NOTE, if you want newbies (and occasionally potential contributors) to
not be really frustrated with your communciation, perhaps define your
key terms on first use.
Since "AS" has not been defined anywhere in this thread (yet), I
downloaded the paper (OK, that might be a reasonable desire - get
pe
On Sun, May 24, 2015 at 07:04:45PM +, Juan Miguel Navarro Martínez wrote:
> Артур Истомин:
> > On Sun, May 24, 2015 at 05:46:20PM +0100, James Anslow wrote:
> >> `using Two-Factor Authentication (mobile phone) and
> >> assigning an Application password to Thunderbird`
> >>
> >> I have used 2FA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
I think a big impact on something like blocking are crimes (e.g.
(child) pornography, drugs, weapons, terrorism -> "the four horsemen
of the infocalypse"). The media also play a major role in the
reputation of an anonymity network in reporting abou
https://hola.org/
If you install and use hola, it uses your internet and IP for other
customers traffic to unblock media and such. It's basicly tor where
every user is an *:* exit.
Why are the police states of this world not banning it? Claims to have
46 million users. Tor has a lot less users and
Артур Истомин:
>
> What's the purpose using TOR when Google already know who you are and even
> know your phone number?
>
Well, that's a good question.
Firstly I'll say that I don't mind Google knowing who I am. (In fact, my
domain name is registered in my own name, so trying to hide my identi
Hi Jeremy,
Thank you for the thoughtful and thorough reply! I think the users of
your software will appreciate you wanting to minimize attack surface.
One thing I've noticed about mitmproxy is that it appears to only
support SOCKS upstream proxies *without* authentication. It's also a
http pro
>
> What's the purpose using TOR when Google already know who you are and
> even know your phone number?
>
> Because you may have two Email Service Provider groups:
> Used-in-clearnet ESP accounts: Hotmail, Gmail, Yahoo, etc...
> Tor-only ESP accounts: Riseup, Lavaboom
>
In the worst case, you co
Артур Истомин:
> On Sun, May 24, 2015 at 05:46:20PM +0100, James Anslow wrote:
>> `using Two-Factor Authentication (mobile phone) and
>> assigning an Application password to Thunderbird`
>>
>> I have used 2FA since creating my account and created an application
>> specific password for Thunderbird
>
> What's the purpose using TOR when Google already know who you are and
> even know your phone number?
>
you read my mind!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Sun, May 24, 2015 at 05:46:20PM +0100, James Anslow wrote:
> `using Two-Factor Authentication (mobile phone) and
> assigning an Application password to Thunderbird`
>
> I have used 2FA since creating my account and created an application
> specific password for Thunderbird (icedove actually). S
So after filling out the Google account captcha (
https://accounts.google.com/DisplayUnlockCaptcha) using Tor browser I can
now connect to my account via TorBirdy.
Problem solved.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.
`using Two-Factor Authentication (mobile phone) and
assigning an Application password to Thunderbird`
I have used 2FA since creating my account and created an application
specific password for Thunderbird (icedove actually). Still, the issue
persists.
--
tor-talk mailing list - tor-talk@lists.tor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Long time clearnet Gmail user here and 4-5 months using Tb+TB. The
only thing I did besides of being more than 4 years using Gmail
without Tor is using Two-Factor Authentication (mobile phone) and
assigning an Application password to Thunderbird. As
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 08:54 AM, l.m wrote:
> Hi,
>
> Is the Socks-to-Socks proxy absolutely necessary? This could be
> done as a browser plugin couldn't it? You might find the work of
> the FreeSpeechMe team interesting. They have the objective of
> integra
Hello all
I saw a thread a while ago about a user trying to access Gmail IMAP via
Thunderbird+TorBirdy and getting connections refused.
A Google engineer replied and suggested two steps to establish a `known
good association` with Gmail+Tor.
I have the same issue - with connections being refused
Hey Sophie,
On Sun, May 24, 2015 at 8:35 AM, Sophie Hassfurther <
sop...@sophiehassfurther.com> wrote:
> Hi Rishab,
>
> Rishab Nithyanand:
> > I would like to stress that most of the news articles I've come across
> have
> > some incorrect claims. It is sad that none of them got in touch with us
:o
Oh, nevermind I see you're already associated with that team.
Cool extension. So why the shift from plugin to proxy?
--leeroy
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
Is the Socks-to-Socks proxy absolutely necessary? This could be done
as a browser plugin couldn't it? You might find the work of the
FreeSpeechMe team interesting. They have the objective of integration
with tor which sounds a lot like what you describe. It's probably not
vetted to your standa
Hi Rishab,
Rishab Nithyanand:
> I would like to stress that most of the news articles I've come across have
> some incorrect claims. It is sad that none of them got in touch with us
> before publishing their stories.
I had the same impression. I do not know the author, but I read your
paper and c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 06:42 AM, s7r wrote:
> Hi Jeremy
>
> Why do you want this and why do you think this is a good idea?
> What are you trying to solve? The socks5 which Tor open is not a
> simple socks5 protocol implementation, it has some customizations
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Jeremy
Why do you want this and why do you think this is a good idea? What
are you trying to solve? The socks5 which Tor open is not a simple
socks5 protocol implementation, it has some customizations and
enhancements used by Tor Browser to isola
Hi Jeremy,
Yup, that's what I meant. Put haproxy between the user and the socks proxy and
it'll nicely pass sockets to Tor instances, transparently.
Tom
> On 24 May 2015, at 13:30, Jeremy Rand wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
>> On 05/24/2015 06:21 AM, Tom v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 05/24/2015 06:21 AM, Tom van der Woerdt wrote:
> Hi Jeremy,
>
> After reading your message I wonder whether a simple TCP proxy is
> what you want. Maybe have a look at haproxy?
>
> Tom
Hi Tom,
The intention is to have end user applications lik
Hi Jeremy,
After reading your message I wonder whether a simple TCP proxy is what you
want. Maybe have a look at haproxy?
Tom
> On 24 May 2015, at 13:15, Jeremy Rand wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Hello,
>
> I'm interested in having a SOCKS proxy sitting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello,
I'm interested in having a SOCKS proxy sitting between the end user
and the Tor-provided SOCKS proxy, which can do really simple stuff
like redirect from one host to another. (Just on the level of the
host requested via SOCKS, not HTTP heade
25 matches
Mail list logo