i want to know how do i configure tor on my jailbroken iphone if i am
already using proxy for using internet. also i have access to torrc
configuration files on my iphone.
so please help me to configure tor
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other set
Hi,
For some days now I'm playing with the Tor source code and trying to get a
better understanding of it. Also read all the documentation on
volunteering. I'm looking for a way to get involved with its development
but it's not clear for me how to get the ball rolling.
If you are a Tor (core) dev
Can someone explain how this new check differs from the last one please? I
don't have the time to compare the code right now.
Thanks.
On Thu, Oct 31, 2013 at 3:40 PM, Luther Blissett wrote:
> On Wed, 2013-10-30 at 01:37 +, antispa...@sent.at wrote:
> > On 29.10.2013 13:39, krishna e bera w
Hi,
Your information is precious.
I am experimenting problems with TorBrowser on the last months.
On most of the web sites I have to reload it 2 to 8 times until it
loads, receiving most of the times messages like this:
Unable to connect
Firefox can't establis
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Windows Yes.
SMTP over ssl/tls is configured on port 25. Starttls, aca submission, is
configured for port 587
unknown schrieb:
>On Sat, 2 Nov 2013 13:50:18 +0100
> wrote:
>
>> 1) Create a list of tor exit nodes that do not block port 25
>>
On Sat, 2 Nov 2013 13:50:18 +0100
wrote:
> 1) Create a list of tor exit nodes that do not block port 25
> 2) Command the tor daemon to exit those nodes exclusively.
SSL-SMTP configured to works over 465 port in most cases.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubsc
On 13-11-02 02:54 AM, DeveloperChris wrote:
> On 01/11/2013 12:39 AM, mick wrote:
>> On Thu, 31 Oct 2013 17:59:39 +1030
>> DeveloperChris allegedly wrote:
>>
>>> Could exit nodes act as caches. I know that would introduce a number
>>> of issues including a compromised exit node revealing what was
Hello,
Nice to be here.
I’am working on a Android project.
I try to launch tor (Orbot 12.05 already installed ) via the console/terminal
I don’t want the graphical interface so “users” can mess with it.
(orbot is working perfect via the gui)
Does anyone have the exact syntax to start on a nexu
On 11/02/2013 02:27 PM, Joe Btfsplk wrote:
>> > Don't expect too much help here [from Moritz].
> Well, not from some, anyway. LOL :)
Hey hey, no reason to become hostile. I wrote the mail, which I consider
"help". Help in making you understand why nobody really interacted with
you over this issue
mick schrieb:
>On Sat, 02 Nov 2013 15:15:41 +0100
>"freek2...@yahoo.de" allegedly wrote:
>>
>> I'm answering off-list, because it seems out of focus of the
>> community there and while I understand the
>> need/necessity/advantage/etc. of opensource-sw in certain cases, I'm
>> not a "*nix-naz
On Sat, 02 Nov 2013 15:15:41 +0100
"freek2...@yahoo.de" allegedly wrote:
>
> I'm answering off-list, because it seems out of focus of the
> community there and while I understand the
> need/necessity/advantage/etc. of opensource-sw in certain cases, I'm
> not a "*nix-nazi" and one of my machines
Hi Joe!
I'm answering off-list, because it seems out of focus of the community there
and while I understand the need/necessity/advantage/etc. of opensource-sw in
certain cases, I'm not a "*nix-nazi" and one of my machines uses windows and
KIS2013. I'm also not eager to "out" myself with this to
On 11/2/2013 6:08 AM, Moritz Bartl wrote:
>What kind of "protection" do you expect from this, anyway?
Wow, I don't know. Having a rough night / day?
Could be a weird KIS bug affecting TBB, *that stopping / restarting KIS*
somehow fixes it temporarily (consistently). That'd be fairly unusual.
t...@lists.grepular.com:
> 1) Create a list of tor exit nodes that do not block port 25
> 2) Command the tor daemon to exit those nodes exclusively.
Is this really necessary? Tor will automatically honor any exit relays's
exit policy and use another exit having that port open instead?
--
tor-
On Sat, 02 Nov 2013 03:46:33 -0400
Michael Wolf allegedly wrote:
>
> I think if this conversation is to progress beyond "Tor got someone's
> network hacked" <-> "No, it probably it didn't", we'll need some
> specifics.
Seconded.
> I think until those facts are known, we're just spinning our w
> I like to start a conversation about secure email provider... If I
> start new email provider now, how to guarantee security and privacy
> for user?
Before becoming a secure e-mail provider, first you should understand
how users can best protect themselves.
Users should not relay outbound messa
On 02/11/2013 8:19 PM, Roger Dingledine wrote:
On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
Snip
Actually, technically, the analogy would be trying to deanonymize a
client from a subverted website.
The Tor client running the hidden service picks its own three hops,
so it's
Hi,
On 11/01/2013 07:49 PM, Joe Btfsplk wrote:
> I could add TBB, vidalia and Tor.exe to KIS's "do not monitor
> application's activity" and / or "do not scan (this application's)
> network activity" list, but that defeats purpose of having the protection.
What kind of "protection" do you expect
It's a nice idea to suggest he joins the list.
I'll drop the hint, but this guy is not one to participate in online
discussions in any meaningful fashion. He is very security conscious and
does not have any form of traceable online presence as it is. But he may
come in under a pseudonym.
Irr
On Sat, Nov 02, 2013 at 10:46:38AM +1030, DeveloperChris wrote:
>
> I just reviewed the tor hidden services page. so I am pretty green
> about the way it works.
>
>
> From the description I gather this
>
> When a client wants to connect to a hidden service an introducer
> picks a random rendezv
On Sat, Nov 02, 2013 at 05:49:57AM -0400, Roger Dingledine wrote:
> On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
> > There's a whole circuit between the HS and the rendezvous point. You'd
> > have the same problem as trying to deanonymize a client from a subverted
> > exit node.
On Sat, Nov 02, 2013 at 02:45:51AM -0700, Andrea Shepard wrote:
> There's a whole circuit between the HS and the rendezvous point. You'd
> have the same problem as trying to deanonymize a client from a subverted
> exit node.
Actually, technically, the analogy would be trying to deanonymize a
clie
On 11/2/2013 2:33 AM, DeveloperChris wrote:
> I got to speak with my acquaintance about his experience. Sadly It was
> as bad but not as quick as I was told.
>
> He told me within a three week period of setting up the tor exit node he
> considered his entire internal network compromised as several
On 01/11/2013 12:39 AM, mick wrote:
On Thu, 31 Oct 2013 17:59:39 +1030
DeveloperChris allegedly wrote:
Could exit nodes act as caches. I know that would introduce a number
of issues including a compromised exit node revealing what was
retrieved by that node (but not whom for) so if it was lim
I got to speak with my acquaintance about his experience. Sadly It was as
bad but not as quick as I was told.
He told me within a three week period of setting up the tor exit node he
considered his entire internal network compromised as several of his
machines showed signs of being compromis
antispa...@sent.at:
> If TorBirdy 0.1.2 has support for Thunderbird 24, can I just leave my
> current configuration and just upgrade the TorBirdy plugin? As far as I
> can tell, all the connections of Thunderbird 24 are made through Tor,
> less the DNS part.
When you say configuration, which conf
Mix+TB Test:
> Running TB 24.1.0 with TorBirdy 0.1.1 under Linux. No issues. Default
> settings, no other extensions.
It probably works, but I expect it to be broken for some preference
settings (not the important ones) and the account manager because of the
changes introduced in TB 24. Long stor
Thanks
I found this discussion on the subject
https://blog.torproject.org/category/tags/anonymity
Will try to read through it thoroughly later tonight.
DC
Please keep the replies civil. I know there is one in every crowd. Don't be
that one.
On 02/11/2013 11:16 AM, Mirimir wrote:
On 11/0
28 matches
Mail list logo