Yes, I would recommend an option to select country, with the dropdown
indicating how many exit nodes that would mean you would be rotating through.
Start with a list of continents, followed with a list of countries. That would
be something that a control panel would make easier to implement.
-
That was just the first example that came to mind and that most people are
familiar w/ of something that is targeted geographically, but there are
other things that are targeted geographically.
---
-ITG (I
That isn't what I'm running Tor relays for.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Would it be possible to tell tor to use a specific exit node (or exit
country) for a specific subset of websites (I don't know if this is Ted's
specific use case), but for example if I was in Europe or Asia and wanted
to watch my normal Hulu shows and wanted tor to act normally for everything
else.
On Wed, 23 Apr 2014 09:07:02 +
antispa...@sent.at wrote:
> Georg Koppen:
> > antispa...@sent.at:
> >> Could Tor Browser kill or minimize the warning triggered by
> >> entering a site with a self signed certificate?
> > Killing is not a good idea. What do you mean with "minimize"?
>
> A self-s
On 04/23/2014 04:58 PM, Ted Jackson wrote:
> I would like to change to an US Ip address when I want to? possible?
You can ask Tor to only use US exits, but this reduces your anonymity in
unclear ways.
ExitNodes {us}
--
Moritz Bartl
https://www.torservers.net/
--
tor-talk mailing list - tor-tal
On 4/23/2014 10:48 AM, s...@sky-ip.org wrote:
On 4/23/2014 5:58 PM, Ted Jackson wrote:
I would like to change to an US Ip address when I want to?
possible?
You can set a static exit node in your torrc but that is not
recommended at all as it will have impact on your anonymity.
Follow up to T
Andrew Lewman:
> On Wed, Apr 23, 2014 at 09:07:02AM +, antispa...@sent.at wrote 2.2K bytes
> in 0 lines about:
> : A self-signed certificate is better than no certificate. Given the
> : trouble with a CA, it might be just as good as a CA certificate.
>
> Perhaps a better complaint for Mozilla
On Wed, Apr 23, 2014 at 12:46 PM, anonym wrote:
[...]
> Given the planned release date for Tails 1.0, this actually doesn't look
> too bad a compromise. I had a quick look at the other tickets tagged
> `024-backport` and nothing seemed very important.
For future reference, don't just look at 024
23/04/14 16:51, Nick Mathewson wrote:
> On Wed, Apr 23, 2014 at 10:28 AM, anonym wrote:
>> 21/04/14 12:27, Nusenu wrote:
>>> Hi,
>>>
>>> the code to blacklist heartbleed affected tor directory authority keys
>>> has been merged about a week ago [1].
>>>
>>> Do you have an ETA on when you are going
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/23/2014 5:58 PM, Ted Jackson wrote:
> I would like to change to an US Ip address when I want to?
> possible?
>
You can set a static exit node in your torrc but that is not
recommended at all as it will have impact on your anonymity.
Always r
I would like to change to an US Ip address when I want to? possible?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Wed, Apr 23, 2014 at 10:28 AM, anonym wrote:
> 21/04/14 12:27, Nusenu wrote:
>> Hi,
>>
>> the code to blacklist heartbleed affected tor directory authority keys
>> has been merged about a week ago [1].
>>
>> Do you have an ETA on when you are going to release it (tor and TBB
>> packages)?
>
> A
21/04/14 12:27, Nusenu wrote:
> Hi,
>
> the code to blacklist heartbleed affected tor directory authority keys
> has been merged about a week ago [1].
>
> Do you have an ETA on when you are going to release it (tor and TBB
> packages)?
As the release manager for the Tails 1.0 release I'm also in
On Wed, Apr 23, 2014 at 09:07:02AM +, antispa...@sent.at wrote 2.2K bytes
in 0 lines about:
: A self-signed certificate is better than no certificate. Given the
: trouble with a CA, it might be just as good as a CA certificate.
Perhaps a better complaint for Mozilla than Tor.
--
Andrew
pgp
I apologize for the formatting errors in this first version of the
email; I have sent it again with corrections.
harmony:
>
> Tor Weekly News April 23rd, 2014
>
Tor Weekly News April 23rd, 2014
Welcome to the sixteenth issue of Tor Weekly News in 2014, the weekly
newslette
Tor Weekly News April 23rd, 2014
Welcome to the sixteenth issue of Tor Weekly News in 2014, the weekly
newslette
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On that note.
https://cacert.org root certificates are missing mostly.
You have to install them by your own. Personally i prefer cacert.org, because
firstly you have to identify yourself and secondly you actually are meeting
assurers face to face
Georg Koppen:
> antispa...@sent.at:
>> Could Tor Browser kill or minimize the warning triggered by entering a
>> site with a self signed certificate?
> Killing is not a good idea. What do you mean with "minimize"?
A self-signed certificate is better than no certificate. Given the
trouble with a CA
Am 2014-04-22 08:54, schrieb Georg Koppen:
> antispa...@sent.at:
>> Could Tor Browser kill or minimize the warning triggered by entering a
>> site with a self signed certificate?
>
> Killing is not a good idea. What do you mean with "minimize"?
>
> Georg
>
>
>
>
I've wanted that for browsers
21 matches
Mail list logo