On Tue, 16 Sep 2014 11:41:13 +, Joe Btfsplk wrote:
...
> If Comcast or any ISP / mobile provider don't monitor their customers'
> activities, how are they able to regularly SELL such data to LEAs?
What they 'sell' (and I'm rather confident they'd rather not do
this particular 'business') is g
I've been testing out various tor browser & bridge configurations and
have been hampered by the bridge DB being down the last bunch of days. I
see it's up again: Thanks, whoever did that work! - eliaz
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings
hi,
in an effort to document the torcloud process again i started another
torlcoud node.
this time i got an error. i don't know if it's of concern or not though
i guess torcloud log viewing doesn't differ from a home node.
getting ssh to work for the uninitiated is a terrible chore using
amazon'
Your point is valid.
I didn't realise that it was established that the replies were entirely
pointless.
Aren't there any real copyright threats?
Robert
> On 09/16/2014 06:20 PM, I wrote:
>> The RISK OF COPYRIGHT THREATS is specifically greatest
>> in USA. Other nations should be assessed indi
On 09/16/2014 06:20 PM, I wrote:
> The RISK OF COPYRIGHT THREATS is specifically greatest
> in USA. Other nations should be assessed individually.
> Fearmongering is not productive.
I call it DMCA spam. Spam sent by a botnet: They scrape IPs from torrent
trackers and send out unsolicited email. Th
Fair enough sort of.
When I encountered this list and the general references to Tor around the place
there was far too much rumourmongering about exits and Tor in general scaring
people away.
It is reasonable to be cautious but if everyone talks in general terms of fear
and mayhem it is workin
I apologize for my first mail, I should have waited to calm down a bit.
I've been looking into your website and figured out how to configure my
relay to not get listed.
I was allowing tcp/8000 since it's a common alternative http port. I'm
curious why you're listing tor exits that allow to exit t
Sectoor is no ISP. They run a DNSBL. Sorry if my message has been
unclear.
The problem is, that the /24 of the ISP hosting my tor-exit has been
banned as tor-exit, regardless that I'm the only tor-exit on that
network. This is disrupting IRC and mail traffic. I assume this might
have happened to q
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 09/16/2014 06:03 PM, Thomas White wrote:
> Note: I have excluded sectoor.de from this message
>
*** You could probably have kept them Cced, as your arguments are
cooling down the initial flame and shed light over potential solutions
and consequenc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: I have excluded sectoor.de from this message
Public shaming of companies does work, there is a good/bad ISP list
below which can always be subtlely mentioned when communicating with ISPs:
https://trac.torproject.org/projects/tor/wiki/doc/GoodBa
Dear tor-talk, Dear sectoor,
I'm running a tor-exit at a small provider. Another customer at the same
provider complained they got blacklisted by sectoor for operating a
tor-exit. This customer doesn't run a tor server and didn't run a tor
server in the past.
Hence, they got blacklisted as tor-ex
i ran into tor ban lists in the uk
eg
i emailed the operator. he was reasonable and polite about my query.
just asked why he ran tor ban lists.
he was just sick of the smtp irc and brute for ssh attacks.
though it sounds like the climate is quite bad in the UK generally.
[...]
T
nice !
is the dataset available?
On 16/09/2014 5:17 AM, Virgil Griffith wrote:
Just multiple regression. Nothing fancy.
And yes all data is works on a standard desktop. I use Rstudio for
everything.
-V
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other s
i wanted to run a bridge relay but learned long term consistency is
key. torcloud is a good solution imo.
i have to build a bsd or linux system from old hw VS running a bridge
from my desktop to make a home bridge work.
i had good luck running torcloud.
https://cloud.torproject.org/
it costs
On 9/15/2014 10:09 PM, Juan wrote:
"Comcast doesn’t monitor our customer’s browser software, web surfing
or online history." WHAHAHAHHA Just how fucking stupid all those
people are.
Only persons that haven't read actual news reports, from reputable
journalists - in the last 10+ years would bel
Clearly you have not been to the UK. Under US law that is known, it is
perfectly fine to run a relay both middle and exit, the same cannot be
said here in the UK unfortunately and I don't think this is at all
fear-mongering.
Having experienced more than my fair share of attacks from law
enforcemen
On 9/16/2014 12:13 AM, isis wrote:
+1 However, I don't know of a competitor to Cloudflare who privides
*free* (as in beer) (D)DoS-protection via reverse webproxies, not to
mention all the other bells and whistles which Cloudflare offers.
It'll be hard to make the argument to switch for user-pri
The RISK OF COPYRIGHT THREATS is specifically greatest in USA. Other nations
should be assessed individually.
Fearmongering is not productive.
Robert
> It is when you
> allow people to _exit_ to the Internets the trouble starts because
> people will send DMCA spam and other spam to your Interne
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> What about bridges?
There is no big public list of bridges. They would have to look very
closely at you and your internet connection to find out that you are
running a bridge and if they are doing that then you have bigger
problems anyway.
Running
Mirimir:
> Also, some of the abusers have reportedly emphasized PinkMeth's supposed
> invulnerability as a Tor hidden service, and also their own supposed
> invulnerability as Tor users.
and the abusers reasons for defending pinkmeth displays a particular
interest, which leaves them incredibly vul
On 09/16/2014 10:36 AM, s7r wrote:
>> Hi, I want to support Tor and I want to run a relay on my home
>> computer. Is it fine to do that because the IP address keeps
>> changing every 1-2 weeks. I know how to edit the config and
>> everything else.
> Well running a relay from home might not be such
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
What about bridges?
On 16/09/14 16:36, s7r wrote:
>
> On 9/16/2014 7:31 AM, Daniel Roskams wrote:
>> Hi, I want to support Tor and I want to run a relay on my home
>> computer. Is it fine to do that because the IP address keeps
>> changing every 1-
Hey!
On 16 Sep 2014, at 07:13, isis wrote:
> I have considered starting an outreach effort to speak to the maintainers of
> some of these sites, with the idea that I might gather sympathy from certain
> communities who use Cloudflare.
There is a text field to add a comment in said CloudFlare blo
On 16/09/14 02:51, Virgil Griffith wrote:
> * I think I am largely done with this analysis. I am ready to begin
> the process of massaging this to be put on Tor Blog.
Hi Virgil,
I'd like to repeat Roger's earlier suggestion to turn your analysis into
a Tor tech report:
https://research.torproje
On Fri, Sep 12, 2014 at 1:49 PM, Jeff Becker wrote:
> Hi,
>
> Newbie I2P contributor here, I've recently been playing around with the idea
> of running I2P over Tor for purely experimental reasons. I am thinking that
> some users could still participate in routing traffic by providing a reachable
Just multiple regression. Nothing fancy.
And yes all data is works on a standard desktop. I use Rstudio for
everything.
-V
On Monday, September 15, 2014, stn wrote:
> hi virgil
> my skills are old but i might be of use.
>
> are you using a single dependent/outcome variable (eg multiple regre
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 9/16/2014 7:31 AM, Daniel Roskams wrote:
> Hi, I want to support Tor and I want to run a relay on my home
> computer. Is it fine to do that because the IP address keeps
> changing every 1-2 weeks. I know how to edit the config and
> everything else
27 matches
Mail list logo