These are all wonderful. Thank you all!
Okay, I'll bring these up and see if I can nudge the needle in the right
direction. It's not much, but every little bit helps?
-V
On Sat, 3 Oct 2015 at 08:25 Griffin Boyce wrote:
> Virgil Griffith wrote:
> > For unrelated reasons I'm meeting with Cloudfl
Virgil Griffith wrote:
For unrelated reasons I'm meeting with Cloudflare. Can someone
enlighten
me on the current state of the captcha situation? Presuming they are
unwilling to completely drop the captcha, what would be a step in the
right
direction?
The last I heard from Cloudflare is:
ht
This is a lot of really good advice. Thanks. For some reason, I was
thinking C++ would give a measurable performance increase for the spider,
but after having questioned that it seems really dumb. Obviously the
network will be the bottleneck by far. I think I'll still use C++ for the
back end thoug
On Fri, Oct 02, 2015 at 09:08:38PM -0700, Spencer wrote:
> They suck (time and energy). They seem to only come in robot
> discrimination form.
This will never be solved, since tors main property is to hide
the origin of requests, it provides more benefits to an possible
adversary from the view/
On Fri, Oct 02, 2015 at 04:58:12PM +, behnaz Shirazi wrote:
> As I said it won't happen. It doesn't make sense to use
> undetectableizer when using a public Tor exit node because that will
> compromise you are using Tor thereby minority of undetectable users
> won't hurt anonymity of major dete
Hi,
Virgil Griffith:
For unrelated reasons I'm meeting with Cloudflare. Can someone
enlighten
me on the current state of the captcha situation?
They suck (time and energy). They seem to only come in robot
discrimination form.
Presuming they are unwilling to completely drop the captc
For unrelated reasons I'm meeting with Cloudflare. Can someone enlighten
me on the current state of the captcha situation? Presuming they are
unwilling to completely drop the captcha, what would be a step in the right
direction?
The last I heard from Cloudflare is:
https://support.cloudflare.com
Today I rate-limited the bridge behind meek-azure to 1.1 MB/s. Our free
grant is expired and now it will start costing money. This is the same
rate that meek-google and meek-amazon are set to.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
ht
On 10/1/15, Ben Tasker wrote:
>> False! A unique Tor exit IP that visits site1.com then site2.com won't
>> compromise same person visited those sites or tow different person who
>> used same Tor exit IP at the same time did that, thus anonymity
>> remains true.
>
> But if one has one fingerprint (
Hello, how does tor browser connect to the internet? Since a security
update ie, Firefox, avast etc won't connect. Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
http://routersecurity.org/
It just simply doesn't matter.
To have a modern lifestyle, depends upon having devices of dubious or poor
security. The government has shown a willingness to accumulate dossiers
(seemingly including IRC chats), and then leak them when it serves their
own needs.
Our Con
11 matches
Mail list logo