On 1/13/22, nusenu wrote:
> Since tor-talk is apparently going to be closed down soon [1],
> here are a few suggestions:
>
> [1] https://gitlab.torproject.org/tpo/community/support/-/issues/40057
>
> let us know whether/when you will be closing tor-relays as well
https://lists.torproject.org/pipe
> Yes, VoIP via UDP works very well through Tor with OnionCat. However,
> both endpoints must be running Tor and OnionCat. Basically, all devices
> running Tor and OnionCat have IPv6 addresses in the same /48 subnet. So
> any such device can connect with any other.
> But _not_ with any other IPv6 (
Voice and video conferencing apps can and do
work over I2P, Tor, Phantom, etc.
Use the lowest quality, bandwidth, window size,
frame rate, etc settings possible.
UDP and IPv6 can and do work over all three of the above networks.
With .onion (.i2p) use OnionCat (GarliCat) to enable UDP and IPv6.
Se
https://i.imgur.com/WGothto.jpg
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
https://trac.torproject.org/projects/tor/ticket/6256
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 2/20/20, Robin Lee wrote:
> I'm wondering how hidden a hidden service actually is?
> ...
> Is it just a function of time and amount of traffic, i.e. the longer
> you are online and the more traffic you generate, the more probable it
> is to discover the true ip-address?
Time and traffic are el
On 2/17/20, Mirimir wrote:
> On 02/17/2020 05:16 AM, Roger Dingledine wrote:
>> But I'll turn it around, and point out that many systems (e.g. most VPNs)
>> are centralized, that is, the number is 100 percent.
>
> Yes, a VPN service is for sure 100% centralized, regarding ownership and
> managemen
>> On 13 Feb 2020, at 22:05, zwiebeln wrote:
>> Would you place your secrets or in worst case make your life
>> depended on a network that is 21 percent controlled by a single person
>> that you don't know?
>>
>> https://nusenu.github.io/OrNetStats/allexitfamilies
>>
>> I think we should start an
Try reading through the control spec for mapaddress here...
https://gitweb.torproject.org/torspec.git/tree/
Can also search for cached descriptors or consensus
in that whole doc set, and in the torproject site and
lists for exitlist, tordnsel, relay fingerprints, etc.
--
tor-talk mailing list -
https://www.technologyreview.com/s/615163/a-dark-web-tycoon-pleads-guilty-but-how-was-he-caught
https://twitter.com/techreview/status/1226212530856611840
https://www.courtlistener.com/recap/gov.uscourts.mdd.451238/gov.uscourts.mdd.451238.57.0.pdf
https://www.courtlistener.com/recap/gov.uscourts.mdd
Just grab all the exit fingerprints from consensus and
MAPADDRESS them via controller however and whenever you want.
There were some exitlist parsers you can search for to do that,
or deal with bigger frameworks like stem.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
On 12/16/19, Jason Long wrote:
> Hello Tor Team,
> I read some articles about Tor security and some of them said that if the
> governments see your real IP address then they can't see
> the Tor traffic or websites that visited by Tor and if they can sniff Tor
> traffic then they can't see your rea
> Facebook has started hosting and linking images and media on a clearnet
If true, this split horizoning should be quit,
not least for breaking security and access
expectations about onions.
> This is not necessarily the case. There exist threat models (e.g.
Cert fingerprint pinning, onionland
On 12/10/19, George Kadianakis wrote:
> As a final note and as my personal opinion, I don't think onioncat
> support is gonna stop v2 deprecation. v2 addresses are 80-bit and can be
> literally brute-forced and impersonated with the current human
> technology, so their deprecation is already too l
On 9/16/19, s7r wrote:
>> P2P type of applications start to break down
> What do you mean here? I guess you mean P2P type of applications s tart
> to break down when the host / user count grows beyond 10 or so _only
> when OnionCat is used with HSv3_, right? Why is that exactly?
No, provided you
https://virgil.gr/
https://twitter.com/virgilgr
#FreeVirgil
Adopt Distributed Privacy Cryptocurrencies
https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-arrest-united-states-citizen-assisting-north-korea
https://www.justice.gov/usao-sdny/press-release/file/1222646/download
htt
> Try running "torsocks --isolate youtube-dl", it will select different
> circuit on each run.
That is often not as useful for this class of problem
as users may think. One enhanced option to address
this was ticketed over 7 years ago in #6256.
ytdl is command line, however it is not too hard to
On 11/15/19, d...@foundingdocuments.org wrote:
>> …seeing ads start popping up in the Tor sites I visited
> The author is not clear enough if “Tor sites” means .onion sites or sites
> accessed through an exit node.
Both onionland and the Internet are full of advertising.
At least part of onionla
On 11/8/19, Joe wrote:
> I'm sure it's a moving target trying to figure out what some sites are
> doing wrt Tor.
> Google changes its yt coding constantly so "youtube browsers /
> downloaders" don't work.
For most services there is some workaround.
And chances are if there isn't, the services of
On 11/7/19, Joe wrote:
> Often the new exit circuits countries are the same as the one they
> complained about
> getting a lot of requests from certain exits
Well tor tends to focus weight on some exits,
so NEWNYM circuit not always work to avoid
"Too Many Requests" type of braindead censoring.
On 11/7/19, bo0od wrote:
> use invidio.us or invidious instances.
https://github.com/omarroth/invidious
https://github.com/omarroth/invidious/wiki/Invidious-Instances
Cool, but don't want to soak up some nice volunteers
proxy bandwidth/$ on unimportant cat videos, so will
wait for Google's YouTu
WARNING: unable to download video info webpage: HTTP Error 429: Too
Many Requests
"Sorry for the interruption. We have been receiving a large volume of
requests from your network.
To continue with your YouTube experience, please fill out the
impossible to complete and broken form below, and termina
> Very odd naming convention.
There have been such constructions, as well as
other sorts of observables and lackof sufficients therein,
observed and mentioned for decade as project for whoever
wants to take up. Yet there is still no opensource node
analysis and subscription project.
--
tor-talk m
https://www.youtube.com/watch?v=MrqiYCOvoHs
Generally speaking...
There's more big picture for tor, for all overlays...
than just as tools to surf the web, lots more
you can plug into them than just a downloader,
much more to discover than on the surface TV.
And with cryptocurrencies being overl
On 9/15/19, Bernhard R. Fischer wrote:
> The article shows, that it is possible to use OnionCat with HSv3,
> although v3 kills the full automatic addressing method.
> For having a full automatic addressing (i.e. association between v3-id
> und IPv6) some kind of lookup mechanism is necessary.
Rig
On 8/20/19, Bernhard R. Fischer wrote:
> I finally wrote a HOWTO on using OnionCat with v3 hidden services. I
> also did some patches to OnionCat to have a better integration.
>
> https://www.onioncat.org/2019/08/onioncat-and-tor-hidden-services-v3/
Thanks.
Rather than tor killing off v2 onions
On 9/12/19, Maria Xynou wrote:
> https://ooni.org/
> OONI Explorer is an open data resource on internet censorship around the
> world.
This has always been an interesting project in
the general field of network observatories. Thanks.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To un
On 8/28/19, Florentin Rochet LAZILY
TOP POSTED AND BLOCK QUOTED:
> This list is mixing good papers with several dubious ones.
Failed to denote which, and why in detail such
labels may or may not apply to them.
> I find important to mention that it would be better looking here instead
> for non-e
https://news.softpedia.com/news/mozilla-firefox-could-soon-get-a-tor-mode-add-on-526774.shtml
https://www.zdnet.com/article/new-mirai-botnet-lurks-in-the-tor-network-to-stay-under-the-radar/
OSINT Analysis of the TOR Foundation
https://arxiv.org/pdf/1803.05201.pdf
Tempest: Temporal Dynamics in A
Lot of talk on tor tech itself, but little on tech as
enabling a range of potential futures for history that
encrypted censorship resistant overlay communication,
social and transaction networks as a whole can
help liberate in conversation... without those
spanning from Zimmerman to overlays to now
On 7/22/19, Alec Muffett wrote:
> "Why & How you should start using Onion Networking"
> https://www.youtube.com/watch?v=pebRZyg_bh8
A fine introduction.
Yet how do people, including those involved with or using other
projects in the space, compare contrast and evaluate this with
"Why and how sta
Dumb Sybil comes in noisy all at once, Smart Sybil sneaks in
1/week until you're 0wn3d. Tor's been around for over 15y.
No one's ever analyzed for that...
Anyhow, send this comedian to bad relays until
they at least emit MyFamily.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubs
Expanding from...
https://lists.torproject.org/pipermail/tor-dev/2019-June/013890.html
On 6/17/19, Hans-Christoph Steiner wrote:
> I was an early proponent of crypto currencies, but now it is clear to me
> that they do more harm than good by a long shot.
Lacks specifics.
> And this is really of
On 6/9/19, Roger Dingledine wrote:
> On Fri, Jun 07, 2019 at 01:01:38PM +, iwanle...@cock.li wrote:
>> Can Directory Authorities analyze hostnames of relay users and publish
>> them?
Yes. Lots of interesting and "safe" analysis can be done.
As to a different question... being too few and cen
>>> why are there so many tickets which are open since years without any
>>> visible progress? Will they ever be solved or were they forgotten by
>>> its owner?
>>
>> no activity generally means no one wants to fix it as of now or there
>> are more important issues to look after.
>
> For example, i
On 05/23/2019 02:39 AM, Wallichii wrote:
> On Thu, 23 May 2019 04:15:36 -0500
> Conrad Rockenhaus wrote:
>
>> a free VPN service... to allow users that are blocked... to access...
>
> not everyone is going to trust
> someone on the internet giving
> free proxy
So what exactly do people think tor
On 05/23/2019 02:39 AM, Wallichii wrote:
> On Thu, 23 May 2019 04:15:36 -0500
> Conrad Rockenhaus wrote:
>
>> a free VPN service... to allow users that are blocked... to access...
>
> not everyone is going to trust
> someone on the internet giving
> free proxy
So what exactly do people think tor
See reply on subject here...
https://lists.torproject.org/pipermail/tor-talk/2019-May/045201.html
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>> On May 23, 2019, at 4:39 AM, Wallichii wrote:
>>
>> On Thu, 23 May 2019 04:15:36 -0500
>> Conrad Rockenhaus wrote:
>>
>>> I’ll be starting a free VPN service soon to allow users that are
>>> blocked from using Tor at their location to access Tor. To prevent
>>> abuse of the service, I plan on
>> On May 23, 2019, at 4:39 AM, Wallichii wrote:
>>
>> On Thu, 23 May 2019 04:15:36 -0500
>> Conrad Rockenhaus wrote:
>>
>>> I’ll be starting a free VPN service soon to allow users that are
>>> blocked from using Tor at their location to access Tor. To prevent
>>> abuse of the service, I plan on
>> On May 23, 2019, at 4:39 AM, Wallichii wrote:
>>
>> On Thu, 23 May 2019 04:15:36 -0500
>> Conrad Rockenhaus wrote:
>>
>>> I’ll be starting a free VPN service soon to allow users that are
>>> blocked from using Tor at their location to access Tor. To prevent
>>> abuse of the service, I plan on
Everything also here...
https://dist.torproject.org/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 5/17/19, Memory Vandal wrote:
> Are client connections to a hidden service .onion address that do not
> disconnect for hours safe?
>
> It may be a big file download or multiple keep-alive transactions that uses
> the established connection over and over for lets say few hours.
>
> If its not sa
Some other segments often referenced...
https://2019.www.torproject.org/docs/faq.html.en#HideExits
https://2019.www.torproject.org/docs/faq-abuse.html.en#Bans
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bi
Adding this to the collation of potential approaches already
posted...
Blinded Tokens for CloudFlare...
https://github.com/cloudflare/challenge-bypass-specification.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.or
On 5/7/19, nusenu wrote:
>
> juanjo:
>> Tor relays are public and easily blocked by IP. To connect to Tor
>> network users where Tor is censored have to use bridges and even PTs.
>> But, what happens on the exit? Many websites block Tor IPs so using
>> it to access "clearweb" is not possible. Shou
On 5/7/19, Van Gegel wrote:
> the problem of keeping of a hidden service after periodically changing the
> IP provided by the mobile operator as well as when switching between Wi-Fi
> and a cellular network.
> In such a case Tor should detect that the used circuits have become
> unavailable and b
I posted the major look-and-feel transition dates earlier.
There are some incomplete bits of the website in gitweb.tpo.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 5/2/19, grarpamp wrote:
> Node location, payment, OS, ISP, uptimes, anon / nym / PGP / GovID,
> workplace, politic, blogs, whatever else you can imagine,
> including incorporating what's already in the consensus, contact,
> MyFamily, nickname, both real world and virtual inf
On 5/2/19, Herbert Karl Mathé wrote:
> I strongly believe certain issues need be brought up into conscious, and
> into presence: into discussion, actually.
>
> Therefore appreciating this as it might fit too well into context
>
> Keeping things below surface, or trying so, has too often proven to
If you own the windows box, then either
- install FreeBSD or Whonix or Tails on it and use Tor
https://www.freebsd.org/
https://www.whonix.org/
https://tails.boum.org/
And make some donation to the one you like.
- or install some new windows and this
https://www.torproject.org/dist/torbrowser/
On 4/17/19, Seby wrote:
> Here we go again...
Not really different than all the quasi or non profit
tor node groups posting their news now and then.
Nos onions, torservers, emerald onions, noisebridge, etc.
Hey look at me, join us, give us money, we're doing stuff, etc.
So long as it supports the
> is it safe so onion IP won't be disclosed?
Whenever someone cuts, dos, or boots the box, it panics,
etc... all sites services on it are correlated together.
Webserver daemon, kernel, and VM exploits exist.
"Safe" means you probably do not want to be running it on
the same box, or account, paym
> global adversaries
> "they don't likely exist, or if they do, they're our friends"
Highly capable Global Adversaries are well known to exist.
TOP SECRET friends may perhaps be the friends of few, often
end up generally corruptive, less than stellar, an uncertainty, etc...
thus really shouldn't
Various wrote:
> Community Council's
In the world... beware creating, or subjugating oneselves to,
or continuing on with, such things as Governments... history
shows all preserving bias to themselves, and end up failing, in part
or whole, while often screwing you and [mass] others over, in all
man
On 4/7/19, Paul Templeton wrote:
> You can now get a report from the AU Government on there assessment of
> 'going dark' They recognize there are legitimate reasons to using Tor...
https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Law_Enforcement/NewandemergingICT
https://www.aph.gov
> https://www.youtube.com/watch?v=4DJAWGXkvq8
> https://fosdem.org/2019/schedule/event/tor_project/
> https://news.mit.edu/2015/tor-vulnerability-0729
> https://www.youtube.com/watch?v=g7YCbYe7lO8
> https://en.wikipedia.org/wiki/Dark_web
> https://en.wikipedia.org/wiki/Darknet
> https://www.youtube
Bootstraps and kernel must get loaded and executed.
All [writeable] hiers can be either mounted off media,
or ramdisk, or NFS iSCSI darknet etc, and encrypted or not.
Some systems mount the media as rootfs for userland,
others copy it to ramdisk and pivot root to that.
You can still bundle in or ap
> why adversaries should finance tor project and publicly it if they have
> a malicious intent?
Why do adversaries do that to their opponents?
Because it's a simple and effective diversion operation.
Nor is it dependant upon whether any "malicious intent".
Adversaries often fund their opponents to
> If the state is out to get you I'd just assume that everything arround you
> is rooted and a wire tap and act accordingly.
Doesn't have to be anyone doing anything wrong.
Anyone following geopolitics knows that surveillors
can reap just aggregate spying and turn that into
realtime influence mess
Most people don't need "bookmarks" if the nets
they're on have search portals they can safely use.
For more sensitive needing non local storage...
people routinely store their own encrypted blobs
on the overlay networks be it web file hosts,
or more exotic stores like IPFS, Tahoe-LAFS,
MaidSafe, b
On 4/1/19, Tom A. wrote:
> Hi Grar
> like to help you with questions that one can answer, just ask, trying to
> share some testings and learnings.
> you have a certain view, there is no goal, just telling others who seek
> info about sharing good practice experience.
> Regards and have a great wee
> Search "BasUSB"
typo, "BadUSB".
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 3/29/19, npdflr wrote:
> I am giving a scenario: (Devices: PC Hard Disk having important files for
> offline use, USB Device for data transfer and Mobile Device which has
> internet connection)
>
> 1. I have a hard disk that is offline (Linux OS).
> 2. I use a mobile device for internet, gather
On 3/28/19, dns1...@riseup.net wrote:
> I think you are affected by cognitive bias.
Tor is effected by lack of external thought.
> You are blindly looking only for bad things.
Your adversaries are assuredly looking at those things and more.
If you are not looking at them, you're done in mate.
"
torproject.org frontpage
"
"
DEFEND AGAINST SURVEILLANCE
Tor Browser prevents someone watching your connection from knowing
what websites you visit. All anyone monitoring your browsing habits
can see is that you're using Tor.
"
This is false [1], and intentionally preloaded
with [use case and
https://www.zdnet.com/article/top-dark-web-marketplace-will-shut-down-next-month/
https://www.europol.europa.eu/newsroom/news/global-law-enforcement-action-against-vendors-and-buyers-dark-web
https://www.fbi.gov/news/stories/j-code-operation-sabotor-032619
https://www.dea.gov/press-releases/2019/0
> Secure laptop advice? / Smartphone purchase advice ?
Obviously buy only unlocked carrier independant phones
cash upfront no financing, fuck the carriers. Bonus is they
won't come preloaded with carrier blingware, only
manufacturer blingware.
Most of the manufacturer warez can be avoided with...
Repost from 8 Mar:
> https://twitter.com/xychelsea
> https://twitter.com/resistschelsea
> https://twitter.com/wikileaks
> https://collateralmurder.wikileaks.org/
>
> Free Chelsea.
>
> Wake up.
> End this State of affairs worldwide.
Direct coverage...
https://www.youtube.com/watch?v=DZ_lOXIoFKI
htt
On 3/11/19, hi...@safe-mail.net wrote:
> They're basically talking about eliminating criminal activities facilitated
> online by the darknet, by making Tor and the dark web illegal and
> inaccessible
> in Europe. It was also stated that most of those who access the dark web are
> actual or potenti
> Interesting, How could you tell?
Same as any other service, try it.
> What node is this?
Best confirm with them.
bshc44ac76q3kskw.onion
is also up
> This is precisely why we need them because direct clearnet access in
> Whonix is not an option.
Using whonix is a local and reasonable choice,
On 2/3/19, procmem wrote:
> Does anyone know of Mixmaster remailers that are hosted on v3 onions?
Search for and survey known remailers.
Maybe some will offer it as result.
> The ones we currently have listed in Whonix are:
> k54ids7luh523dbi.onion
down
> gbhpq7eihle4btsn.onion
up, and exist
On 1/24/19, Alec Muffett wrote:
> On Thu, 24 Jan 2019 at 19:33, grarpamp wrote:
>
>> As readers may be aware,
>> Tor has an interesting capability via OnionCat and OnionVPN
>> ...
>> There's an open project for anyone who wants it...
>> To bring IPv
On 1/24/19, Christian Huitema wrote:
> If you want real integration with IPv6 addressing, the crypto systems
> can really only use 64 bits. The top 64 bits are claimed by the routing
> system, and the network providers just won't let you put something
> arbitrary there. That's a big issue, because
>>> > When we communicate with strangers, we can use the following
>>> > handshaking protocol.
>>>
>>> So here, you only accomplish confidentiality toa stranger. But you
>>> have no idea which stranger.
>
>> This is to achieve end-to-end encryption without CA.
>>
>> Prove a specific identity with a
> * To watch the Full Movie
> https://kissanime.ac/Anime/Detective-Conan-Movie-22-Zero-The-Enforcer-Sub.77113/Movie?id=148813&s=oserver
infohash:B0C52F853E125A5C6D793496BF5BAE38798F91C7
infohash:D063F882ABD1DF844102B7336DB13D2A91B639BE
--
tor-talk mailing list - tor-talk@lists.torproject.org
To u
On 1/4/19, V wrote:
> "crypto" "security" "sofware dev" "support" fud re v2
"Hey, here's v2, it uses older crypto and mechanics that
are not as robust etc as v3... However v2 offers useful features
for many users, and those features are not yet available in a
newer design (volunteers to create so
On 1/4/19, teor wrote:
>> Node operators (tor-relays) would continue offering
>> v2 HSDir support module until such time as the reasons
>> for choosing v2 by those above are supported in v3 or vN.
>
> It's not just about feature parity.
Right. Feature parity is nice and excellent goal, till
then,
> On 1/1/19, Fabio Pietrosanti (naif) - lists wrote:
>> a volounteer-non-profit
>> collaborative torrent forum/site with their future-looking upgrades of
>> infrastructure.
>> I would love them to bring all their public forum
>> and public tracker on Onion,
>> while exporting their +160k releases
On 1/1/19, Fabio Pietrosanti (naif) - lists wrote:
> i'm supporting with some technical analysis a volounteer-non-profit
> collaborative torrent forum/site with their future-looking upgrades of
> infrastructure.
>
> I would love them to bring all their public forum
That's just webwork.
> and pub
> Port 22 is ssh, so turning it off would mean your relay won't be the exit
> point for helping people reach their ssh servers while protecting their
> communications metadata. Exiting to port 22 is a helpful thing to do
Yes.
> Port 465 is for secure mail delivery,
> which probably doesn't work s
> relays have a rather distinct signup and fingerprint pattern
> usually seen for onion attacks.
> ...
> a) If you are an .onion operator I'd like to encourage you to switch to onion
> services version 3
> ...
> so we can start
> ...
> b) dropping onion version 2 services eventually.
These are two
> latest code base I see the string "Your Guard" recurring.
>
> Does this string actually refer to a Guard the user is responsible for
> operating and maintaining?
No, the "user" ie client doesn't "operate and maintain" any
type of node or guard by default.
> Or does it refer to the guard the Tor
> Imagine that an .onion site is compromised. This could be by the owner who
> wishes to expose visitors or by the police who want to target the
> clientele.
> How would it
> be possible for a visitor to be in danger?
Other posts covered technical code exploits.
Other risks are trust changes...
> Tutanota open sourced their client. You could use the source and run your
> own version of the Tutanota client if that's your threat model. It's true
> the email provider could serve different users different versions of the app
> and there is no possible way to audit it in real time
A standalon
> instead of continuing to throw [government] money
Sorry, didn't mean to imply it was theirs...
https://www.youtube.com/results?search_query=taxation+is+theft
Carry on.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torprojec
> - I2P can be attacked with far less resources than Tor;
Moot when $10k is probably enough to Sybil at least
some small fraction of either of them.
> - Tor is deeply researched and various attack types and problems have
> already been solved;
So if Tor is done, why don't you start writing grant
>> I was curious for Monero dev's rationale to pick I2P over Tor
>> Whatever I've seen online doesn't strike me as particularly convincing.
Same could be asked of Zcash strong cryptographic ZKP style
currencies users often using Tor. As well as a handful of other
cryptocurrencies explicitly advert
In a thread...
https://lists.torproject.org/pipermail/tor-talk/2018-December/044709.html
on...
> http://kgg2m7yk5aybusll.onion/
> http://axqzx4s6s54s32yentfqojs3x5i7faxza6xo3ehd4bzzsg2ii4fv2iid.onion
(noting that all onions can be physically located by determined
adversaries, thus failing another
[Typo in onion list address, fixed and resent herein]
> The descriptors seem to indicate onion addresses. So if I act a relay, I
> seem to be able to get the addresses. Then how? ... Could someone
> skilled try to get the lists? :D
Yes, many services, researchers, and privates routinely do this.
> with OnionCat to yield IPv6 and UDP transport among tor's P2P
> That's simply not possible with v3's no-IP TCP only onions.
That is to say, it's not possible with code that exists today...
the various possible solutions, and others yet to be proposed,
that could provide those things with v3 onio
> The descriptors seem to indicate onion addresses. So if I act a relay, I
> seem to be able to get the addresses. Then how? ... Could someone
> skilled try to get the lists? :D
Yes, many services, researchers, and privates routinely do this.
The code exists in some repositories, or you can write
Use "relay search" from this page...
https://metrics.torproject.org/
Nickname is not unique, so use fingerprint instead.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
You could likely remove the ones not mentioned
in torspec or the tor code, most of which are deprecated,
and potentially add compatibility for these tls 1.3 suites
from openssl 1.1.1 in case tor goes adds them later,
so long as current tor does not reject hello's with them...
TLS_CHACHA20_POLY1305
From: damieng...@tutanota.com
Ever wonder what's on Freenet? If you're curious, there's a public
FProxy webGUI at:
http://gel2bzjxrvcmqpji.onion:/
It's part of a darknet on the Tor OnionCat IPv6 overlay network. The
other 20 peers are listed here:
http://zerobinqmdqd236y.onion/?ceffbd4a36f954e
If you need to move UDP (or any other non-TCP protocol, including
raw IP) across tor today, you can use OnionCat or OnionVPN.
They work fine and automagically.
Obviously those are also the only available solution
for testing and using QUIC with tor today, other than
running VPN over tor out to cle
> Yeah, one of the complete bullshit things. I get around 200 emails per day
> like this one:
>
> Protocol: BITTORRENT
This should tend to diminish when you begin creating and
showing people how to use filesharing and distributed storage
protocols operating entirely within the various encrypted
an
>> I'm planning to shut down my Tor network status site within the next
> Enormous thanks for all your work Olaf.
> (and if I remember correctly, you did run a heavy exit for many years in
> the past also..)
https://www.youtube.com/watch?v=Qmxd7GWWP_k
--
tor-talk mailing list - tor-talk@lists.t
> Tor prevents people from learning your location
There are published attacks that can and do result in
location determination. So "prevents" is a false word here.
And unfortunately it's still advertised right top of the front page:
https://www.torproject.org/
"Resists" or "makes harder / costlie
On 10/23/18, Iain Learmonth wrote:
>> [from other threads]
>> Bittorrent users
> This is an area with a lot of open research questions.
As to width, not really. As before, for the forseeable future regarding
the cost to generate collisions into 2^80 compared to the planet's
population, Bittorre
1 - 100 of 1251 matches
Mail list logo