On 10/02/2015 12:44 AM, Moritz Bartl wrote:
> On 10/01/2015 08:55 PM, CJ wrote:
>> I'm wondering if I could configure an exit proxy between my exit node
>> and the clear net in order to deny accesses to specific URL parts,
>> like "wp-login.php" and other well-known stuff.
>
> No, this is not po
Another possibility would be to 'moderate' this list to encourage Tor newboys
and answer quests for Tor knowledge rather than rubbishing and confusing people.
Robert
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.
On 10/1/15, Ryan Carboni wrote:
> http://arstechnica.com/tech-policy/2013/06/exclusive-in-2009-ed-snowden-said-leakers-should-be-shot-then-he-became-one/
>
> https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/
>
> Yep.
>
> Time to create a massive donation
On 10/01/2015 08:55 PM, CJ wrote:
> I'm wondering if I could configure an exit proxy between my exit node
> and the clear net in order to deny accesses to specific URL parts,
> like "wp-login.php" and other well-known stuff.
No, this is not possible in any useful way, sorry. You will mess with
use
Hello,
For any months I'v been running an exit node.
That was fine until a few weeks… Now I get twice a week an abuse
notification from Hetzner, because script kiddies and other sad people
are using Tor in the wrong way.
I'm wondering if I could configure an exit proxy between my exit node
and th
> Randomization, or some one click equivalent, is the only real option here
when usability is considered; the manual effort each session is undesirable
at the very least :)
The problem you have there, is what to randomize, and how to do it in such
a way that it does not itself become identifiable.
Hi,
pacifica:
Eh, I'd hesitate to say "us". I'm _not_ advocating for using add-ons
in TBB, I'm just looking for ways to quantify the damage to anonymity.
My "that's us" is in response to the "imaginative fringe cases"
statement, as that is how the network came into existence, with "us"
bei
Hi,
behnaz Shirazi:
a Tor user who temporarily use a natural
fingerprint to become undetectable for a while won't deanonymize
itself nor the rest of other Tor users who use a detectable version of
TBB because when a natural fingerprint is used once then there will be
no enough information avail
That practice would be almost universally discouraged, except perhaps
for some imaginative fringe cases.
That's us.
Eh, I'd hesitate to say "us". I'm _not_ advocating for using add-ons in
TBB, I'm just looking for ways to quantify the damage to anonymity.
Being part of an identified heard
Asio is only a socket library which means you would need to build all the
Http logic on top of it, which is not very fun but everything you need to
know is documented in RFCs if you really want to go down that route.
The "best/ easiest" way would be to use a http library specifically for the
purpo
> False! A unique Tor exit IP that visits site1.com then site2.com won't
> compromise same person visited those sites or tow different person who
> used same Tor exit IP at the same time did that, thus anonymity
> remains true.
But if one has one fingerprint (the default TBB) and the other an
'und
On Sat, Sep 26, 2015 at 7:44 PM, Jeremy Rand wrote:
>Maybe I'm not understanding you, but given that all TBB users are
>already distinguishable from other users since their IP address is a
>Tor exit, I'm not seeing how TorBrowser having a different fingerprint
>from other browsers is a problem. T
On October 1, 2015 1:49:28 AM CDT, Moritz Bartl wrote:
>On 10/01/2015 04:24 AM, Cypher wrote:
>> I'm setting up a new Hidden Service and I need to figure out how to
>turn
>> off relaying. I remember this being discussed a while back on this
>list
>> but can't find it. How do I turn relaying off
Google how to use Socks5 with boost and set 127.0.0.1:9050 as proxy.
On Sep 30, 2015 5:14 AM, "Tyler Hardin" wrote:
> Hi, I'm writing a spider in C++ and thinking about running it on the Tor
> hidden network. I'm using boost::asio for the network API. What would be
> the best/easiest way for me t
i plan to host a site with tor hidden service on my vpshow should i make it
safe from ddos?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
15 matches
Mail list logo