On Mon, Oct 13, 2014 at 2:07 PM, Griffin Boyce
wrote:
> Casey Rodarmor wrote:
>
>> I just thought of an additional perk: The custom distro could
>> blacklist known-bad hardware.
>>
>
> I think this is a really bad idea overall, but I'd be curious to see
> what this would look like in practice.
Casey Rodarmor wrote:
I just thought of an additional perk: The custom distro could
blacklist known-bad hardware.
I think this is a really bad idea overall, but I'd be curious to see
what this would look like in practice. Do you detect the (unpatched for
past five years) Cisco routers on t
Casey Rodarmor wrote:
There are lots of issues with hardware projects and it costs an
obscene amount of money -- not to mention the implications on
security and anonymity that it would introduce.
Do you think there's any way it could be done without creating said
problems for security and anony
I just thought of an additional perk: The custom distro could blacklist
known-bad hardware. Some random linux user will probably be pretty annoyed
if their computer doesn't work when they just want to do some non-sensitive
task, but someone installing the Tor custom distro would probably be happy
t
On Mon, Oct 13, 2014 at 1:07 PM, Griffin Boyce
wrote:
> There are lots of issues with hardware projects and it costs an obscene
> amount of money -- not to mention the implications on security and
> anonymity that it would introduce.
>
Do you think there's any way it could be done without creati
Casey Rodarmor wrote:
I totally want one now. I am all for worldwide splendidness.
I think a super worthy project might be to design and sell a minimum
spec/size/power/price box pre-loaded with tor relay software.
When I was working on Commotion [1], we had a few of these to run
local applic
From the listing:
"A small and exquisite shape fills the workspace with beauty, while
enabling you to enjoy life with speedy data and share worldwide
splendidness."
I totally want one now. I am all for worldwide splendidness.
I think a super worthy project might be to design and sell a minimum
s
Adafruit’s Onion Pi is a Tor proxy for your home network, *not* a relay.
Jeff
p.s. Instructables has relay setup instructions though, which someone could
comment on, but the wolrd has a lot more Android machines that Raspberry Pis,
and they’ve much less bandwidth.
On 12 Oct 2014, at 19
They are three good ideas.
Robert
>
> I would hope that a multi-pronged approach would be adopted, to:
>
> 1. Educate users about what hardware and software they need to
> productively
> contribute.
>
> 2. Improve the network to allow users to productively contribute with
> whatever resources
Took me a second to find the tiny server I was thinking of:
http://www.newegg.com/Product/Product.aspx?Item=N82E16856119098
That plus a 2.5" HDD, plus an 8GB ram stick, will come in under $200 for
a pretty awesome relay (includes integrated 2.5ghz cpu).
Griffin Boyce wrote:
But to answer
On Mon, Oct 13, 2014 at 10:47 AM, Griffin Boyce
wrote:
> It seems really obvious not to run a relay off of an extremely low-power
> computer.
I'd just like to add that I don't think it is really obvious that running a
relay from an extremely low-power computer is a bad idea. There are many
netw
I wrote:
Isis,
Why, then, has there been discussion of the use of Raspberry Pis
without mention of this?
People have taken it upon themselves to run relays on raspis, but
that's not exactly Tor's fault.
It seems really obvious not to run a relay off of an extremely
low-power computer.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Keep the conversation on [tor-relays] so anyone who wants to
participate please reply on that side (cross posting is fine to let
people know but I feel it's best kept to relay operators since they
are the ones who are probably most knowledgeable about
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
[cross-posted on tor-talk and tor-relays]
i've found that the Tor GoodBadISPs list [1] is somewhat outdated on
current hosts that allow Tor (exit) relays to be hosted. i'm trying to
find a cheap host that allows exits to be operated from their servi
Isis,
Why, then, has there been discussion of the use of Raspberry Pis without
mention of this?
What is the minimum and best low power single board computer that would not be
detrimental to TOR?
If clear statements were made on Torproject.org rather than the ping pong on
the list I feel it woul
Also, a sort of related question: Would a dedicated raspberry pi with a
decent OS on a high-quality 100M/100M connection do more harm than good?
Would it be able to push significant traffic with its CPU?
On Mon, Oct 13, 2014 at 7:28 AM, Casey Rodarmor wrote:
> Thank you very much for the pointer
Thank you very much for the pointer to that thread, super interesting!
On Mon, Oct 13, 2014 at 6:32 AM, isis wrote:
> The problem is this: All clients fetch information about all the relays in
> the
> network from the Directory Authorities/Mirrors, and these fetches take up a
> certain amount of
Casey Rodarmor transcribed 2.0K bytes:
> What is the minimum bandwidth/latency that a node requires in order for it
> to benefit the network? I read here* that 100 kilobytes/s each way would be
> enough, which I imagine many phones are capable of handling, and represent
> a small fraction of a wifi
Thanks for your advice, Gökşin. I will follow that soon .
´Confidentiality´ was meant as an ethical stance of social research: never
disclose participants' details if they wish to be anonymous. some participants
do not mind at all. you would be surprised to know how many Turkish VPN users
hav
Hi Alan,
On 10/12/2014 11:33 AM, Alan Hiew wrote:
> I think these whois data and remarks easy can demasking using
> of Tor network by ISPs. Also it may cause blocking of bridges IP in
> some areas.
This is true. We are not trying to "hide" these blocks from an "active"
attacker. Most ISP applianc
Hello, listers!
I have detected that some IP addres of obfs3 briges have demasking
WHOIS information.
For example
obfs3 bridge with IP at range 192.36.31.0 - 192.36.31.255
(there are several bridges; I dont want to publish it at the list but
can send by private messages if somebody wants).
RI
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12.10.2014 02:31,
bm-2cuqbqhfvdhuy34zcpl3pngkplueeer...@bitmessage.ch wrote:
> Speaking of this, let's say I run a fast relay from my home
> connection (2MB/s). Can I run another relay with the same id from
> my mobile? Something like 2 in 1, wher
22 matches
Mail list logo