On Dienstag, 28. Oktober 2014, 10:52:46 Nathan Freitas wrote:
> On Sun, Oct 19, 2014, at 05:33 AM, Elrippo wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > Hy devs,
> > i am loving the Orweb browser with it's options for the control of
> > cookies, user agent obfuscation and
It didn't work from Tor here.
Robert
>
> The hidden service address is dsyadrvivtt34s26.onion
>
> Could some folks please test this for me and make sure it works for
> others?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Great!
One question: how did you configure your Bitcoin node to be functional
on v4,v6 and .onion at the same time?
For example, the Tor hidden service node needs to have the following
setting in bitcoin.conf:
externalip=dsyadrvivtt34s26.onion
This w
On 10/28/2014 06:59 AM, Артур Истомин wrote:
> On Mon, Oct 27, 2014 at 03:58:56PM -0400, grarpamp wrote:
>> On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo
>> wrote:
>>
>> http://arxiv.org/pdf/1410.6079v1.pdf
>>
>>> Could this situation be improved if people ran limited exit nodes that only
>
On Tue, Oct 28, 2014 at 9:55 AM, Nathan Freitas wrote:
>>> This means we can support SIP calling over Tor, video conference and
>>> streaming, among other applications...
>
>> Tor as a client also needs support for inbound binds for some apps, at
>> least at the single per port level when interact
To that end, I setup a bitcoin node that listens on the v4/v6 internet as
well as tor.
The hidden service address is dsyadrvivtt34s26.onion
Could some folks please test this for me and make sure it works for others?
I can see it is quite happily running on v4/v6 (and getting traffic) but
its' les
On Sun, Oct 19, 2014, at 05:33 AM, Elrippo wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Hy devs,
> i am loving the Orweb browser with it's options for the control of
> cookies, user agent obfuscation and the design.
> Can you give us an update on the development regarding the OrF
Lovely humans, dear bots,
I've started identifying and updating outdated documentations on
torproject website since last night, and the more I dig the more I
realize rewriting the whole thing is not a good late-night hobby nor a
one man job, so I decided to write this email.
I need your help to g
Thanks Roger for your prompt reply.
Indeed you were right. I deleted all the installations I had on my PC and
started from a new clean one, adding Firefox 33 and then Tor browser 4. I then
added addons+favourites and everything worked fine, with no interferences
anymore.
However, when you
On Mon, Oct 27, 2014, at 01:40 PM, grarpamp wrote:
> > On Fri, Oct 24, 2014 at 1:35 AM, Nathan Freitas wrote:
>
> >> This means we can support SIP calling over Tor, video conference and
> >> streaming, among other applications...
>
> Tor as a client also needs support for inbound binds for som
On Mon, Oct 27, 2014 at 03:58:56PM -0400, grarpamp wrote:
> On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo
> wrote:
>
> http://arxiv.org/pdf/1410.6079v1.pdf
>
> > Could this situation be improved if people ran limited exit nodes that only
> > alloed the bitcoin p2p protocol to exit? I for
11 matches
Mail list logo