Not correlated (i'm too small in that pool), but i have workd on software
to maintain a HS pool. During dev, and at one point, i was emitting
thousands of registration a day.
2016-02-18 16:51 GMT+01:00 Roger Dingledine :
> On Thu, Feb 18, 2016 at 05:45:26AM -0500, Scfith Rise up wrote:
> > Here i
" That's definitely an improvement, although there's an issue in the long
run that the crypto in HTTPS is getting better faster than the crypto
in Tor's hidden services implementation. :-) "
I don't understand why you are saying that this is an 'issue'.
If one of the crypto tech is getting better,
ne
members' (everyone in here is tor dev ?) are slowing down tor development,
by making the possibility of a move out of sight.
Friend ! \o/
Isn't out there tor forks with enough peers ?
Le jeudi 30 juillet 2015, Zenaan Harkness a écrit :
> On 7/30/15, Alexandre Guillioud > wro
:
> On Wed, 29 Jul 2015 22:56:33 +0200
> Alexandre Guillioud > wrote:
>
> > I would risk a dumb question : how can it be 'controlled opposition"
> > when their (NSA) capacities to listen to whoever they want on tor
> > havn't been demonstrated
Lara, i'm basically on your side on this debate. If you want to troll on
two weird sentences, ignoring most of my message, go on 9gag.
Le jeudi 30 juillet 2015, Lara a écrit :
> Alexandre Guillioud:
> > People which need tor for security, anonymity, can and will inform
> >
Reread a few post back.
First you are whining about tor being misused, and after being put in place
by Lara, you say "internet is full of ressources anyway" ?
Plain nonsense.
Plus, making citation on two weird sentences i wrote a 2am, out of a long
and meaningful message, is equally plain non sen
If 'most' of these 'uninformed' peoples should be 'fine' using clearnet,
then, why are you whinning ?
I mean, if they use the tool incorrectly, they will only face no danger.
People which need tor for security, anonymity, can and will inform
themselves.. If they don't, they risk exactly what they
Hahahahaha
Le jeudi 30 juillet 2015, Lara a écrit :
> devjimsm...@safe-mail.net:
> > Many people use TOR without understanding enough about how it works.
> > They trust TOR because of what they hear about it without their own
> > verification. TOR is just a tool not the solution and you have to
d as
> controlled
> > demolition but...
> >
> > would be more effective if people were working on different projects for
> > security .... as many as possible
> > On Jul 29, 2015 11:57 PM, "Alexandre Guillioud" <
> > guillioud.alexan...@gmail.co
THE SOLUTION ... they know what people are using - not as bad as controlled
> demolition but...
>
> would be more effective if people were working on different projects for
> security as many as possible
> On Jul 29, 2015 11:57 PM, "Alexandre Guillioud" <
> guillioud.a
I would risk a dumb question : how can it be 'controlled opposition" when
their (NSA) capacities to listen to whoever they want on tor havn't been
demonstrated nor refuted ?
Le mercredi 29 juillet 2015, Juan a écrit :
> On Wed, 29 Jul 2015 12:32:56 +
> Virgil Griffith > wrote:
>
>
>
> >>
I had heard that the original use case were to protect their (US navy)
ships against command center localisation through RF harvesting. The onion
routing of the admiral commands through a few boats means enemmies can't
detect which on is giving orders.
2015-07-29 14:32 GMT+02:00 Virgil Griffith :
hahahaha :)
What's all that bullshit around tor about its security.. The source is
fully disclosed, maintenaned by open source agents. Their are well known
flaws into the system, but, from my engineer point of view, not enough to
void the usage of it.
Come on, some big company/agency can spy by ove
I prefere the email list too, so stop pushing people in stack exchange.
Le dimanche 6 octobre 2013, Crypto a écrit :
> I prefer the email list also.
>
>
> mick > wrote:
> >On Sun, 06 Oct 2013 09:31:08 +
> >mirimir > allegedly wrote:
> >
> >> On 10/06/2013 09:11 AM, Roman Mamedov wrote:
> >> >
\o/
Le jeudi 26 septembre 2013, David Green a écrit :
> For all of 'you'; I shall appreciate 'security' and tor the more I use 'em
> and, as Mr Lewman says, the more I get the feel and love of GCC, etc. As I
> have said before, I innately have, and had, a draw towards Linux/BSD for
> over 15 yea
Thank's you for enlightment of this ! I'm less dumb now :D
2013/9/16 Michael Wolf
> On 9/16/2013 5:45 AM, Alexandre Guillioud wrote:
> > "Also it is worth mentioning that disabling Javascript does not protect
> > against this type of fingerprinting, as it is a
"Also it is worth mentioning that disabling Javascript does not protect
against this type of fingerprinting, as it is available to CSS too:
https://developer.mozilla.org/en-US/docs/Web/Guide/CSS/Media_queries";
It could be available to css, but without javascript, it can't be sended !
2013/9/13
Hi all,
I must agree with that... Install a fucking web forum !! It's worth 1 to 10
hours of work...
!!!
2013/6/18 Cat S
> Hi all,
>
> This mailing-list is a stupid fucking joke, well, at least for those of us
> who aren't techies. Really, this is stupid, you're not allowing a lot of
> people
One thing i forgot.. The last vpn/ssh tunnel need to be totally secure.
Basically, you need your personnal anon server to do that. If you can't
handle your own service, you'll better stay with tor as the last system in
the pile.
2013/4/4 Alexandre Guillioud
> I'm in a hurr
Tor node? I haven't
> found it
> > > anywhere in the configuration (I'm using TBB on OS X).
> > >
> > > Is it possible to increase the size of the key, if say I've got
> a big
> > > server running as a nod
tor is break. Timing attack become quasi impossible, beacause of
scrambling/linearisation of the vpn/ssh tunnel.
Enjoy ? :D
2013/4/4 Ivan Sipka
> On Thu, Apr 4, 2013 at 2:06 PM, Alexandre Guillioud <
> guillioud.alexan...@gmail.com> wrote:
>
> > So, if you're paranoïd,
So, if you're paranoïd, or doing something where paranoïd behavior is
requested, use a vpn inside and outside tor.
Use linked proxy's on top of this. You'll be fine.
2013/4/4 Alexandre Guillioud
> I may be wrong, but i take for true that NSA as 10 to 30 years adva
the key, if say I've got a big
> > server running as a node?
> >
> > If there are nodes using different length keys, is the security relying
> on
> > the node with the smallest key length?
> >
> > Thanks.
> >
> > Bernard
> >
> > --
One ask triggering another :
How do you do a timing attack ? What are the necessary steps to be
successfull in such a thing ? Where can i find some documented timing
attack scenario ?
2013/4/4 Alexandre Guillioud
> My guess is that the Key size is configured right into the node's sourc
> Thanks.
>
> Bernard
>
>
> Written on my small electric gadget. Please excuse brevity and (possible)
> misspelling.
>
> Alexandre Guillioud wrote:
>
> >The bigger the key is, the longer (cpu cycle) it take to encrypt/decrypt ?
> >
> >Le jeudi
The bigger the key is, the longer (cpu cycle) it take to encrypt/decrypt ?
Le jeudi 4 avril 2013, Bernard Tyers a écrit :
> Hi,
>
> Is there a reason 1024 bit keys, instead of something higher is not used?
> Do higher bit keys affect host performance, or network latency?
>
>
> Thanks,
> Bernard
>
There is, no HiveMind, just some (hyper)active cells from my point of view.
2013/2/25 Kamigawa
> Hi guys, I wonder where can I download that interesting flood software
> for DDoS that I saw in one of the videos about Anonymous Incident in
> 2010-2011. And btw how can I react rapidly if the Hive
Welcome to a mail broadcasting system (formerly "mix" (4 anonymous) mailing
list)..
You receive the main threads on this list i assume. If you answer to any,
you'll be added to the discussion flow.
Le mercredi 20 février 2013, Chunkylover2007 a écrit :
>
> Hi people i have been recieving emails f
OMG, thank's for the laugh !
And hi :)
Le lundi 11 février 2013, Mysterious Flyer a écrit :
> This is a shout-out to all mermaids using Tor. I am using Tails. I
> just wanna be in with the in crowd. Sorry if my shout-out is just a
> lot of bubbles. That's what happens when you're a mermaid (
Not in maths college/major, but interested in :D
2013/1/24 Raynardine
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Hello, I am a math student in college. I'm interested in tor and
> cryptography in general.
>
> I just thought I'd say hello.
>
> Is anyone else here a mathematics major
An accidental DOS ?
>From my point of view, this functionality can't let a DOS out.
If sysadmin's warnings about DOS on their servers trigger, they are
missconfigured..
2013/1/21 Nick Mathewson
> On Mon, Jan 21, 2013 at 2:56 PM, wrote:
> I think tor lacks an isolation flag which specifie
What I need, is a cut circuit of all gps/gsm/3g/4g/bluetooth/wifi/whatever
which emit/receive radio radiations. Today, it's something uncommon on the
mobile market.. You can't totally controle hardware throught software
easily. If i don't want wifi or gsm, i need to be able to disable totally
these
>From my experiments, it depends of the client. Referrer is a strange var,
and as it's client defined you can't rely on it.
I've done my experiments without tor. And as far as i know, tor isn't
changing data in any way, my experiments are relevent.
2013/1/11 Outlaw
> > BUT. If your .onion server
thank's you for the reply. I understand better the functionnal aspect of
tor now :)
Le jeudi 10 janvier 2013, Lasse Øverlier a écrit :
> On Thu, Jan 10, 2013 at 4:40 PM, Alexandre Guillioud <
> guillioud.alexan...@gmail.com > wrote:
>
> > "HTTP Referer will giv
Can deploy on 200 randomly changing ip adress. How can i help ?
2013/1/10 David Fifield
> Please help us test new bundles that have flash proxy and pyobfsproxy
> enabled by default.
>
> Flash proxy (https://crypto.stanford.edu/flashproxy/) is a transport
> that uses proxies running in web browse
"HTTP Referer will give away the URL
to the other server if not properly sanitized by the client..."
Here, what you call cleint, is the web browser ?
Could tor sanitize everything which is send in "$_SERVER" var before
sending web request ?
Or is it the work of privoxy/other proxy and tor will nev
outlaw => i d'ont mean what you describe. If i run an exit node and sniff
every http packet out, i'll don't know where request are from, but i can
see every parameters/data of post/get requests. Not every website has ssl
activated guys.
Hidden services are another use case. There is no exit node,
Or malicious code on the last node :)
2013/1/9 Bernd
> 2013/1/7 Outlaw :
> > Hi! I wonder, is there a way for some malicious node (or someone except
> > client and hidden server) to spy upon path part or GET request of .onion
> > service? I mean "path/to/somewhere.html" part in
> > http://somelo
tware harder
>to use if you're not getting the defense you seek?
What i was saying is no configuration for the end user. Just dispatch on
the first node on the most efficient circuits for the current datatype.
2013/1/9 Tom Ritter
> On 9 January 2013 10:33, Alexandre Guillioud
>
low latency circuits.
2013/1/9 Tom Ritter
> On 9 January 2013 10:05, Alexandre Guillioud
> wrote:
> > Hi all,
> >
> > I'm reading your conversation, and i'm not understanding very well what
> you
> > mean by high/low latency network. Isn't i
THX guy !
2013/1/9 Stefan Leibfarth
> Hello!
>
> That should help and also give some further informations and tips for
> Tor on Synology:
> http://malexmave.tumblr.com/post/21727288079/synology-tor
>
> Greetings
> Stefan
>
>
> 2013/1/7 Jan Strube :
> > Hello,
> >
> > I´m trying to build tor vers
41 matches
Mail list logo