* Erinn Clark [2014:05:01 22:41 -0400]:
> Dear Tor Trac users,
>
> We learned on recently that there was a bug in our Trac setup that allowed
> anyone to register a new user account for an existing user name, overwriting
> the existing user's password and thereby taking over the account [0].
I
Dear Tor Trac users,
We learned on recently that there was a bug in our Trac setup that allowed
anyone to register a new user account for an existing user name, overwriting
the existing user's password and thereby taking over the account [0].
A workaround was quickly implemented by weasel to prev
It might be short sighted but I couldn't honestly blame them either.
When I ran an exit relay (not just a relay) the reason I had to take it
down is some idjit was using my exit node to hijack Gmail accounts.
On Thu, May 1, 2014 at 12:07 PM, Gordon Morehouse wrote:
> -BEGIN PGP SIGNED MES
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
I've now sent 3 messages to (ironically) a Google employee about his
blog posts on the Chrome CRLSet cert revocation issue[1] after
Heartbleed; all three have been blocked as GMail by spam. I've never
had this issue before. I routinely route email