On Wed, 29 Jul 2015 22:56:33 +0200
Alexandre Guillioud wrote:
> I would risk a dumb question : how can it be 'controlled opposition"
> when their (NSA) capacities to listen to whoever they want on tor
> havn't been demonstrated nor refuted ?
Have you ever heard or read this sentence :
This isn't a debate and you appear to have a problem with anger. You should
deal with that.
> I will stop discussing with you now. Troll or dumb, that's not my problem
> and i will not give more time to it.
>
Your response wasn't edifying. In future replies try to offer something that
edifies
Lara, i'm basically on your side on this debate. If you want to troll on
two weird sentences, ignoring most of my message, go on 9gag.
Le jeudi 30 juillet 2015, Lara a écrit :
> Alexandre Guillioud:
> > People which need tor for security, anonymity, can and will inform
> > themselves.. If they d
Reread a few post back.
First you are whining about tor being misused, and after being put in place
by Lara, you say "internet is full of ressources anyway" ?
Plain nonsense.
Plus, making citation on two weird sentences i wrote a 2am, out of a long
and meaningful message, is equally plain non sen
My friend if you hear whinning someone should 'help' you *read* my post.
> People which need tor for security, anonymity, can and will inform
> themselves.. If they don't, they risk exactly what they were risking
> withiut it.
Also never say something is a fact about all people that need tor for
Alexandre Guillioud:
> People which need tor for security, anonymity, can and will inform
> themselves.. If they don't, they risk exactly what they were risking
> withiut it.
But if that's so, than the sky is not falling. Won't Jeebus come on and
stain his white cloud?
I bet in the next post you'
If 'most' of these 'uninformed' peoples should be 'fine' using clearnet,
then, why are you whinning ?
I mean, if they use the tool incorrectly, they will only face no danger.
People which need tor for security, anonymity, can and will inform
themselves.. If they don't, they risk exactly what they
There's enough information available on the internet to gain good knowledge of
how to use TOR. Making sure you know the tools you're using is your
responsibility.
Looking at porn isn't called illegal, *most* self-contained people should be
fine using clearnet.
--
>
> The Tor team should pre
Great idea!
--
> devjimsm...@safe-mail.net:
> > Many people use TOR without understanding enough about how it works.
> > They trust TOR because of what they hear about it without their own
> > verification. TOR is just a tool not the solution and you have to
> > know how to use it correctly.
>
>
Hahahahaha
Le jeudi 30 juillet 2015, Lara a écrit :
> devjimsm...@safe-mail.net:
> > Many people use TOR without understanding enough about how it works.
> > They trust TOR because of what they hear about it without their own
> > verification. TOR is just a tool not the solution and you have to
devjimsm...@safe-mail.net:
> Many people use TOR without understanding enough about how it works.
> They trust TOR because of what they hear about it without their own
> verification. TOR is just a tool not the solution and you have to
> know how to use it correctly.
The Tor team should prepare a
I approve. And there is a big problem over here. How to explain these
complicated use cases that would protect people at 99% ?
Le jeudi 30 juillet 2015, a écrit :
> Many people use TOR without understanding enough about how it works. They
> trust TOR because of what they hear about it without th
If using Linux, you can install CLI tool Arm and there is a tab where it
says which gives you the country of the node. Not sure if the city as
well. For Tails it should be the same but you'll have to do it everytime
you start Tails. But maybe that already comes with Tails, and I think it
does.
If
And there are a lot of project. If these project are followed, they are
mostly open. If they are open, they (the NSA) know what you could be using.
If these project arn't followed by consistant number of peoples, their code
quality could be horrible.
My point is thatwhat you are asking isn't poss
Many people use TOR without understanding enough about how it works. They trust
TOR because of what they hear about it without their own verification. TOR is
just a tool not the solution and you have to know how to use it correctly.
--
> controlled opposition is why i skreech about tor - that
Cari Machet:
> would be more effective if people were working on different projects for
> security as many as possible
I feel your pain, bro! How much time should *we* wait for them? *They*
should get to work ASAP!
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or ch
controlled opposition is why i skreech about tor - that it is looked to as
THE SOLUTION ... they know what people are using - not as bad as controlled
demolition but...
would be more effective if people were working on different projects for
security as many as possible
On Jul 29, 2015 11:57
Hi All,
The TOR Newtork Map was a very informative and attractive tool for explaining
TOR to potential users. Now that the TOR bundle and TAILS don't include the
network map software anymore what would be an alternative?
--
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscri
I would risk a dumb question : how can it be 'controlled opposition" when
their (NSA) capacities to listen to whoever they want on tor havn't been
demonstrated nor refuted ?
Le mercredi 29 juillet 2015, Juan a écrit :
> On Wed, 29 Jul 2015 12:32:56 +
> Virgil Griffith > wrote:
>
>
>
> >>
On Thu, Jul 30, 2015 at 03:36:52AM +0800, Virgil Griffith wrote:
> > old at that point.) We had a picture where the ordering
> > information went over the Web from the Pentagon to Domino's and was
> > routed by an enemy (Iraq at the time of the putative pizza channel
> > concern). I remember a poi
On Wed, 29 Jul 2015 12:32:56 +
Virgil Griffith wrote:
>> Historically speaking, what was the U.S. navy /military
>> ntending to use Tor for?
me:
>
>
> Exactly the same things they use it for right now.
>
> Communications for their murdering operations, spying,
> p
On Wed, 29 Jul 2015 12:32:56 +
Virgil Griffith wrote:
>Historically speaking, what was the U.S. navy /military
ntending to use Tor for?
Exactly the same things they use it for right now.
Communications for their murdering operations, spying,
propaganda.
> old at that point.) We had a picture where the ordering
> information went over the Web from the Pentagon to Domino's and was
> routed by an enemy (Iraq at the time of the putative pizza channel
> concern). I remember a point I would make during presentations was
> that the enemy could see the n
> Working were and are only connections without the Tor network, with
> unpublished bridges, and with Tails (changing the MAC address)
That doesn't make sense. Vodafone doesn't see your Tails MAC at all. I think
it's unlikely that Vodafone is throttling on purpose.
Most likely, there is some br
Esmirna,
All mail coming from the mailing list contains the following:
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Try the instructions.
Matt
Speak Freely
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe
There is an unsubscribe link at the bottom of each message on the list,
including this one. Merely posting the request to the list itself won't do it.
Ed
Original Message
From: Esmirna Matos
Sent: July 29, 2015 11:13:40 AM ADT
To: "tor-talk@lists.torproject.org"
Cc: ""
Sub
Unsubscribe
Sent from my iPhone
> On Jul 28, 2015, at 1:53 PM, "Bill Cunningham" wrote:
>
>Ok looks like a problem. I did a lot of work texting and trying to pipe
> out results to post. It went into an empty file. The verify results couldn't
> verify anything. All the numbers were wrong.
Unsubscribe
Sent from my iPhone
> On Jul 28, 2015, at 2:12 PM, "Bill Cunningham" wrote:
>
>I have solved the problem. I happened to click properties of the file. The
> words "This file has been blocked because it came from another computer" was
> there. This has never happened. I unblock
Unsubscribe
Sent from my iPhone
> On Jul 28, 2015, at 2:25 PM, "Bill Cunningham" wrote:
>
> Now I am noticing that a lot of things seem to come up wanting you to type a
> validation code. I went to google and it wanted that. Is that wise?
> bridges.torproject.org wants validation too.
>
> B
Unsubscribe
Sent from my iPhone
> On Jul 28, 2015, at 2:46 PM, "Bill Cunningham" wrote:
>
> So what about the hhtp://bridges.torproject.org site wanting you to enter a
> serious of characters? Is that safe?
>
> - Original Message -
> From: aka
> To: tor-talk@lists.torproject.org
Unsubscribe
Sent from my iPhone
> On Jul 29, 2015, at 9:01 AM, spriver wrote:
>
> Am 2015-07-29 14:44, schrieb Lara:
>> Virgil Griffith:
>>> But what was the Navy/military originally hoping to use Tor-related
>>> protocols for? It's unclear to me what their historical motivations were.
>> Becau
Unsubscribe
Sent from my iPhone
> On Jul 29, 2015, at 9:50 AM, Paul Syverson wrote:
>
> Hi Virgil,
>
>> On Wed, Jul 29, 2015 at 12:32:56PM +, Virgil Griffith wrote:
>> intending to use Tor for?
>>
>> I know the classic story of US intelligence agents wanting to phone home
>> from Beijing
Unsubscribe
Sent from my iPhone
> On Jul 29, 2015, at 9:53 AM, Alexandre Guillioud
> wrote:
>
> hahahaha :)
> What's all that bullshit around tor about its security.. The source is
> fully disclosed, maintenaned by open source agents. Their are well known
> flaws into the system, but, from my
Unsubscribe
Sent from my iPhone
> On Jul 29, 2015, at 9:55 AM, Alexandre Guillioud
> wrote:
>
> I had heard that the original use case were to protect their (US navy)
> ships against command center localisation through RF harvesting. The onion
> routing of the admiral commands through a few b
I had heard that the original use case were to protect their (US navy)
ships against command center localisation through RF harvesting. The onion
routing of the admiral commands through a few boats means enemmies can't
detect which on is giving orders.
2015-07-29 14:32 GMT+02:00 Virgil Griffith :
hahahaha :)
What's all that bullshit around tor about its security.. The source is
fully disclosed, maintenaned by open source agents. Their are well known
flaws into the system, but, from my engineer point of view, not enough to
void the usage of it.
Come on, some big company/agency can spy by ove
Hi Virgil,
On Wed, Jul 29, 2015 at 12:32:56PM +, Virgil Griffith wrote:
> intending to use Tor for?
>
> I know the classic story of US intelligence agents wanting to phone home
> from Beijing hotels without Chinese intelligence knowing they were phoning
> home as a partial motivation for open
Am 2015-07-29 14:44, schrieb Lara:
Virgil Griffith:
But what was the Navy/military originally hoping to use Tor-related
protocols for? It's unclear to me what their historical motivations
were.
Because they are servants of a reptilian specie of aliens, they are
following their masters' plan.
Virgil Griffith:
> But what was the Navy/military originally hoping to use Tor-related
> protocols for? It's unclear to me what their historical motivations were.
Because they are servants of a reptilian specie of aliens, they are
following their masters' plan. They need to spy on *you*. Because *
intending to use Tor for?
I know the classic story of US intelligence agents wanting to phone home
from Beijing hotels without Chinese intelligence knowing they were phoning
home as a partial motivation for open-sourcing Tor.
But what was the Navy/military originally hoping to use Tor-related
pro
40 matches
Mail list logo