On Sat, Nov 23, 2013 at 8:04 PM, wrote:
>> >> 1) Create a list of tor exit nodes that do not block port 25
>> >> 2) Command the tor daemon to exit those nodes exclusively.
>> >SSL-SMTP configured to works over 465 port in most cases.
>> On Windows Yes.
>> SMTP over ssl/tls is configured on po
On 11/22/2013 16:53, Red Sonja wrote:
How can one be sure that firmware that is running on the router is
built from this particular source code and not from some modified
version or different revision?
Hashes?
The ability to build it from sources?
If you search you can find a few other solutio
> >> 1) Create a list of tor exit nodes that do not block port 25
> >> 2) Command the tor daemon to exit those nodes exclusively.
> >SSL-SMTP configured to works over 465 port in most cases.
> On Windows Yes.
> SMTP over ssl/tls is configured on port 25. Starttls, aca
> submission, is configure
Gordon Morehouse has been spending a lot of time getting the Pi to run as
Tor relay: https://github.com/gordon-morehouse/cipollini
I've been running a BeagleBone Black relay on a home network for over 2
months now: http://datko.net/2013/09/13/update_bbb_tor/
Josh
On Fri, Nov 22, 2013 at 5:43 AM
On reflection, I think I should clarify ...
Roger:
> As for having a network map for TBB 3, I agree in theory. But
> somebody needs to actually do it. Promising routes include writing
> it into Tor Launcher (harder to do, but easier to maintain and
> probably safer) or writing instructions for how
On 11/23/2013 2:16 AM, Roger Dingledine wrote:
On Sat, Nov 23, 2013 at 07:42:23AM +0200, Sherief Alaa wrote:
I just see the options StrictExitNodes and StrictEntryNodes is deprecated?
The correct syntax is:
EntryNodes {node, node, ...}
StrictNodes 0 or 1 #0 for disabled
No, you should not use
Some more information from [1]
- "users can whitelist certain sites so that their use is not run through Tor."
- "Users can also set up Safeplug to work on a per-browser basis, so for
example Firefox may always run through Tor while Chrome won’t."
- "users can also set themselves up as Tor nod
* on the Fri, Nov 22, 2013 at 06:17:24PM +, Jacob Appelbaum wrote:
>> You shouldn't just route people through Tor without their knowledge.
>> They need to understand the risks and adapt their use accordingly.
>
> And what is the risk of barebacking with a network?
When your traffic comes out
On Sat, Nov 23, 2013 at 02:22:48PM +, Mark McCarron wrote:
> How about a certification program? A company can donate some
> funds to have their product evaluated and if successful gain
> "TOR Certified" status. It would stop all this nonsense and
> provide everyone the opportunity to request
Hi,
in October I tried to access the blog of Neelie Kroes with Tor browser. Neelie
Kroes is Vice-President of the European Commission and responsible for the
Digital Agenda for Europe. At that time she asked the public in her blog about
their views:
http://ec.europa.eu/commission_2010-2014/kro
How about a certification program? A company can donate some funds to have
their product evaluated and if successful gain "TOR Certified" status. It
would stop all this nonsense and provide everyone the opportunity to request
specific features or amendments to designs.
I understand that no on
Hi,
This is a bit OT, but it might be of interest here, too.
I don't know whether you follow the GnuPG mailing lists, but in case you
missed it: there has been a dispute between Richard Stallman and Werner
Koch on a license change for the GNU Privacy Handbook (GPH).
> http://www.gossamer-threads.
On Fri, Nov 22, 2013 at 09:48:57PM -0500, grif...@cryptolab.net wrote 1.4K
bytes in 0 lines about:
: Perhaps your most pressing concern should be about whether or not it
: protects its users, given that it's using Tor as the vehicle to attempt
: that. And any failure to do so would have the sid
Roger:
> On Sat, Nov 23, 2013 at 06:04:54PM +1000, Katya Titov wrote:
>> But if we're talking about TBB then a local network attacker should
>> never see the request, just the resultant Tor traffic. Unless my
>> understanding is very off.
>
> If we're talking about TBB and it's working correctly,
On Sat, 23 Nov 2013 00:53:10 +, Red Sonja wrote:
...
> media is calling shocking with NSA was done before by STASI. Than KGB
> before them. NKVD before that. And so on a few millennia.
No. The NSA/GHCQ took it to a new level available with the internet
and general automation. All the predecess
Indeed.
I have setup completely open Tor WiFi hotspots in both my home and my office.
They are labeled "%SSID% (Tor)" to give advanced users the idea, but I'm doing
no more than that. The bandwidth overhead is manageable and the risk to me is
of course minimized. IMHO all hotspots should come p
On Sat, Nov 23, 2013 at 06:04:54PM +1000, Katya Titov wrote:
> > On Sat, Nov 23, 2013 at 07:35:54AM +1000, Katya Titov wrote:
> >> The advantage that I see is that is there is no way to directly
> >> access a .onion site without using Tor, so it is a clear indicator
> >> that Tor is in use, visible
11.10.2013 15:44, Sebastian G. :
> Hello,
>
> beside having each authority call in for their vote about the random
> string, how about including a string in the consensus not under control
> by any authority?
> [...]
This has not received any comment whatsoever.
I had not wasted any thought on t
On Sat, Nov 23, 2013 at 07:42:23AM +0200, Sherief Alaa wrote:
> > I just see the options StrictExitNodes and StrictEntryNodes is deprecated?
>
> The correct syntax is:
>
> EntryNodes {node, node, ...}
> StrictNodes 0 or 1 #0 for disabled
No, you should not use StrictNodes with EntryNodes or Exit
Roger:
> On Sat, Nov 23, 2013 at 07:35:54AM +1000, Katya Titov wrote:
>> The advantage that I see is that is there is no way to directly
>> access a .onion site without using Tor, so it is a clear indicator
>> that Tor is in use, visible to the user.
>
> Not necessarily. Imagine a local network at
20 matches
Mail list logo