Can someone please explain why services like Facebook and Gmail are so
wrong when they attempt to geo-locate exit nodes.
As an example, I set ExitNodes to {ru} and logged into my Facebook. This
locked my account. When I logged in Facebook told me there was a
suspicious login. It claimed the IP
On 2/2/16 1:50 PM, Roger Dingledine wrote:
> My suggestion to him at the time was to write up the details for why his
> design is safe, and get them vetted by other researchers in public, before
> proceeding. I haven't talked to him about how it's going since then.
> Hopefully he didn't skip too
On Tue, Feb 02, 2016 at 05:44:00AM -0800,
bm-2ctpsbetk5rpf8a9ymciudmax61kzvz...@bitmessage.ch wrote:
> I am sorry to ask such a basic question but I am confused by
> whether I should have the Tor browser set to;
> a. Temporary allow this page
> b. Revoke Temporary Permissions
> c. allow scripts gl
Dear Tor developers,
I am sorry to ask such a basic question but I am confused by
whether I should have the Tor browser set to;
a. Temporary allow this page
b. Revoke Temporary Permissions
c. allow scripts globally
After I downloaded the Tor's browser a few days ago it was working perfectly
but I
On Sun, Jan 31, 2016 at 03:42:51PM +0100, Fabio Pietrosanti (naif) - lists
wrote:
> But 90% of my resources (given the previous hypotetical assumption)
> would be happily pumping non-abuse-generating Tor exit traffic.
>
> Does anyone ever done some kind of testing or analysis about that kind
> of
> Is this a deliberate design consideration or a bug …
From the Tor manual page:
" TransPort requires OS support for transparent proxies, such as BSDs' pf
or Linux's IPTables."
It's disabled because there's no Windows transparent proxy implementation
in Tor. That's likely because Windows has no