when2plus2...@riseup.net:
> In addition, Facebook and the online payment processor Stripe each
> pledged to donate $50,000 a year to Koch’s project.
So Facebook is not that evil after all.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https
On 02/06/2015 08:49 AM, contact_...@nirgal.com wrote:
> Mirimir wrote:
>>> When you have a website that is available from a tor secret service, how
>>> do you forbid access to url restricted to ip=localhost?
>>>
>>> I'm thinking of apache default http://x.onion/server-status for example.
>>>
>>
Happy to say I sent some BTC over to Werner (as well as OTR, Tor, i2p, and a
few other pieces of privacy software) the day before Jacob and Laura's talk at
31c3. Was a great feeling to see that the money I donated went to a tool that
works :)
With free software we own our means of production,
привет :)
Thanks for posting this story.
GPG is certainly a fundamental tool that many of us rely upon and is
well-deserving of more donations and funding.
I will certainly donate some euros to him soon.
I'm developing security/anonymity-focused free software (Qubes + Whonix)
without any f
On Fri, 06 Feb 2015 18:02:32 +0100
Justaguy wrote:
> Yes, they do what looks like "blocking", they just emailed me with
> "intrusion detected!", they do not like foreign IP's, but, it's easy
> to remove the block :)
> On 02/06/2015 06:00 PM, s7r wrote:
> > Negative, Gmail does not block Tor.
> >
On 2015-02-06 14:41, Patrick Schleizer wrote:
Hello, I a developer of an anonymity-centric distribution. Called
Whonix, it's similar to TAILS but optimized for virtual machines.
We need to use a source to calibrate our system clock. For obvious and
non-obvious reasons, that source can't be NTP.
Hello, I a developer of an anonymity-centric distribution. Called
Whonix, it's similar to TAILS but optimized for virtual machines.
We need to use a source to calibrate our system clock. For obvious and
non-obvious reasons, that source can't be NTP. The way we do it at the
moment is to fetch HTTP
On Fri, Feb 06, 2015 at 04:57:44PM +0100, david wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> If you would not like to disable the /server-status you could use
> something like:
>
> AuthType Basic
> AuthName "Authentication Required"
> AuthUserFile "/etc/htpasswd/.htpasswd
On 2015-02-06 14:16, Александр wrote:
http://www.propublica.org/article/the-worlds-email-encryption-software-relies-on-one-guy-who-is-going-broke
Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner
Koch informed us that last week he was awarded a one-time grant of
$60,000 fro
http://www.propublica.org/article/the-worlds-email-encryption-software-relies-on-one-guy-who-is-going-broke
The man who built the free email encryption software used by whistleblower
> Edward Snowden, as well as hundreds of thousands of journalists, dissidents
> and security-minded people around t
Yes, they do what looks like "blocking", they just emailed me with
"intrusion detected!", they do not like foreign IP's, but, it's easy to
remove the block :)
On 02/06/2015 06:00 PM, s7r wrote:
> Negative, Gmail does not block Tor.
>
> A Google Apps business account allows sending emails via Tor bo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Negative, Gmail does not block Tor.
A Google Apps business account allows sending emails via Tor both from
webmail (https://gmail.com) and for SMTP username over TLS
(Thunderbird tested). Just did a test now, and received the email in
another email
Hi all,
at GlobaLeaks we did notice that Gmail is blocking the sending of email
over Tor trough authenticated users over smtp.gmail.com .
The user being used to send out email is part of a Google Apps Business
account, regularly registered, by the way gmail sounds like preventing
sending legit (n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
If you would not like to disable the /server-status you could use
something like:
AuthType Basic
AuthName "Authentication Required"
AuthUserFile "/etc/htpasswd/.htpasswd"
Require valid-user
Order allow,deny
Allow from all
and protect it
Mirimir wrote:
>> When you have a website that is available from a tor secret service, how
>> do you forbid access to url restricted to ip=localhost?
>>
>> I'm thinking of apache default http://x.onion/server-status for example.
>>
>> Using "a2dismod status" is the obvious solution for that one
Hi Patrick,
> Corridor also supports connecting to normal Tor relays (not bridges) only.
Well it's *meek* bridges which are not supported by corridor.
For other bridges, just fill in the BRIDGES variable in /etc/corridor.d,
or detect them from torrc using /etc/corridor.d/20-bridges-auto.
BTW th
> For sure, the warning
> needs an update as soon as GitHub tells me WTF is going on with my account.
"We just introduced some new measures to fight spam, and your account
was incorrectly flagged as spammy", etc. All good again.
Rusty
signature.asc
Description: OpenPGP digital signature
--
to
Hi Gavin & all,
>> https://github.com/rustybird/corridor/#pitfalls
>>> corridor cannot prevent malware on a client computer from directly
>>> contacting a colluding relay to find out your clearnet IP address.
>
> I don't think this disclaimer is strong enough. With the 'getinfo address'
> command
isis:
> For what it's worth, I think there were some other people vaguely
> hacking on Tor ControlPort libraries in Go; perhaps they will speak
> up and you all can work together. :)
In case more people are interested in this: I just found
github.com/david415/goControlTor (GPL)
github.com/dav
19 matches
Mail list logo