On Thu, Jun 26, 2014 at 11:49 AM, grarpamp wrote:
>> ...
>> the original argument is based on faulty assumptions.
>
> Rather, it presents untested hypotheses. As in the past with
> these sorts of sites, the operator perhaps got vanned for reasons
> other than any particular weakness of tor itself,
On 6/26/2014 1:34 PM, Bobby Brewster wrote:
/Let's say I download a PDF with Tor. I get the warning that I might download
it outside Tor./
That used to be the norm, but I believe the message was changed in later
TB versions. Which version are you using?
I'm not sure I've seen that warning lat
Not every file you download is a bad file, but this is just a warning to
tell you that they exist and that 'doxing' code can be hidden into
various file types. When you open those files it looks like any normal
document, but also sends a call back to the owner with various bits of
information about
In re: Mark McCarron wrote:
On Thu, Jun 26, 2014 at 2:00 AM, coderman wrote:
> On Wed, Jun 25, 2014 at 10:09 PM, Mirimir wrote:
>> ...
>> As far as I know, no hidden service site has ever been compromised
>> through an inherent weakness of Tor. Am I wrong in saying that?
>
> i am only aware of on
Hello,
I know that when the TBB connects to a 'normal' .com or .org or whatever
address then the DNS resolution is done by the exit node. There is no need
anymore (not for several years now) for the client to set-up DNS manually (as
used to be the case with Polipo or Privoxy).
However, how do
Let's say I download a PDF with Tor. I get the warning that I might download it
outside Tor.
What is the liklihood of that actually happening? Are there some dangerous
file types that one should not download.
Please note that I am talking about the downloading itself. I'm not talking
about do
Hello,
Many years ago Vidalia used to be part of the TBB (I think - or was it a
stand-alone program)?
Anyhow, it was helpful to see the browsing speed.
I realise Vidalia can be installed as a stand-alone program:
https://www.torproject.org/docs/debian-vidalia.html.en
However, I'm wondering if
Hi list,
I'm experimenting with sending messages over Tor using the program Pure
Data. Pure Data (or Pd) is a graphical programming environment. It typically
runs two processes-- a tk GUI process, and the "main" process. The two
communicate over the loopback device 127.0.0.1. (Can't rem
> the list goes on, and on, ...
https://code.google.com/p/pentest-bookmarks/
https://code.google.com/p/pentoo/wiki/BookmarksList
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Assuming seperate modem, WAN IP changes when MAC of first device after
(either router or regular computer) changes. Some router firmwares
allow you to change the WAN side MAC which of course results in
another IP address being assigned; bear in mind if you do this a
modem reboot is required.
kill dhcpd, change mac, start dhcpd.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Wed, Jun 25, 2014 at 11:50 PM, Tor Talker wrote:
>
> More to the point, do you have specific concerns regarding the
> Linux/Tor/Apache/Perl stack we are using? We do sanitize error messages to
> prevent Apache from leaking system information, but that's really the only
> special effort
Yes you are right, now I know.
My ip is dynamic but is changed quite rarely, and reboot the router
99% of the times doesn't affect it.
That's is why I'm looking for a different approach.
thanks
Luca
On 26 June 2014 14:14, cbr...@hush.com wrote:
> This is why it is recommended that you not commi
This is why it is recommended that you not commingle the tor exit
relay data and your personal traffic on the same IP.
Do you have a static or dynamic IP address? Please also consider the
possible consequences of running an exit relay from your house...
On 06/26/2014 at 4:01 AM, "Luca" wrote:Hi t
Haleluja brothers and sisters!
Brother McCarron has step up to say something to us!
I say preach it brother!
Mark McCarron:
> I have been examining
How?
> the number
Can you say the number, oh brother?
> of what would
Would like you're not sure of the healing power of the Holy Spirit?
> no
shm...@riseup.net:
>
>
> Mike Cardwell:
>> SPDY is currently supported by Firefox, Chromium and Opera. A few
>> examples of sites that already have SPDY enabled: Google.com+mail,
>> Facebook, Twitter, Wordpress.com. Apache has a module for it:
>> https://code.google.com/p/mod-spdy/ and the latest
Hi, I made a very basic python script to help people setup their hidden
service. Maybe this could be useful for some people.
https://github.com/Dedal0/Tosc
El jun 26, 2014 3:12 AM, "Mirimir" escribió:
> On 06/26/2014 12:50 AM, Tor Talker wrote:
> > On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
>
Mike Cardwell:
> SPDY is currently supported by Firefox, Chromium and Opera. A few
> examples of sites that already have SPDY enabled: Google.com+mail,
> Facebook, Twitter, Wordpress.com. Apache has a module for it:
> https://code.google.com/p/mod-spdy/ and the latest versions of Nginx
> have it
Hi to all,
Few days ago I have tried to setup an exit relay on my home laptop ..
with great success :)
The bad part is after seeing my external ip address published to the
world on atlas or globe I have discovered I cannot access anymore to
some site with my payed premium login credential because
On 06/26/2014 12:50 AM, Tor Talker wrote:
> On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
>
>> ... any Tor user can host a hidden service. But few people, even
>> experienced web engineers, know enough to do it securely enough.
>> Also, hidden services are far more vulnerable than Tor users,
>> sim
On Thu, 26 Jun 2014 00:50:29 +, Tor Talker wrote:
...
> > enough to do it securely enough. Also, hidden services are far more
> > vulnerable than Tor users, simply because they serve stuff.
...
> What sort of vulnerabilities would you expect to see?
Problem: Your hidden server can be made to t
On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
> ... any Tor user can host a
> hidden service. But few people, even experienced web engineers, know
> enough to do it securely enough. Also, hidden services are far more
> vulnerable than Tor users, simply because they serve stuff.
OK, I'll bite.
Are
On Wed, Jun 25, 2014 at 10:09 PM, Mirimir wrote:
> ...
> As far as I know, no hidden service site has ever been compromised
> through an inherent weakness of Tor. Am I wrong in saying that?
i am only aware of one Tor vulnerability that led to compromised
hidden services of affected instances, ba
23 matches
Mail list logo