We identified 276 onion addresses as being seized as part of Operation
Onymous. Of those, 153 were either scam sites or clones. A number of
phishing or clone version of websites were seized while the real
websites remain live. Full results and list of onion sites:
https://www.nikcub.com/posts/onym
> from a few weeks the site spacemarc.it is no longer accessible via
> TOR. My hosting does not apply any filter nor I do it from code.
>
> I do not get any error from my web server (forbidden, timeout and so
> on...) but the Tor Browser (v4.0.1) simply tries to connect for
> several seconds but t
>>> > I wonder what would be the most useful topic for this year?
Usage stories are important and need to be given voice.
Tech talks can be had nearly anytime, anywhere.
Then you have the big question... how did LEA do it?
Certainly there's time before 31c3 to analyse/follow these
cases and do som
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/17/2014 04:46 PM, Jacob Appelbaum wrote:
>>>
>>> Let the community speak about Tor and tell their stories about usage.
>>
>> I really like this idea.
>
> We now have a talk slot at 31c3. We should plan this talk well in
> advance of the Congre
Hello Jacob
Just to let you know, I am also giving a talk at 31c3 on Tor, but my talk
is focussing on a research project we did on the Tor HS DHT. I was also
planning to talk a little about the Tor Research Framework and an
accessible overview of correlation attacks - if time permits. Hope that
d
Hi to list,
from a few weeks the site spacemarc.it is no longer accessible via
TOR. My hosting does not apply any filter nor I do it from code.
I do not get any error from my web server (forbidden, timeout and so
on...) but the Tor Browser (v4.0.1) simply tries to connect for
several seconds but t
On 9/14/14, Roger Dingledine wrote:
> On Tue, Sep 09, 2014 at 10:31:20AM -0400, Andrew Lewman wrote:
>> On 09/08/2014 08:05 PM, Roger Dingledine wrote:
>> > The 31c3 talk proposals are due this coming Sunday:
>> > http://events.ccc.de/2014/07/12/31c3-call-for-participation-en/
>> >
>> > I wonder w
NTPT writes:
> And is it possible (and how ? ) to run end to end encrypted (ssl) web
> traffic via tor network ?
If you mean end-to-end encrypted to a hidden service, there is a problem
in that most certificate authorities won't issue a certificate for
a .onion hostname today. That means that t
coderman wrote:
> - The best design we've been able to come up with is one that forces you
> to be using Tor on your side, and only allows your traffic through if it's
> coming from Tor.
corridor has such a design:
https://github.com/rustybird/corridor
I'd love to turn it into a bona fide WiFi h
>
> > And is it possible (and how ? ) to run end to end encrypted (ssl) web
> > traffic via tor network ?
>
> By enterin https://someurl in the tor browser. I'm sure there
> is a pretty picture somewhere but I don't know it.
>
> Andreas
https://www.eff.org/pages/tor-and-https
--
http://www.f
* stn:
> this is a good opportunity to ask since someone is asking about
> simulators and uwaterloo experimentor.
>
> if one were to buy an old mac pro or build a nix box how much RAM is
> needed to run something like experimentor well enough to model the Tor
> network usefully ?
ExperimenTor is
On Mon, 17 Nov 2014 18:22:00 +, NTPT wrote:
...
> web application "foo" use a classical session to maitain state of the user.
> Classically user BAR have IP address and cookie is assigned in the login
> process. If the right cookie from the right ip address comes for user BAR,
> server acce
You should never trust ip for auth (even dhcp changes), or ever
use ip for anything hard against the user. That's what your
authcookie or urlsessionid is for. Do not use ip for auth, it
pisses roaming/traveling/vpn/tor/dhcp/proxy/wifi users off, and
similarly gives you the siteop no useful data. Do
this is a good opportunity to ask since someone is asking about simulators and
uwaterloo experimentor.
if one were to buy an old mac pro or build a nix box how much RAM is needed to
run something like experimentor well enough to model the Tor network usefully ?
multiple cpu socket boards cost
Hi all
I am new to TOR and I investigate the possibility of gidden services and i
can not find an answer in the docs.
web application "foo" use a classical session to maitain state of the user.
Classically user BAR have IP address and cookie is assigned in the login
process. If the right coo
On Mon, Nov 17, 2014 at 07:16:58AM +, wyory wrote:
> Hello Tor friends:
>
> AN article on Ars Technica about the malicious exit nodes contains some
> misleading advice attributed to "Tor officials."
>
> From end of article: "Tor officials have long counseled people to employ
> a VPN when usin
hope that you can see message upthere, because i sent it before i suscribed
On Sun, Nov 16, 2014 at 9:28 PM, Jan Varga wrote:
> which programming tools, languages must i know if i want to contribute
> somehow to this network. Im sturdent so you could help me with my student
> path a little bit :
17 matches
Mail list logo