if you can at all, try to get a hoster outside of USA, UK and Germany.
those are the countries with the most nodes right now, iirc, and the
further we spread this around, the better for everyone.
my small middle relay is hosted at colorhost.de, they have very cheap
VPS slices (starting at 2€/month
Juan Garofalo:
> For what it's worth : trying to have a diverse and big user base, and
> providing security for all users seems to be impossible. You either provide
> relatively good security for a small number of sensitive users, or relatively
> lax security for 'general' users.
i hav
this may be a bit of a tangent to your firefox/TBB exploit question, but
it is an answer regarding the validity of TOR:
TOR is not designed to withstand global passive attackers. it tries to
select relays from different AS to create circuits that leave the area
of influence/surveillance of local p
basically, what happens is this:
there are firms (or even government entities) that play along in the
bittorrent filesharing of copyrighted material on behalf of the
copyright owners to learn the other participants of the torrent swarm
(since bittorrent is a peer-to-peer file transfer protocol, yo
the way the TBB creates anonymity may not be very intuitive, but it does
work. at least as long as you do not identify yourself to a website that
will link your voluntarily given identity to the series of throw-away
cookies TBB leaves with trackers (ohai facebook, i guess).
popular securtiy/privac
this may be somewhat tangetial to the issue at hand, but these tutorials
for installing Backtrack on USB with an additional (encrypted) partition
for persistent storage might be a starting point for a DIY solution.
http://www.infosecramblings.com/backtrack/
On 20.02.2012 22:38, Ted Smith wrote:
>
i tend to agree, but i guess theres several things to keep in mind:
- Usability. Ghostery is _very_ user friendly, but still it can break
widget based sites, e.g. iGoogle.
- Endorsement. If a Plugin is included into the TBB, that may be
considered as "the Tor guys think this is very safe!"
i run
On 02/10/2012 02:34 PM, Roger Dingledine wrote:
> On Fri, Feb 10, 2012 at 10:30:21AM -0300, Javier Bassi wrote:
>> I'm running a middle node, should I switch?
> If you have to choose, I'd say stick with the middle node. After all,
> we need there to be a robust fast Tor network for people to get to
On 02/10/2012 05:01 AM, Gramps wrote:
> Phillip wrote the following on 02/09/2012 06:33 PM:
>> I've had the same problem when I routed my e-mail client to send
>> everything through Tor (via SSL/TLS of course ;))... When I logged on to
>> Gmail (and Facebook for that matter) via the web interface,