Hi all,
I would like to share our paper: "NavigaTor: Finding Faster Paths to
Anonymity" in which we propose and evaluate methods to measure and improve
performance in the Tor network. To this end, we developed a measurement
software which includes a custom path generator and allows conducting l
On Thursday 03 July 2014 11:06:15 Bron Taylor wrote:
> p accept 25,110,119,143,443,465,995
> "252.94.2.188.25.27.196.125.74.ip-port.exitlist.torproject.org. 1799 IN
> A 127.0.0.2" from Google Public DNS. Moreover, the answer from TorDNSEL
> told that the node with the ip address "188.2.94.252" is
On Saturday 17 May 2014 16:59:23 Clare ♬ wrote:
> I'm setting up a Tor-based isolating proxy using the 'Anonymizing
> Middlebox' iptables rules specified here:
> https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy i.e.
> iptables -t nat -A PREROUTING -i $INT_IF -p udp --dport 53 -j R
On Wednesday 12 March 2014 04:30:42 grarpamp wrote:
> Given current onion discovery mechanics as in the paper, public vs.
> private is defined largely by the access restrictions operators put
> up, not by whether they posted the address somewhere or not.
> (descriptor-cookie and stealth auth may ha
On Monday 10 March 2014 19:37:25 grarpamp wrote:
> > http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
>
> Do you seriously think that reporters, aid workers, freedom
> fighters, investigators, whistleblowers, and simple chatfriends,
> etc are going to publish their onions for all to se
On Tuesday 06 August 2013 13:06:54 Lunar wrote:
> ra:
> > On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> > > Thank you. I ended up stopping tor, deleting everything in
> > > DataDirectory/, and starting tor. It's crude, but it works.
> >
> > I
On Friday 23 August 2013 20:56:09 scar wrote:
> hello i would like to use Skype from my Tor exit node (which is running
> Linux) but, for whatever reason, the powers that be at Skype have banned
> my IP address.
Skype blocks all Tor exit IP addresses since end of June 2013.
Best,
Robert
signatu
On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> Thank you. I ended up stopping tor, deleting everything in
> DataDirectory/, and starting tor. It's crude, but it works.
I implemented a ctrl-command for dropping all guard nodes[0]. If it is
possible for you to patch the Tor client, the patch m
On Tuesday 06 August 2013 02:34:05 mirimir wrote:
> Thank you. I ended up stopping tor, deleting everything in
> DataDirectory/, and starting tor. It's crude, but it works.
I implemented a TorCtl command for dropping all guard nodes[0]. If it is
possible for you to patch the Tor client, the patch
On Wednesday 17 July 2013 15:19:20 Karsten N. wrote:
> Flash may be used to compute a unique fingerprint of a surfer IMHO.
> It does not break the anonymity by self if it was correct proxyfied, but
> it may help to break the anonymity.
Many attributes can be used to compose a unique fingerprint. T
On Wednesday 17 July 2013 12:30:16 Andrew F wrote:
> The real question is about flash. They say that flash sites, including
> youtube and other "tube" sites work.
> Do you no of a way to use flash safely with tor and Ubuntu?
> I don't.
Virtual Machines can be used to use Flash with Tor securely I
at
being a "Tor workstation" so it might be a good idea to try to make it fit into
the virtualization concept - although VirtualBox does not support
exporting VMs to OVA including a ISO by now.
[0] https://github.com/ra--/Tor-gateway
[1] https://github.com/ra--/Tor-gateway/wiki/Todo
[2]
12 matches
Mail list logo