I am interested in the diffs between two consensus files. E.g.,
* which relays are in only one of the two consensus files
* substantial changes in advertised/read bandwidth for a relay in both
consensus files
-V
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change o
On 14/08/14 04:34, Griffin Boyce wrote:
> Hey Virgil,
>
> The answer depends on what you'd like to do with consensus files.
> There was (is?) a GSoC project by Daniel Marti in furtherance of
> proposal 140 [2][1], but that's probably not what you're looking for.
>
> There's also a script by
Hey Virgil,
The answer depends on what you'd like to do with consensus files.
There was (is?) a GSoC project by Daniel Marti in furtherance of
proposal 140 [2][1], but that's probably not what you're looking for.
There's also a script by Moritz Bartl that analyzes consensus files
and tu
Hello,
I studied about section 3.5.3 computing bandwidth weights in Tor Directory
Protocol Version 3. I know now how to compute the values of these weights.
1) I am not able to understand how these values are used in path selection
by the client. Anybody please highlight on this.
2) There are gu
Hello,
I've been randomly generating keys to try to stumble upon sites.
-
-
I'm trying now a list of supposedly current or past .onion sites.
I've noticed a pattern in all the addresses.
I don't know what it is or what it could be used for so I'm not sure if i
should to share for all to read.
And just to be pedantically clear, the data on metrics.torproject.org is
computed from the collecTor historical consensus files?
-V
On Wednesday, August 13, 2014, Virgil Griffith wrote:
> Or, if I were to dream, to highlight the differences between two Tor
> consensus files?
>
> -V
>
--
tor-ta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Is anything else know about the attack using Javascript? How does that
even work? Speculations, wild guess, reports, and rants are all
appreciated
On 08/13/2014 05:18 PM, tor-talk-requ...@lists.torproject.org wrote:
> AFAIK the malware used javascript
On Wed, Aug 13, 2014 at 10:06:00AM +, blo...@openmailbox.org wrote:
> If it's possible for the owner of a hidden service (whether the FBI
> or a regular person) to install malware which grabs visitors' IPs,
> then what is stopping any hidden service owner from doing this?
See
https://lists.tor
On 08/13/2014 03:01 PM, Anders Andersson wrote:
> On Wed, Aug 13, 2014 at 12:06 PM, wrote:
>> How, in this case, was it possible for the FBI to learn the IP
>> addresses of visitors to this hidden service? The Tor hidden server
>> page states that "In general, the complete connection between
>
Or, if I were to dream, to highlight the differences between two Tor
consensus files?
-V
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Le 13/08/2014 23:01, Anders Andersson a écrit :
Considering the number of individuals that must have visited the hidden
service, this doesn't seem to be very many people. Why were so few
identified? Were the 25 using outdated browsers (TBB)?
How, in this case, was it possible for the FBI to lea
On Wed, Aug 13, 2014 at 03:18:23PM -0500, Joe Btfsplk wrote:
> The Privoxy part of the chain could be an issue. What is your
> reason for using Privoxy?
> In general, I find Tor to be faster overall, since overhauls in
> TorBrowser - when they stopped using Privoxy (& likely started other
> speed
On Wed, Aug 13, 2014 at 12:06 PM, wrote:
> If it's possible for the owner of a hidden service (whether the FBI or a
> regular person) to install malware which grabs visitors' IPs, then what is
> stopping any hidden service owner from doing this?
Nothing is stopping a hidden service owner from d
On 8/13/2014 2:20 PM, Martin S wrote:
I've set up a Tor and Privoxy chain for our organisation, especially
for our courntry offices, of which some work in high risk countries.
After some brief tests I notice performance issues (it's somewhat slow
opening new pages). is there any suggestions for p
I've set up a Tor and Privoxy chain for our organisation, especially
for our courntry offices, of which some work in high risk countries.
After some brief tests I notice performance issues (it's somewhat slow
opening new pages). is there any suggestions for performance
improvements that is generall
Hi,
Not sure if that has been discussed yet... the site
torbundlebrowser.org is a almost perfect copy of the TOR webpage and
has a TBB download which has malware in it. (down at the moment)
http://dustri.org/b/torbundlebrowserorg.html
--
Regards
--
tor-talk mailing list - tor-talk@lists.t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 8/13/2014 5:51 PM, Sebastian Hahn wrote:
> Dear Tor users,
>
> the system for naming relays has been an issue for a long time.
> Referring to a relay by the operator-chosen nickname in your Tor
> configuration file was never a great idea if you w
Dear Tor users,
the system for naming relays has been an issue for a long time.
Referring to a relay by the operator-chosen nickname in your Tor
configuration file was never a great idea if you wanted to rely on Tor
using that specific relay. As a band-aid, the Tor directory authorities
implemente
Hello,
I came across 2 connections that were able to stay established with my hardware
disabled.
I'm not sure why. So I did a set of different netsat runs.
I don't know if any of this can affect Tor. But I thought I would post what I
found.
The results are below.
Hardware Disabled(lapto
Tor Weekly NewsAugust 13th, 2014
Welcome to the thirty-second issue of Tor Weekly News in 2014, the
weekly newsl
A recent story in Wired is entitled "Visit the Wrong Website and the FBI
Could End Up in Your Computer" by Kevin Poulsen
(http://www.wired.com/2014/08/operation_torpedo/). The story involves
the FBI uncovering the IP addresses of numerous users of a Tor hidden
service.
I know this was mention
Hello,
I just downloaded tor and am trying to figure it out.
1.
I noticed that all the links I see are 16keys long followed by .onion.
Couldn't someone(person/company/government/other) just generate every
16 digit combination possible then try to connect to them?
Is there another layer I haven
22 matches
Mail list logo