On 5/29/15, grarpamp wrote:
> On Thu, May 28, 2015 at 2:08 AM, Zenaan Harkness wrote:
>> On 5/28/15, grarpamp wrote:
>>> to be taken other than filling your unused capacity with fill traffic.
>>> No network to date appears to be developing or using that defense.
>>
>> I thought that was the main
On 5/28/2015 7:34 PM, Jonathan Wilkes wrote:
On 05/26/2015 09:13 PM, Mike Ingle wrote:
I tried out Bitmessage and it did not seem to deliver without the
sender and recipient online. It's supposed to, it just didn't.
Waiting for key exchange.
Any response from the devs/forum when you reported
On 05/26/2015 09:13 PM, Mike Ingle wrote:
I tried out Bitmessage and it did not seem to deliver without the
sender and recipient online. It's supposed to, it just didn't. Waiting
for key exchange.
Any response from the devs/forum when you reported the bug?
It's also a bandwidth pig due to it
On 28 May (14:54:55), Yuri wrote:
> On 05/28/2015 06:25, David Goulet wrote:
> >What other pull requests are you talking about? There are a couple of
> >open tickets that need more time and thinking so I released this one
> >because of the amount of fixes that has been accumulating.
>
> https://gi
On 05/28/2015 06:25, David Goulet wrote:
What other pull requests are you talking about? There are a couple of
open tickets that need more time and thinking so I released this one
because of the amount of fixes that has been accumulating.
https://github.com/dgoulet/torsocks/pull/31
https://gith
[0] https://www.torproject.org/projects/torbrowser/design/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hello,
To answer your question you might find the Tor Browser design document
[0] a useful read. Font support leads to browser/system
fingerprinting. Plugins and scripts can extract font support lists,
html5 canvas elements can be used together with font
support/rendering, and the way fonts are re
linux. regular firefox looks just fine but TBB
seemingly does not take neither fonts.conf nor
Xresources into account, thereby rendering fonts
worse than ff does.
is there a reason for such behaviour? I could
certainly live with it but I'd like to fix it.
moreover it worked fine in a virtual machi
A blessing for credit card fraudsters. Unsurprisingly the jews are
behind this.
Muri Nicanor wrote:
> hi,
>
> On 05/24/2015 11:07 PM, aka wrote:
>> https://hola.org/
>
> https://8ch.net/hola.html states:
>> Hola was created by the Israeli corporation Hola Networks Limited at
>> the end of 2012,
On Thu, May 28, 2015 at 2:08 AM, Zenaan Harkness wrote:
> On 5/28/15, grarpamp wrote:
>> to be taken other than filling your unused capacity with fill traffic.
>> No network to date appears to be developing or using that defense.
>
> I thought that was the main differentiator for I2P (as compared
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Moritz,
Payments are already covered. Accepting bitcoin is the first platform
to look to, as well as Darkcoin possibly, but that only provides a
pseudo-anonymous means of security. Instead payments will be
tokenised, so that a person without needin
Hi Thomas,
Great! I've been toying with the idea for quite a while now, too. Glad
that someone is picking it up. :-) It would be ideal to find a way to
make it hard even for yourself to find out whether a particular hidden
service is hosted by you. I didn't really spend too much time thinking
abou
Hello,
As described on the contact page of torproject.org:
If you found a security issue in one of our projects or our
infrastructure, please email the respective maintainer. You can find
their GPG fingerprint/key on our developer ldap search page. Due to
the many different projects we have, we d
On Thu, May 28, 2015, at 02:27 PM, David Goulet wrote:
> On 28 May (02:38:04), Geoff Down wrote:
> > >
> > > Which keyserver has your GPG key please?
> > > GD
> > >
> >
> > Found it at
> > x-hkp://pool.sks-keyservers.net
> > the same as the other Torproject keys - but there's no fingerprint o
On 28 May (02:38:04), Geoff Down wrote:
>
>
> On Thu, May 28, 2015, at 02:29 AM, Geoff Down wrote:
> >
> >
> > On Wed, May 27, 2015, at 08:19 PM, David Goulet wrote:
> >
> > > Tarball:
> > > https://people.torproject.org/~dgoulet/torsocks/torsocks-2.1.0.tar.bz2
> > > (sig:
> > > https://people
On Thu, May 28, 2015 at 07:48:18PM +0800, Virgil Griffith wrote:
> If so can initiate making all tor2web clients use IPv6 by default.
Hi Virgil,
Can you clarify what you mean here?
Do you mean having the websites that run tor2web return records
when you resolve them?
Do you mean having the
On 27 May (18:14:37), Yuri wrote:
> On 05/27/2015 12:19, David Goulet wrote:
> >Hi everyone!
> >
> >This is the release for version 2.1.0 of Torsocks. Special thanks to
> >Yawning that helped a lot with the new features, finding bugs and
> >providing patches! Also, thanks to all contributors and us
When I enable a hidden service, I get this error message repeatedly in my Tor
log:
"[warn] connection_edge_process_relay_cell (at origin) failed."
When I disable the hidden service and use Tor normally, it doesn't show up
anymore.
What is this error message? Bad configuration/firewall? Bad ent
On 05/27/2015 09:19 PM, David Goulet wrote:
> - IsolatePID is a new option that will make torsocks set the SOCKS5
> username and password automatically to provide isolation on Tor side.
>
> You can use this with the -i,--isolate command added or
> TORSOCKS_ISOLATE_PID env. variable.
Perhaps
If so can initiate making all tor2web clients use IPv6 by default.
-V
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
hi,
On 05/24/2015 11:07 PM, aka wrote:
> https://hola.org/
https://8ch.net/hola.html states:
> Hola was created by the Israeli corporation Hola Networks Limited at
> the end of 2012, and at first was just the VPN service. However, Hola
> has gotten greedy. They recently (late 2014) realized that
On Thu, May 28, 2015 at 10:05:26AM +0100, Just Talkin' wrote:
> All this would be very abusive of other people's paid-for Internet
> connections, and very anti-social!
Sounds to me like a great way to make more people think that Tor exit
relays are immoral antisocial things, and that anything rela
I have been wondering whether there has ever been a direct action
campaign to try to install many, many Tor exit nodes?
Inspired by PirateBox, I am thinking of something like a pre-configured
Tor exit node in a small device (plug computer, TL-WR710N, HDMI or USB
stick computer, etc). Which co
23 matches
Mail list logo