21683
Greg Curcio
On Tue, Oct 14, 2014 at 8:20 PM, Greg Curcio wrote:
> p.l.o.t.; f.o.i.l., algebra
>
> Greg Curcio
>
> On Tue, Oct 14, 2014 at 7:23 PM, Nick Mathewson
> wrote:
>
>> On Tue, Oct 14, 2014 at 10:15 PM, Nick Mathewson
>> wrote:
>> > I expect and hope the TorBrowser team will be
>
p.l.o.t.; f.o.i.l., algebra
Greg Curcio
On Tue, Oct 14, 2014 at 7:23 PM, Nick Mathewson
wrote:
> On Tue, Oct 14, 2014 at 10:15 PM, Nick Mathewson
> wrote:
> > I expect and hope the TorBrowser team will be
> > releasing a new version soon with SSLv3 enabled.
>
> Whoops. That should have said "
'Kenneth, what is the frequency" circa 1986
Greg Curcio
On Tue, Oct 14, 2014 at 8:00 PM, Mirimir wrote:
> On 10/14/2014 08:42 PM, Greg Curcio wrote:
> > danke
> >
> > Greg Curcio
>
> I was referring to Ben Healey's stuff ;)
>
> Expecting someone on tor-talk to hook you up with Snowden is
> unre
On 10/14/2014 08:42 PM, Greg Curcio wrote:
> danke
>
> Greg Curcio
I was referring to Ben Healey's stuff ;)
Expecting someone on tor-talk to hook you up with Snowden is
unrealistic. Asking so many times was rude.
> On Tue, Oct 14, 2014 at 7:31 PM, Mirimir wrote:
>
>> On 10/14/2014 08:04 PM, S
Some people are genuinely naive on a topic, yet get overly
enthusiastic about $RANDOM_IDEA that they have, then share it
immediately with the world.
Yes, it's very close to spam, but just in case the author of it was
just misguided, yet good hearted:
Ben,
go do a _lot_ of reading. Crypto, as in go
danke
Greg Curcio
On Tue, Oct 14, 2014 at 7:31 PM, Mirimir wrote:
> On 10/14/2014 08:04 PM, Soul Plane wrote:
> > On Tue, Oct 14, 2014 at 2:21 PM, grarpamp
> > wrote:
> >
> >> Time to block this rambling spam. Thanks.
> >>
> >>
> >>> On Mon, Oct 13, 2014 at 7:17 PM, Ben Healey
> >>>
> >> wrot
On 10/14/2014 08:04 PM, Soul Plane wrote:
> On Tue, Oct 14, 2014 at 2:21 PM, grarpamp
> wrote:
>
>> Time to block this rambling spam. Thanks.
>>
>>
>>> On Mon, Oct 13, 2014 at 7:17 PM, Ben Healey
>>>
>> wrote:
>>> Here's some thought I had.
>>>
>>> Physical Digital Encryption
>> -- tor-talk m
On Tue, Oct 14, 2014 at 10:15 PM, Nick Mathewson wrote:
> I expect and hope the TorBrowser team will be
> releasing a new version soon with SSLv3 enabled.
Whoops. That should have said "disabled".
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings g
Hi! It's a new month, so that means there's a new attack on TLS.
This time, the attack is that many clients, when they find a server
that doesn't support TLS, will downgrade to the ancient SSLv3. And
SSLv3 is subject to a new padding oracle attack.
There is a readable summary of the issue at
ht
On Tue, Oct 14, 2014 at 2:21 PM, grarpamp wrote:
> Time to block this rambling spam. Thanks.
>
>
> > On Mon, Oct 13, 2014 at 7:17 PM, Ben Healey
> wrote:
> > Here's some thought I had.
> >
> > Physical Digital Encryption
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscri
Nice
> On Oct 14, 2014, at 8:34 PM, Greg Curcio wrote:
>
> :)
>
> Greg Curcio
>
> On Tue, Oct 14, 2014 at 4:31 PM, Jacob Appelbaum
> wrote:
>
>>> It was alas picked arbitrarily. As Nick notes, it used to be 30 seconds,
>>> and then when we started getting users, all the relays complained o
:)
Greg Curcio
On Tue, Oct 14, 2014 at 4:31 PM, Jacob Appelbaum
wrote:
> > It was alas picked arbitrarily. As Nick notes, it used to be 30 seconds,
> > and then when we started getting users, all the relays complained of
> > running at 100% cpu handling circuit handshakes. We changed it to 10
>
> It was alas picked arbitrarily. As Nick notes, it used to be 30 seconds,
> and then when we started getting users, all the relays complained of
> running at 100% cpu handling circuit handshakes. We changed it to 10
> minutes, and the complaints went away -- at least until the botnet
> showed up.
On 10/14/2014 04:52 PM, mikael ball wrote:
> i'm running a (few) non-exit relays on digitalocean, for example:
> https://globe.torproject.org/#/relay/E3D1A10B487356FA91027D84CCB7E1C90A9D11E6
>
> i haven't gotten any complaints because of the lack of an exit policy; the
> choice comes from their TO
i'm running a (few) non-exit relays on digitalocean, for example:
https://globe.torproject.org/#/relay/E3D1A10B487356FA91027D84CCB7E1C90A9D11E6
i haven't gotten any complaints because of the lack of an exit policy; the
choice comes from their TOS option that you are legally liable for all
traffic
i just got punkd
Greg Curcio
On Tue, Oct 14, 2014 at 2:24 PM, grarpamp wrote:
> > gregcur...@gmail.com
> > 5:39 PM (23 hours ago)
> > please give ed snow den my e mail thanks
> > Greg Curcio
>
> While you're at it, block this loser too.
> --
> tor-talk mailing list - tor-talk@lists.torproject.o
> gregcur...@gmail.com
> 5:39 PM (23 hours ago)
> please give ed snow den my e mail thanks
> Greg Curcio
While you're at it, block this loser too.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/li
On Tue, Oct 14, 2014 at 12:17:27PM -0400, Greg Norcie wrote:
> I'm working on doing a study on user tolerance of delays (for
> example, latency on Tor).
>
> During our discussion, a bit of a debate occured about the TBB's
> circuit switching. I was wondering if there's any research that's
> been d
On Tue, Oct 14, 2014 at 5:49 AM, Martin Lambers wrote:
> On Tue, 14 Oct 2014 10:48:32 +0200, ilf wrote:
>> The Tor Project recommends SOCKS 4a over SOCKS 5 against DNS leaks:
>> https://www.torproject.org/docs/faq#WarningsAboutSOCKSandDNSInformationLeaks
> Yes, but only if the SOCKS5 application
On Tue, Oct 14, 2014 at 01:05:57PM -0400, Nick Mathewson wrote:
> On Tue, Oct 14, 2014 at 12:17 PM, Greg Norcie wrote:
> > Hi all,
> >
> > I'm working on doing a study on user tolerance of delays (for example,
> > latency on Tor).
> >
> > During our discussion, a bit of a debate occured about the
Time to block this rambling spam. Thanks.
> On Mon, Oct 13, 2014 at 7:17 PM, Ben Healey wrote:
> Here's some thought I had.
>
> Physical Digital Encryption
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin
On Mon, Oct 13, 2014 at 7:17 PM, Ben Healey wrote:
> Here's some thought I had.
>
> Physical Digital Encryption
>
> Listen not data to-
> song a--30sec-45
> song b--10sec-20 and 50-1:00
> song c---...
> d.
> run through then
> reorder as many ways as wanted data
> compression physical
On 10/12/2014 6:56 PM, subk...@riseup.net wrote:
> [cross-posted on tor-talk and tor-relays]
>
> i've found that the Tor GoodBadISPs list [1] is somewhat outdated on
> current hosts that allow Tor (exit) relays to be hosted. i'm trying to
> find a cheap host that allows exits to be operated from t
On Tue, Oct 14, 2014 at 12:17 PM, Greg Norcie wrote:
> Hi all,
>
> I'm working on doing a study on user tolerance of delays (for example,
> latency on Tor).
>
> During our discussion, a bit of a debate occured about the TBB's circuit
> switching. I was wondering if there's any research that's been
Hi all,
I'm working on doing a study on user tolerance of delays (for example,
latency on Tor).
During our discussion, a bit of a debate occured about the TBB's circuit
switching. I was wondering if there's any research that's been done to
arrive at the 10 minute window for circuit switching
Since my original release of Qubes + Whonix back in late August 2014, some
interesting developments have happened that I'm excited to share with
everyone!
Qubes + Whonix Primary Sources:
===
The primary sources of Qubes + Whonix information are located at:
- User Do
Thanks to those who replied to my previous appeal for help.
I am Uni of London researcher (Sociology - Goldsmiths, my website below
the signature) conducting a study of people's responses to Internet
censorship in Turkey during and after Twitter block in March 2014.
If you have a direct experienc
Le 14/10/2014 09:55, Lunar a écrit :
Jeremy Olexa:
>You are abit late on the project idea:)
>https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router
If this needs repeating on this list: this is a bad idea. It will give
people illusions instead of actual protection.
Jeremy Olexa:
> You are abit late on the project idea :)
> https://www.kickstarter.com/projects/augustgermar/anonabox-a-tor-hardware-router
If this needs repeating on this list: this is a bad idea. It will give
people illusions instead of actual protection.
The Tor Browser is already having a har
29 matches
Mail list logo