You don't know the meaning of the word vague, Roger.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Mon, Jul 21, 2014 at 10:05:26PM +, Nusenu wrote:
> > 1) We did not ask Black Hat or CERT to cancel the talk. We did (and
> > still do) have questions for the presenter and for CERT about some
> > aspects of the research
>
> Does that imply that the exploited "weakness" is not yet fully
> un
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
> Journalists are asking us about the Black Hat talk on attacking
> Tor that got cancelled. We're still working with CERT to do a
> coordinated disclosure of the details (hopefully this week), but I
> figured I should share a few details with you ear
Hi folks,
Journalists are asking us about the Black Hat talk on attacking Tor
that got cancelled. We're still working with CERT to do a coordinated
disclosure of the details (hopefully this week), but I figured I should
share a few details with you earlier than that.
1) We did not ask Black Hat o
On Mon, 21 Jul 2014 16:31:35 +0200
Eugen Leitl wrote:
>
> https://pay.reddit.com/r/TOR/comments/2b8oq3/please_read_if_you_usedepend_on_tor_never_before/
> "There is currently no known way to ascertain the location of a Tor
> user, thus, no investigative leads exsist."
yeah, keep the
>> On 07/21/2014 10:40 AM, ttzeqq wrote:
>> > I am in US.What can I do?
On Mon, Jul 21, 2014 at 2:00 PM, Patrick wrote:
> Do a lot of universities block Tor?
If this is a student running the client on personally
owned equipment merely to surf the web, a US university
would be on shaky legal groun
On Mon, Jul 21, 2014 at 6:55 AM, Rene Bartsch wrote:
> if OnionCat ist used, does the TOR Hidden Service name resolve/route to the
> OnionCat IPv6 address?
No, not in the clearnet sense.
Overview...
There is a one-to-one mapping between the Tor provided HS .onion address
and the onioncat provide
Do a lot of universities block Tor?
On Mon, Jul 21, 2014 at 1:32 PM, Mirimir wrote:
> On 07/21/2014 10:40 AM, ttzeqq wrote:
> > I am in US.What can I do?
>
> Have you tried using a bridge? Or if that didn't work, have you tried
> using an obfuscated bridge? See https://www.torproject.org/docs/b
On 07/21/2014 10:40 AM, ttzeqq wrote:
> I am in US.What can I do?
Have you tried using a bridge? Or if that didn't work, have you tried
using an obfuscated bridge? See https://www.torproject.org/docs/bridges.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other
On Mon, Jul 21, 2014 at 12:40 PM, ttzeqq wrote:
> I am in US.What can I do?
You can say what, technically and policywise,
you mean by your subject line. What you tried,
what's not working, what you're up against, what
you'd like to do. That way people will have a clue
how to begin helping you.
--
I read this on Reddit, but I have to say. Did he say anything new?
Most of what was stated was already known or at least most guessed at it.
On 07/21/2014 10:31 AM, Eugen Leitl wrote:
https://pay.reddit.com/r/TOR/comments/2b8oq3/please_read_if_you_usedepend_on_tor_never_before/
Please read
On 7/21/2014 10:40 AM, ttzeqq wrote:
> I am in US.What can I do?
You could try using a VPN before using tor.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
I am in US.What can I do?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Thanks for the tips. I'm particularly interested in trying to correct
for the botnet traffic; the hope is that I can get a reasonable idea of
how much the userbase has grown over time. I'll snoop around in the
archives as well.
Martin
--
Martin Shelton
Ph.D. Graduate Researcher
Hana Researc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Just to add to Lunar, if it's raw data then be sure to check the
archives if you haven't already:
https://collector.torproject.org/archive/
- -T
On 21/07/2014 15:48, Lunar wrote:
> mshel...@uci.edu:
>> I'm interested in mapping the adoption of Tor o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Do you mean downloading the raw data behind the statistics or do you
mean if there is a way to exclude the botnet traffic from the general
statistics?
Tom
On 21/07/2014 14:50, mshel...@uci.edu wrote:
> I'm interested in mapping the adoption of Tor ov
mshel...@uci.edu:
> I'm interested in mapping the adoption of Tor over the past couple of
> years. One enduring challenge is that the available traffic statistics
> (https://metrics.torproject.org) reportedly also include a huge spike in
> use around mid-2013, connected to a botnet routing through
https://pay.reddit.com/r/TOR/comments/2b8oq3/please_read_if_you_usedepend_on_tor_never_before/
Please read if you use/depend on Tor. Never before seen FH information.
(self.TOR)
submitted 16 hours ago * by Deepthroat2 [+1]
Hello everyone, I have some information that I have been dying to share
I'm interested in mapping the adoption of Tor over the past couple of
years. One enduring challenge is that the available traffic statistics
(https://metrics.torproject.org) reportedly also include a huge spike in
use around mid-2013, connected to a botnet routing through Tor.
If anyone might off
Hi,
if OnionCat ist used, does the TOR Hidden Service name resolve/route to
the OnionCat IPv6 address? Is it possible to reach a server process
running on the OnionCat IPv6-address via the TOR Hidden Service
hostname?
--
Best regards,
Renne
--
tor-talk mailing list - tor-talk@lists.torpro
Hi,
the RaspberryPi is a great low-power platform for TOR Hidden Services
like a personal mail server. Unfortunately the origin Debian/Raspbian
packages are quite outdated and do not even support transparent
proxying.
Is there any chance the TorProject will provide current stable Raspbian
p
Hi,
I wanted to publicly thank all the people who helped with the
organization of the Pre-PETS 2014 meetup.
https://blog.torproject.org/events/researchers-practitioners-meetup-pets-amsterdam
Jaap van Ginkel and Joeroen van der Ham, thank you for providing your
department space and all the free
Am 2014-07-21 04:17, schrieb Cinaed Simson:
On 07/17/2014 07:11 AM, Elrippo wrote:
I don't think that this is a problem, if you configure TOR as a
transparent proxy with some iptables rules on your Debian based OS,
all TCP based traffic is routed through TOR
Take a look at the last example
ht
On Mon, 21 Jul 2014 10:21:33 +0200
Elrippo Athletico allegedly wrote:
>
> Depends, on wether you trust a CA, for example VeriSign, who just
> want your money, or wether you go trough a personal verification
> process at cacert.org, like i did, where you sit face to face with
> your assurer.
>
>
Am Montag, 21. Juli 2014, 04:17:05 schrieb Cinaed Simson:
> On 07/17/2014 07:11 AM, Elrippo wrote:
> > I don't think that this is a problem, if you configure TOR as a
> > transparent proxy with some iptables rules on your Debian based OS, all
> > TCP based traffic is routed through TOR
> >
> > Tak
25 matches
Mail list logo