Re: [tor-talk] [OrFox] release date

2014-10-28 Thread elrippo
On Dienstag, 28. Oktober 2014, 10:52:46 Nathan Freitas wrote: > On Sun, Oct 19, 2014, at 05:33 AM, Elrippo wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA512 > > > > Hy devs, > > i am loving the Orweb browser with it's options for the control of > > cookies, user agent obfuscation and

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-28 Thread I
It didn't work from Tor here. Robert > > The hidden service address is dsyadrvivtt34s26.onion > > Could some folks please test this for me and make sure it works for > others? -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-28 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Great! One question: how did you configure your Bitcoin node to be functional on v4,v6 and .onion at the same time? For example, the Tor hidden service node needs to have the following setting in bitcoin.conf: externalip=dsyadrvivtt34s26.onion This w

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-28 Thread Mirimir
On 10/28/2014 06:59 AM, Артур Истомин wrote: > On Mon, Oct 27, 2014 at 03:58:56PM -0400, grarpamp wrote: >> On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo >> wrote: >> >> http://arxiv.org/pdf/1410.6079v1.pdf >> >>> Could this situation be improved if people ran limited exit nodes that only >

Re: [tor-talk] using UDPGW and tun2socks over Tor

2014-10-28 Thread grarpamp
On Tue, Oct 28, 2014 at 9:55 AM, Nathan Freitas wrote: >>> This means we can support SIP calling over Tor, video conference and >>> streaming, among other applications... > >> Tor as a client also needs support for inbound binds for some apps, at >> least at the single per port level when interact

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-28 Thread eric gisse
To that end, I setup a bitcoin node that listens on the v4/v6 internet as well as tor. The hidden service address is dsyadrvivtt34s26.onion Could some folks please test this for me and make sure it works for others? I can see it is quite happily running on v4/v6 (and getting traffic) but its' les

Re: [tor-talk] [OrFox] release date

2014-10-28 Thread Nathan Freitas
On Sun, Oct 19, 2014, at 05:33 AM, Elrippo wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Hy devs, > i am loving the Orweb browser with it's options for the control of > cookies, user agent obfuscation and the design. > Can you give us an update on the development regarding the OrF

[tor-talk] Reviewing website/docs

2014-10-28 Thread Nima Fatemi
Lovely humans, dear bots, I've started identifying and updating outdated documentations on torproject website since last night, and the more I dig the more I realize rewriting the whole thing is not a good late-night hobby nor a one man job, so I decided to write this email. I need your help to g

Re: [tor-talk] {Spam?} Re: recent firefox releases

2014-10-28 Thread Gigi Bigio
Thanks Roger for your prompt reply. Indeed you were right. I deleted all the installations I had on my PC and started from a new clean one, adding Firefox 33 and then Tor browser 4. I then added addons+favourites and everything worked fine, with no interferences anymore. However, when you

Re: [tor-talk] using UDPGW and tun2socks over Tor

2014-10-28 Thread Nathan Freitas
On Mon, Oct 27, 2014, at 01:40 PM, grarpamp wrote: > > On Fri, Oct 24, 2014 at 1:35 AM, Nathan Freitas wrote: > > >> This means we can support SIP calling over Tor, video conference and > >> streaming, among other applications... > > Tor as a client also needs support for inbound binds for som

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-28 Thread Артур Истомин
On Mon, Oct 27, 2014 at 03:58:56PM -0400, grarpamp wrote: > On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo > wrote: > > http://arxiv.org/pdf/1410.6079v1.pdf > > > Could this situation be improved if people ran limited exit nodes that only > > alloed the bitcoin p2p protocol to exit? I for