On Sun, Jan 10, 2016 at 10:29 AM, Moritz Bartl wrote:
> On 01/10/2016 03:08 PM, Fabio Pietrosanti (naif) - lists wrote:
>> I'm wondering if that couldn't be a very interesting model also for
>> TorBrowser, whereby the TorBrowser would automatically inject a referral
>> ID (in the HTTP header or UR
On 1/8/2016 3:17 PM, Yury Bulka wrote:
I've disabled the "Don't
record browsing history or website data" check box in the Privacy and
Security Settings dialog.
There's only one potential danger I see here - cookies.
In Windows TBB, there's a selection "Use custom settings for history."
The "Reme
> So you recommend manually specifying an entry guard, instead of letting
> Tor choose? Why?
Not at all.
Let your network gateway (or each PC) forward all outgoing traffic (or only
traffic to Tor node, with iptables + ipset) through your VPN. And use the
normal way a normal Tor client per PC, co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
s7r :
> Periodic consensus downloads, as well as keeping always some fresh
> circuits on the list in order to attach streams to when requested via
> the SocksPort. In other words, not much traffic but not 0 traffic as well.
And what about a client th
-- Forwarded message --
From: Bill Cox
Date: Sun, Jan 10, 2016 at 9:38 AM
Subject: [Cryptography] A possible alternative to TOR and PrivaTegrity
without backdoors
To: "cryptogra...@metzdowd.com"
This is an old idea, but perhaps now there might be more reason to
consider it. I c
Why do you absolutely want to route all your traffic through your VPN ?
You want to hide to your ISP the fact you use Tor ?
From my point of view, « secure » (no security possible without clean
specification of your threat model) network will be gateway of your network
with strong firewall allow
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello,
Periodic consensus downloads, as well as keeping always some fresh
circuits on the list in order to attach streams to when requested via
the SocksPort. In other words, not much traffic but not 0 traffic as well.
Related to your other questio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Oskar Wendel :
> 1. Maybe I should run a private (unpublished) bridge on the server and a
> tor client on my tor PC, that would be able to connect only to the bridge
> (through a VPN)? This way, all unencrypted traffic would never exit a tor
> PC.
On Sun, 10 Jan 2016 16:21:37 +, Kolja Weber wrote:
> The amount of people buy stuff online via torbrowser should be quite low
> (besides at some some "silkroads") , any serious online shop like amazon
> will block Tor or VPN, otherwise the fraud order rate is quite high.
None of my usual suspe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
My current setup is fairly simple. Let me introduce some consistent naming
first.
- - server - my server (VPS) in the datacentre
- - router - a router in my home, it has a private VPN connection to the
server
- - tor PC - a PC on which I browse tor
On 01/10/2016 03:08 PM, Fabio Pietrosanti (naif) - lists wrote:
> I'm wondering if that couldn't be a very interesting model also for
> TorBrowser, whereby the TorBrowser would automatically inject a referral
> ID (in the HTTP header or URL parameters) [...]
> That kind of model could be implemente
I didn't realize The Tor Project needed to investigate other options to raise
more money. They have a decently paid staff, and plenty of beneficiaries. At
least according to their 2013 tax filings. So, while your idea is interesting,
this is a solution seeking a problem with the wrong entity.
The amount of people buy stuff online via torbrowser should be quite low
(besides at some some "silkroads") , any serious online shop like amazon
will block Tor or VPN, otherwise the fraud order rate is quite high.
At least the CC processor / paypal / whatever will block Tor.
> Dear all,
>
> i've
I am having all kind of problems with this, but before I go into the details, a
bit of background.
Currently, I am running (quite happily) the "latest" Orbot, which uses tor
2.6(.10?) with no issues to report.
My android device uses droidwall with heavily modified firewall script, which restri
Dear all,
i've been told of some VPN services that are funding themselves by
"spoofing" the referral ID in their users traffic, for hundreds of
different websites for which they made an agreement for Referral /
Affiliate Marketing, when they earn a commission.
I'm wondering if that couldn't be a
15 matches
Mail list logo