hi sectec,
i meant running both home bridge node and a torcloud node offers more divesity
than i could offer normally as an individual.
if i could have setup tor on a different cloud service as inexpensively and
easily i would have.additionally i would have done so within my own country.
i
On Mon, Oct 06, 2014 at 07:49:38PM -0600, Mirimir wrote:
> On 10/06/2014 07:26 PM, Virgil Griffith wrote:
> > I'm attempting to quantify the proportion of traffic used by hidden
> > services. When connecting to hidden services, are exit nodes ever used
> > (unless the exit node also has a guard fla
hi hartmut
if you change your mind let me know. i don't mind helping.
i guess i'm assuming any bandwidth is good bandwidth for tor so long as i
operate the bridge node properly. bell canada supplies the backbone for my
"overlay" ISP and i don't much like bell canada either.
best
steve
On O
Below is the text from a few posts that may be of use in Tor.
1.
Hard Drives
Program a hard drives way of writing data?
Or a software that can do it.
Raid hard drives:
Can this already be done?
Half+ data on different parts of disc?
4x+/- with say 2TB drive with data placed along the disc
Below is the text from a few posts that may be of use in Tor.
1.
Networking
Hardware Based Increases?
Moving receiver?
00 inputs slots?
00 input slots?
01010101010101010---00
---00
On Mon, Oct 06, 2014 at 07:02:06PM -0400, gary...@safe-mail.net wrote:
> I'll read some documentation about these methods. Are there recommended
> sources?
>
> > Tor is vulnerable to two general sorts of attacks.
I agree with the number two, but I would have picked different
attacks. The first i
hi,
i am not very young either.
On Oct 6, 2014, at 5:13 AM, Hartmut Haase wrote:
> Hi stn,
> I suspect I'm to old to understand this kind of stuff, and I certainly do not
> want to cooperate with amazon.
> --
> Viele Grüße,
> Hartmut
>
> Hungerhilfe: http://www.thehungersite.com
>
> Ohne Ze
On 10/06/2014 07:26 PM, Virgil Griffith wrote:
> I'm attempting to quantify the proportion of traffic used by hidden
> services. When connecting to hidden services, are exit nodes ever used
> (unless the exit node also has a guard flag)?
The nodes in client and hidden-service circuits that are adj
I'm attempting to quantify the proportion of traffic used by hidden
services. When connecting to hidden services, are exit nodes ever used
(unless the exit node also has a guard flag)?
-V
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https:
Hello,
I would think an easy way to get more speed would be have two+ connections?
As long as Tor is secure enough for that.
As in 2 connections to tor?
Not sure how to set that up or program that.
Each doing a request for the data?
And collecting from each.
-
Hi,
I have upgrad
Mirimir writes:
> Tor is vulnerable to two general sorts of attacks. One involves the use
> of malicious relays in various ways to deanonymize circuits. The other
> involves the use of traffic analysis to correlate traffic captured at
> edges of the Tor network (to users and the websites that they
On 10/7/14, Mirimir wrote:
> On 10/06/2014 04:43 PM, gary...@safe-mail.net wrote:
>> The reason people find problems with Tor is because the importance of
>> privacy is hidden in a mystery. Most people don't understand the
>> reason Tor exist so, how can they judge it? The problem is that it's
>>
On 10/7/14, gary...@safe-mail.net wrote:
> The reason people find problems with Tor is because the importance of
> privacy is hidden in a mystery. Most people don't understand the reason Tor
> exist so, how can they judge it?
Ack!
And unfortunately some people get defensive about privacy - as th
On 10/06/2014 05:02 PM, gary...@safe-mail.net wrote:
> I'll read some documentation about these methods. Are there recommended
> sources?
I could come up with a reading list, but don't have time for that now. I
recommend browsing the FreeHaven "Selected Papers in Anonymity".[0] You
can also searc
I'll read some documentation about these methods. Are there recommended sources?
Thanks
Original Message
From: Mirimir
Apparently from: tor-talk-boun...@lists.torproject.org
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] isp monitoring tor
Date: Mon, 06 Oct 2014 16
On 10/06/2014 04:43 PM, gary...@safe-mail.net wrote:
> The reason people find problems with Tor is because the importance of
> privacy is hidden in a mystery. Most people don't understand the
> reason Tor exist so, how can they judge it? The problem is that it's
> easier to focus on evil than it is
The reason people find problems with Tor is because the importance of privacy
is hidden in a mystery. Most people don't understand the reason Tor exist so,
how can they judge it? The problem is that it's easier to focus on evil than it
is to focus on good. The good Tor offers is much weightier t
On 10/06/2014 04:06 PM, gary...@safe-mail.net wrote:
> Sure, I understand what you mean. I'm assuming a situation that
> doesn't involve legal issues. This would be illegal surveillance,
> using average resources with your ISP supporting it for some reason.
> I think Tor would be able to handle thi
On 10/06/2014 03:12 PM, grarpamp wrote:
> On Thu, Oct 2, 2014 at 3:39 PM, z9wahqvh wrote:
>>> On 2014-10-01 13:20, Sebastian G. wrote:
>
>> the abuser ... he/she (mostly he)
>
> Abuse knows no such boundaries, only statistics.
>
>> The people I work with are writing about Tor, and so far, th
Sure, I understand what you mean. I'm assuming a situation that doesn't involve
legal issues. This would be illegal surveillance, using average resources with
your ISP supporting it for some reason. I think Tor would be able to handle
this type surveillance if used correctly.
I would like to kn
On Thu, Oct 2, 2014 at 3:39 PM, z9wahqvh wrote:
>> On 2014-10-01 13:20, Sebastian G. wrote:
> the abuser ... he/she (mostly he)
Abuse knows no such boundaries, only statistics.
> The people I work with are writing about Tor, and so far, the negatives
> keep far outweighing the positives, meani
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> How difficult would it be for an ISP to monitor your Tor activity from the
> modem and determine what sites you visit?
>
> I only need to know if it would be very hard, impossible, or very possible to
> do. If it's possible what technique would the
On 10/6/2014 1:51 PM, gary...@safe-mail.net wrote:
> Hi,
>
> How difficult would it be for an ISP to monitor your Tor activity from the
> modem and determine what sites you visit?
>
> I only need to know if it would be very hard, impossible, or very possible to
> do. If it's possible what te
Hi,
How difficult would it be for an ISP to monitor your Tor activity from the
modem and determine what sites you visit?
I only need to know if it would be very hard, impossible, or very possible to
do. If it's possible what technique would they use?
Thanks
--
tor-talk mailing list - tor-ta
On 10/06/2014 05:30 PM, SecTech wrote:
> Hi,
>
> I am using AFWall+, but want to force some apps through TOR.
> At orwall.org I read, that OrWall mey interfere with other firewalls.
> I saw that in settings I can restrict an app to have internet
> connections, force it throug TOR and let them co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
hi stn,
In my opinion you aren't right if you think that it's good for diversity
when you are hosting your TOR rely on torcloud.
Because if many people think so, than on torcloud will be several
virtual TOR relys. Physicaly they all are running in o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I am using AFWall+, but want to force some apps through TOR.
At orwall.org I read, that OrWall mey interfere with other firewalls.
I saw that in settings I can restrict an app to have internet
connections, force it throug TOR and let them connec
Hartmut,
Tor is one thing we can contribute forever!
Torcloud uses Amazon without paying mostly. Setting it up is a bit confusing
but there's probably enough help around to get you through it.
Robert
> Hi stn,
> I suspect I'm to old to understand this kind of stuff, and I certainly
> do not wa
On Fri, Oct 3, 2014 at 9:18 AM, Lunar wrote:
> Derric Atzrott:
>> There are some strong ethical questions in logging all traffic from a
>> relay, but I can't see any other way to get this sort of data.
>
> The answer to the ethical question is simple: this is plain wrong. You
> don't spy on people
Hi stn,
I suspect I'm to old to understand this kind of stuff, and I certainly
do not want to cooperate with amazon.
--
Viele Grüße,
Hartmut
Hungerhilfe: http://www.thehungersite.com
Ohne Zensur suchen:
http://suche.amnesty-bergedorf.de
Googeln ohne Google:
https://www.startpage.com/deu
Das h
hi
i've been informed running a bridge relay/node requires 24/7 uptime so i'm
building a "Box" to run at home dedicated to a tor bridge.
it takes more than a week for a node to start to integrate into the network and
every time the node goes down i think you start again.
but you can run one vi
> even better. avoiding youtube is a good idea anyway.
For anons saving/distributing youtube videos, beware that
every download stream is uniquely tagged.
This works good over tor and has support for many sites:
http://rg3.github.io/youtube-dl/
--
tor-talk mailing list - tor-talk@lists.torproje
Hi Jan,
An upgrade from 25meg to 100 meg won't give you improved tor speed because
tor cannot handle anywhere near 100mbps. Fastest I usually see is around
1.5 to 2 MB/s. Well within reach of your old 25meg plan.
measurments show me I get between 4 and 8 Mbits/s.
However, faster speeds are alwa
33 matches
Mail list logo