I wanted to make some of us aware that Recorded Future is a threat intel
service that is doing a webinar in how to run exit nodes that sniff
traffic. In the webinar they will show how to "Visualize malicious cyber
activity from Tor exit nodes."
http://go.recordedfuture.com/tor-webinar
#
--
tor-t
-probe.git/blob/16ec7a88d426b30a7bd604e97e6b5d7225b9bb91:/README.md
Thoughts?
ROC
On Sun, Mar 31, 2013 at 11:12 AM, Aaron wrote:
> On Sat, Mar 30, 2013 at 4:18 PM, Roc Admin wrote:
> >> Does this mean that you're planning to expand the SoaT codebase? Write
> >> a revised versi
Awesome. Congrats on the 1.0 release. Literally just using this an hour
ago.
ROC
On Sat, Mar 30, 2013 at 11:03 PM, Damian Johnson wrote:
> Hi all. After eighteen months of work and a number of delays rivaling
> that of the Big Dig I'm pleased to announce the initial release of
> stem!
>
> For t
> Does this mean that you're planning to expand the SoaT codebase? Write
> a revised version? If the project is going to be revived then it would
> make sense for it to take advantage of one of our newer controller
> libraries...
Yeah the plan is to do a complete rerwrite of SoaT. That guy was a
b
I'm working on an updated version of SnakesOnATor (SOAT) that was used
to monitor the Tor network for bad exit nodes. This is a similar
function to InspectTor hosted on a .onion site but that page owner has
not been reachable and has not reached out to other Tor folk.
The main problem with InspecT
Actually, I might be a good fit. Feel free to ping me off-list to discuss.
On Wed, Jan 30, 2013 at 11:22 AM, Damian Johnson wrote:
>> Can anyone tell me what mechanisms we (or the Tor Project members)
>> have in scanning for malicious exit nodes. Such as nodes that are
>> manipulating DNS request
Can anyone tell me what mechanisms we (or the Tor Project members)
have in scanning for malicious exit nodes. Such as nodes that are
manipulating DNS requests, stripping SSL, etc. I know of the SOAT
project from Mike Perry but the last I heard there was a GSOC dev
working on the project. Is that st
Thanks for pointing that out. Am I reading that correctly that the
hashedcontrolpassword value in the config file can also be in base64?
On Sat, Oct 27, 2012 at 7:04 AM, Julian Yon wrote:
> On Fri, 26 Oct 2012 21:37:45 -0400
> Roc Admin wrote:
>
>> Can someone tell me what &quo
Can someone tell me what "16:" means as part of the hashed password
functions? This is an implementation of OpenPGP S2K and "16:" is close
to the spot where you would specify the s2k specifier for 0x03 being
Iterated and Salted, and 0x02 for the SHA1 hashing function. But since
the only hash suppor
bump
On Tue, Oct 11, 2011 at 12:15 PM, Roc Admin wrote:
> Hey, it's been a while so I'm sorry if this has already been
> discussed. Hadn't seen it in the archives
>
> I wanted to bring up the subject of Convergence.io as it fits in with
> Tor. Details here: http:/
Hey, it's been a while so I'm sorry if this has already been
discussed. Hadn't seen it in the archives
I wanted to bring up the subject of Convergence.io as it fits in with
Tor. Details here: http://convergence.io/
The short version of it is that it's a replacement to the current CA
system. Inste
11 matches
Mail list logo