I can read too. The point is Russia has put out large dollar figures
for this before and I wouldn't be surprised if they did it again.
On Fri, Sep 15, 2017 at 5:05 PM, Leonid Evdokimov wrote:
> On Fri, Sep 15, 2017 at 04:33:12AM -0500, eric gisse wrote:
>> https://motherboard.
Russia.
https://motherboard.vice.com/en_us/article/wnjgxb/russia-has-put-a-bounty-on-tor
On Thu, Sep 14, 2017 at 5:17 PM, flipchan wrote:
> Where does the cash come from?
>
> On September 13, 2017 5:41:52 PM GMT+02:00, I
> wrote:
>>https://zerodium.com/tor.html
>>
>>
>>--
>>tor-talk mailing
Oh, have they finally stopped putting ads into NXDOMAIN results after
years of ignoring requests to do so?
On Sat, Aug 12, 2017 at 4:14 PM, Jon Tullett wrote:
> On 12 August 2017 at 13:59, eric gisse wrote:
>> Please don't use OpenDNS. They insert ads into lookups.
>
> Do
Please don't use OpenDNS. They insert ads into lookups.
On Fri, Aug 11, 2017 at 7:07 PM, krishna e bera wrote:
> On 11/08/17 06:42 PM, blo...@openmailbox.org wrote:
>> I am a little confused when using Tor with https://browserleaks.com/ip
>>
>> My exit node is ogopogo in Canada. But the "DNS leak
It's a bit late, but I can answer the question.
Replace the word "implant" with "rootkit" or "backdoor", and things
make a lot more sense.
On Sun, Jul 9, 2017 at 1:22 AM, Jim wrote:
> Tom Tom wrote:
>>
>> http://thehackernews.com/2017/07/ssh-credential-hacking.html?m=1
>>
>> This post could be h
ke testing for binary patching (eg, ninja
exe patching).
Some of these things are easier to detect than others.
I'm going to put a pin in this and think about it.
On Wed, Jul 19, 2017 at 3:02 PM, Philipp Winter wrote:
> On Wed, Jul 19, 2017 at 01:43:32PM -0500, eric gisse wrote:
>&g
Is there any notion of doing a sort of automated testing for things
like this that can be easily proven?
On Wed, Jul 19, 2017 at 12:36 PM, Philipp Winter wrote:
> On Wed, Jul 19, 2017 at 04:59:13PM +0200, carlo von lynX wrote:
>> Hey out there.. I had two more attempts
>> from 'coriandolino' to
"I can't imagine why nobody takes something called dogecoin seriously"
On Sun, Nov 2, 2014 at 12:04 AM, Артур Истомин wrote:
> On Sat, Nov 01, 2014 at 07:50:24PM -0700,
> bm-2cuqbqhfvdhuy34zcpl3pngkplueeer...@bitmessage.ch wrote:
>> Please stop doing masked advertising to this mail list.
>>
>> W
On Sat, Nov 1, 2014 at 3:22 PM, Mirimir wrote:
> On 11/01/2014 02:22 AM, grarpamp wrote:
>> I would never use this unless you were actually censored from
>> accessing facebook via clearnet. All it will do is serve to officially
>> tell facebook that you are a tor user that FB can then further
>> d
t; as default, its own public IP. Now this node exchanges information
> with .onion peers and clearnet peers simultaneous just fine,
> broadcasting the information from Tor hidden peers to clearnet peers.
>
>
> On 10/28/2014 7:18 PM, eric gisse wrote:
> > To that end, I setup
To that end, I setup a bitcoin node that listens on the v4/v6 internet as
well as tor.
The hidden service address is dsyadrvivtt34s26.onion
Could some folks please test this for me and make sure it works for others?
I can see it is quite happily running on v4/v6 (and getting traffic) but
its' les
11 matches
Mail list logo