So,
Tor is hardware right?
Going from your house to your service provide?
So all anyone needs to do and it seems the US is probably already doing it is
just collect all the traffic or all the traffic that can't be read going into
any service provider or hub or wherever.
And then decrypt it or j
So again thinking about how tor is secure and how it could be bypassed
So the output last ip is shown right?
Since the government agencies can get into other government buildings.
Placing bugs in ultra secure places.
Wouldn't it be easy for someone to get someone in to that out put ip.
Place
Hello,
I would like to ask are all downloads of Tor the same?
If so are all the folders called the same thing?
Same location same setup?
Would it make it more secure to allow locking the folder?
changing or not allowing changing of file names?
Are all the files size checked on start?
md5? or howe
Hello,
I would like to ask are all downloads of Tor the same?
If so are all the folders called the same thing?
Same location same setup?
Would it make it more secure to allow locking the folder?
changing or not allowing changing of file names?
Are all the files size checked on start?
md5? or howe
Please stop sending BCC e-mails to me.
Thanks
Original Message
From: isis
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Cc: tor-...@lists.torproject.org
Subject: Re: [tor-talk] Tor Data Leak
Date: Thu, 28 Aug 2014 00:17:18 +
> --
The short version of "Why 3" is because if the attacker controlls the
first and the last you loose, if not you win. So it doesn't really
matter how many are in between because the attcker doesn't need to
controll those to identify your traffic.
That's of course a bit over simplified but if you wa
John Doe writes:
> How can I set the number of relays in the configuration file? Also can you
> explain why 3 is enough? I hear things of analysis being able to track people
> trough the various relays they use. This worries me some. Care to help me
> understand?
https://www.torproject.org/doc
I will answer many e-mails in this message. Look for yours:
Roger Dingledine wrote:
> people have had problems with the interactions
> between these two programs in the past.
In an universe of so many interaction problems among programs, TOR must
have a more than suspicious "problem"?
Why not
It works like any other email you're replying to. No need to start a new
email, just reply to the one you're responding to.
---
GPG/PGP Fingerprint
E129 722B A512 105C E8BE
4705 8046 EA48 2C82 1339
https://arlen.io/key
On Aug 28, 2014 3:16 PM, "John Doe" wrote:
> I am not sure how this all works
I do not get emails. I have to keep checking this archive page. I try and click
the link but tor browser will'nt let my computer load up the e-mail client. I
had to try and get the link to a different firefox for it to run. This is not
easy to use. A normal user would be hopeless with this syste
I am not sure how this all works, but I am attempting to reply in the same vein
I started.
How can I set the number of relays in the configuration file? Also can you
explain why 3 is enough? I hear things of analysis being able to track people
trough the various relays they use. This worries me
On 08/28/2014 11:49 AM, John Doe wrote:
> My question goes like this. How is tor safe sufficiently with 3 only
> nodes during your connection using it? I found a method of using tor
> through another tor but I find information both on forums and your
> trac log that this may not be secure and yo
Third time I have sent this now. Never had to jump thru so many hoops and
subscribe and confirm things to send someone a simple email before...
Hiya.
My question goes like this. How is tor safe sufficiently with 3 only nodes
during your connection using it? I found a method of using tor through
13 matches
Mail list logo