013 23:43:04 +0200
Eugen Leitl wrote:
> Eventually, we will have completely open hardware we can trust.
> But that day is not here yet. Meanwhile, let's minimize the amount
> of evil in the system.
One can get the Lemote Yeeloong netbook (that Richard Stallman also uses),
8.9" ve
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
sam wrote:
> > Was I blocked for using Tor? Considering the efforts by Tor team
> > members and testimonies, is there any way to contact the EU
> > sysadmins?
Contacting their ISP is a bit overkill. Try using their tech's
contact form first: http:
Hmm...
This may not work. I can open an exit relay using my normal IP address
on the router with no VPN active. All works well and it gets published.
But if I try to run it through a VPN the Tor client will eventually
connect but the logs show that it never gets past
"Oct 08 11:31:56.073 [Notice]
On Tue, 08 Oct 2013 12:03:51 -0400
Justin Bull wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2013-10-08 11:49 AM, sam wrote:
> > Was I blocked for using Tor? Considering the efforts by Tor team
> > members and testimonies, is there any way to contact the EU
> > sysadmins?
>
On Tue, Oct 08, 2013 at 04:49:20PM +0200, Sebastian G. wrote:
> What might work is too pull some resource over two different circuits,
> preferably with two different exits and compare the data you've got at
> the client or past that. For example does 'en.wikipedia.org' resolve to
> 91.198.174.225
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2013-10-08 11:49 AM, sam wrote:
> Was I blocked for using Tor? Considering the efforts by Tor team
> members and testimonies, is there any way to contact the EU
> sysadmins?
>
Have you tried contacting the info listedin under their WHOIS?
$ wh
On Mon, 2013-10-07 at 23:43 +0200, Eugen Leitl wrote:
> On Mon, Oct 07, 2013 at 11:59:42AM -0700, Blibbet wrote:
>
> > BTW, UEFI-based systems have a full IPv4/IPV6 network stack, with
> > PXE remote boot and WS-Management remote admin/control, and tools
> > like Perl and Telnet baked-in, so make
Hi,
I've been following the recent developments in the EU enquiry into mass
surveillance. Naturally, I tried to load "europa.eu" but I was told
"access denied. Denied for security reason".
Was I blocked for using Tor? Considering the efforts by Tor team
members and testimonies, is there any way t
On Mon, 07 Oct 2013 03:43:02 -0500
Crypto wrote:
> If I run Tor through a VPN and set it as a exit node will it appear
> that the exit is located at my true IP address or the IP address of
> the exit point of the VPN? I'm using PIA as the VPN client.
>
Provided your VPN does not disconnect and
08.10.2013 15:27, krishna e bera:
> On 13-10-08 05:19 AM, Lunar wrote:
>> Sean Alexandre:
>>> In light of FoxAcid and the NSA hijacking traffic coming out of exit nodes
>>> [1],
>>> I'm wondering about the possibilities for building counter measures into
>>> exit
>>> nodes. To start it might be s
On Mon, 2013-10-07 at 15:52 -0400, David Green wrote:
> Ah, but as far as I am aware (having tried it), it generates a USB disk BUT
> it is not recognised or bootable from a Mac.
>
> What say you? :)
>
Hmm... sorry for that. I had never tried it on a MAC but assumed it
would work as well. Now I
On 13-10-08 05:19 AM, Lunar wrote:
> Sean Alexandre:
>> In light of FoxAcid and the NSA hijacking traffic coming out of exit nodes
>> [1],
>> I'm wondering about the possibilities for building counter measures into exit
>> nodes. To start it might be something as simple as bundling some type
>> a
Agree completely, and there are other security reasons--not to mention
NoScript configuration defaults--that also potentially favor
1) signature-based verification of all TBB components at launch,
2) potentially encouraging users to consider multiple TBB installations to
support/encourage compartme
On Tue, 08 Oct 2013 11:54:33 +0200
Walter Rudametkin wrote:
> Hi everybody,
>
> Is there a reason why Romania has such a high concentration of 100+ Mbit
> exit nodes?
http://www.voxility.com/ - a popular colocation and dedicated server provider.
They are also both 37.221 and 93.115 bubbles he
On 10/08/2013 11:54 AM, Walter Rudametkin wrote:
> Is there a reason why Romania has such a high concentration of 100+ Mbit
> exit nodes?
Without the fanciness, but with more detail:
https://compass.torproject.org/
Currently, 9 of 10 relays in Romania are hosted by Voxility. They are
very cheap a
On 10/8/2013 4:54 AM, Walter Rudametkin wrote:
> Hi everybody,
>
> Is there a reason why Romania has such a high concentration of 100+ Mbit
> exit nodes?
>
> Regards,
> Walter
I was wondering that myself!
--
Crypto
Keywords: terrorism, bombs, jogging, suntan lotion,
nails, pellets, knives, s
Am 08.10.2013 11:54, schrieb Walter Rudametkin:
> Hi everybody,
>
> Is there a reason why Romania has such a high concentration of 100+ Mbit
> exit nodes?
>
> Regards,
> Walter
>
>
Legal reasons.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings
Hi everybody,
Is there a reason why Romania has such a high concentration of 100+ Mbit
exit nodes?
Regards,
Walter
On 10/08/2013 11:22 AM, Logforme wrote:
You can see the current distribution of exit relays here:
https://metrics.torproject.org/bubbles.html#country
On 2013-10-08 00:53, Crypt
You can see the current distribution of exit relays here:
https://metrics.torproject.org/bubbles.html#country
On 2013-10-08 00:53, Crypto wrote:
> Hello Folks!
>
> I have excellent news! My VPN provider has sent me email as well as a
> FAX granting me specific permission to run a TOR exit node thr
Sean Alexandre:
> In light of FoxAcid and the NSA hijacking traffic coming out of exit nodes
> [1],
> I'm wondering about the possibilities for building counter measures into exit
> nodes. To start it might be something as simple as bundling some type
> alternate
> CA system such Convergence into
39 matches
Mail list logo