-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
A distributed list would help the scalability of the network and could
evolve to substitute the 9 mian directory authority servers. What
about some sort of lottery system of say 900 auth dir's on a list that
is edited every time it is transmitted?
On 9/30/2014 7:27 PM, stn wrote:
some weeks ago i asked daniel why he blocked tor traffic. he sited SSH brute
force, smtp and other abuse issues. he's a sysadmin so i can understand the
need to protect his networks.
thanks for brining in a higher resolution view here.
hope your approach wo
some weeks ago i asked daniel why he blocked tor traffic. he sited SSH brute
force, smtp and other abuse issues. he's a sysadmin so i can understand the
need to protect his networks.
thanks for brining in a higher resolution view here.
hope your approach works or at least opens the door to c
On 9/30/2014 2:26 AM, Virgil Griffith wrote:
> Perhaps weirdly, this fellow does seem to know what he is doing.
>
> On page, https://www.dan.me.uk/dnsbl
>
> He explicitly offers a different list for blocking just exits. The
> only thing I can think of is to email a request that he block just
> e
On 9/27/14, Jeremy Rand wrote:
> ...
> Namecoin would make this pretty easy. Last I checked the current
> Namecoin domain name spec only supports round-robin DNS for IPv4/IPv6
> and not Tor/I2P, but there's consensus that that will be changed soon
> to allow round-robin for Tor and I2P as well.
On 9/30/14, Lluís wrote:
> ...
> I didn't find anything about access control,
> is there anyway of doing this ?
> Can I hide the *.onion address to anyone, but me ?
you cannot hide the existence of the *.onion, as these are "location
hidden" not "existence hidden".
you can use various methods to
hi
rene
have you considered the torcloud option? at least for bridge relay?
i'm glad i stumbled into this version of tor.
https://cloud.torproject.org/
it's inexpensive. the first year is up to $3 USD per month using the amazon
free cloud account.tor limits the bandwidth so people like me
I am trying to setup a hidden webserver, only for
testing at the moment.
After reading the hidden services howto here:
https://www.torproject.org/docs/tor-hidden-service.html.en
I didn't find anything about access control,
is there anyway of doing this ?
Can I hide the *.onion address to anyone,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mozilla's own advisory is here:
https://www.mozilla.org/security/announce/2014/mfsa2014-73.html
On 09/30/2014 05:25 AM, raiogam mestri wrote:
> McAfee has issued a warning to all the users who use the Mozilla
> Firefox browser - and others who share
McAfee has issued a warning to all the users who use the Mozilla Firefox
browser - and others who share his software encryption. According to security
firm, a serious spoofing vulnerability signature in Mozilla NSS cryptographic
library can allow malicious people to create tools that can harm co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hy there,
maybe you want to take a look at this.
https://elrippoisland.net/public/how_to/anonymity.html
Kind regards,
elrippo
On 30. September 2014 12:52:10 MESZ, "René Pedersen"
wrote:
>Hello is it possible to set a router to relay tor, all th
On 09/30/2014 12:52 PM, René Pedersen wrote:
> Hello is it possible to set a router to relay tor, all the time like
> portforwarding.
> Because I will help tor, also ween my pc is shut off
>
>
Heya!
maybe have a look at this article:
http://www.instructab
Hello is it possible to set a router to relay tor, all the time like
portforwarding.
Because I will help tor, also ween my pc is shut off
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.to
13 matches
Mail list logo