On at least some level I can understand blocking porn and violence. But why
would you block things like bulimia and anorexia and suicide?
On a personal level, access to suicide related literature helped me out
during a depression.
On Sun, Aug 4, 2013 at 7:39 AM, Jamie Miller wrote:
> Hi, my nam
I hope that onion routing comes a long way in the next 10 years, but I'm
not necessarily for tor still being around. Right now it's needed because
there's no good replacement, but I think that a better future would have a
prominent onion-routed meshnet instead of Tor, especially if lots of the
rout
I can only speak for myself, but I stayed away from mailing lists when I
was a 'newb' because they seemed strange and technical. This is also back
at a time when I did not use email very often.
I think that how much you use email is closely related to how much you like
mailing lists. As someone wh
if you were to reply to a digest, would only the people who get a digest
see the reply?
On Thu, May 23, 2013 at 9:30 AM, Moritz Bartl wrote:
> On 23.05.2013 13:25, Nathan Suchy wrote:
> > I figured out I can post topics but how do I reply to one? Also for a
> note
> > my messages are sent to me
I'm not sure if this deserves its own thread, but I've been looking around
for a decent guide on building your own hidden service. The idea of course
is to be perfectly safe, even in the event of a highly trafficked site that
has content which would draw the attention of many authorities.
It looks
Except I think that in this case Tor is a bit more like a gun than a screw
driver. The good purposes aren't always obvious and the nefarious purposes
are on the forefront of public attention a lot more. It's not a perfect
analogy but I think you see what I'm getting at.
The purpose of Tor is to li
Are we sure this is a bug? Even when a page is in the cache doesn't it have
to communicate with the server to verify that the cache hasn't expired?
Perhaps this is what you are experiencing.
On Tue, May 7, 2013 at 9:41 PM, Tom Ritter wrote:
> Hm, that's an tough question. TBB doesn't modify th
What if you had something like exit nodes that required proof-of-work or
bitcoin-to-use in order to be used, as per-choice of the person running the
node? You would have a bunch of 'unsafe' exit nodes that behave like exit
nodes today, and then a bunch of 'difficult' exit nodes that require user
ef
I don't know what I'm talking about, but here goes:
If you were to put flash in a "sandbox" that had a fake IP address, might
that make the sandbox incompatible with the tor network? When you are
communicating, even over the tor network, your IP address is critical so
that servers on the other end
Part of the problem is that Tor is really inconvenient to use. The only
people who hang out on Tor are criminals because generally, it's only worth
the trouble if you are a criminal.
Bitcoin faced the same problem. Bitcoin was used primarily by criminals
until it became more interesting for other
The first problem that I see with this is the '5 hours average.' If a
malicious group got an ASIC but the poor guy from who-knows-where has 10yo
hardware, it may be impossible to balance the cost of doing a 'torslap.'
A bigger problem might be getting people to accept 'torslaps' because it
could b
11 matches
Mail list logo