Hello,
The signature file here:
https://dist.torproject.org/tor-0.4.7.10.tar.gz.sha256sum.asc
Has two signatures, one from an outdated key (expired in 2020) belonging
to Nick Mathewson (2133 BC60 0AB1 33E1 D826 D173 FE43 009C 4607 B1FB) and
the other I can't find anywhere: 11F4 8D36
Wh
wrote:
On Mar 30, 2022, at 10:36 AM, Alessandro Donnini via tor-talk
wrote:
Hi,
I apologize in advance if this question (see below) was asked (and answered)
previously. I could not find any information on it.
I would like to incorporate a proxy server in my Androd app to perform gate
kee
vides an HTTP Proxy for connecting web browsers and
other HTTP client applications into the Tor SOCKS interface. ..."
Could (a modified) Orbot be used as a device-based proxy server without
interfacing with the Tor network?
Thanks for any thoughts and suggestions about this,
Alex Donn
connection*. I assumed Tor would keep a tunnel open to one guard node,
and that each new session/connection would pass through it.
*In hindsight this I should've only done the GET requests inside the loop.
Here's the script I was running:
https://gist.github.com/maqp/0e5dcf542ebb97baf98d19
Hi,
Yikes, I wonder if this is my fault.
I've been experiencing weird behavior with Tor + Stem + Flask Onion
Services dying randomly once every 1..5 days. I wrote a script that's
making connections to a test an Onion Service to see when exactly the
servers disappear -- and cre
Yes, run Anonsurf on Linux, Tallow on Windows or some other software that
allows you to route your whole system through Tor and than configure your web
browser to use a proxy.
Poslano sa ProtonMaila
Izvorna poruka
Dana 10. sij 2022. 12:27, Matt via tor-talk napisao/la
Hello,
Is there a way to have HTTP(S) content run through Tor then through a
proxy (HTTPS or SOCKS). For example:
a) Run Tor (entry node, middle node, exit node).
b) In browser (TBB or any other browser) set the proxy settings to a HTTPS
or SOCKS proxy.
c) Connect to a site.
So:
a) website
Dear Tor community,
I came across a post on the Whonix forum recently. Since I am also interested
in this question I copied it here:
https://forums.whonix.org/t/math-behind-honest-tor-nodes/12464
http://forums.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/t/math-behind-honest
inced
a
German authority to stop blocking the access to their website via
Tor.
I'm sure it was on one of the torproject mailing lists and this one
seems
the most likely.
Could anybody please send me the link again? Sadly I didn't bookmark
it and
it's no longer in my inbox.
do you
would have been quicker, too.
> What, if anything, would I need in a torrc to only get US (or non-EU)
> exit nodes?
A quick internet search leads you to ExitNodes and ExcludeExitNodes
directives.
https://2019.www.torproject.org/docs/tor-manual.html.en#ExcludeNodes
See for instance thi
l ... thanks for the Info.
From a UX perspective its clumsy, because it occupies space that could
be used, otherwise. I prefer the old approach (warning before maximising
tor-browser). The gray letterbox catches my attention. Maybe a different
color, resizing behaviour (e.g. docking to letter boxes)
y
You have a Security Clearance but you don't specify what type but I wonder why
someone with a SECURITY CLEARANCE would want to work with Tor
Teor called you out months ago as a US Government Spy and I'm glad that the Tor
Community Council is calling you out with. People can
Interesting.
https://notabug.org/themusicgod1/cloudflare-tor/src/master/what-to-do.md
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
My guard is Geoff2 and is failing lots of circuits. Looked it up on tor
atlas and found this
https://metrics.torproject.org/rs.html#details/C66F6BA1877D12F5EE4BCCABF3FC0BC1499C4248
Anyway that I can configure Tor so as not to use nodes with the not
recommended flag (without having to resort to
tal
--gtk-debug=FLAGS GTK+ debugging flags to set
--gtk-no-debug=FLAGS GTK+ debugging flags to unset
Application Options:
--display=DISPLAY X display to use
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.tor
Hello!
I'm looking for a tool to replace my use of the deprecated/unmaintained vidalia.
Do you know of any tool that:
- displays tor circuits and the streams attached to it?
It is not required to display them on a map, but it should display the 3
nicknames with
country information an
Hi,
is there a official meek-client package for debian available?
Regards
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
es/156555-csis-murdering-ring-cia-operation-russia.html
(banned user)
http://www.scienceforums.net/topic/94483-unification-theory-postulates-and-thought-experiments/
(thread closed by moderator)
Tor-talk is a mailing list specific to Tor. Maybe this is not the best
mailing list for what you need. I
6Mbps)
RelayBandwidthBurst 8000 KB # But allow bursts up to 8000KB/s (64Mbps).
Do you know why atlas is showing 54 KiB/s, only?
Thanks,
Greetz, yanpsz
--
For those of you without hope, we have rooms with color TV,
cable and air conditioning
--
tor-talk mailing list - tor-talk@lists.torproject.o
e to do to get it to work because it doesn't work "out of the
box" for Mac OS X.
Thanks--
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> Op 17 sep. 2016, om 21:41 heeft Joe Btfsplk het volgende
> geschreven:
>
> On 9/17/2016 11:23 AM, Tor Dev wrote:
>>
>> So the bandwidth is probably not sufficient of your relay.
> @ Tor Dev
> Just curious. I received 14 copies of your above reply with id
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
lay become a HSDir ?
>
>
From the Tor blog:
> Once directory authorities have upgraded, they will “assign the Guard flag to
> the fastest 25% of the network”. Some experiments showed that “for the
> current network, this results in about 1100 guards, down from 2500.”
So the bandwi
On Friday 19 August 2016 13:34:54 Stephan Seitz wrote:
> That’s why I’m shutting down my tor relay fsingtor now.
>
> As long as the project stays that way it is I will no longer recommend
> Tor or support it in any ways. And I don’t think that such a project
> should have any fut
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Sadly, an attack run through tor destined for a uk2 hosting provider is
being met with a null routes for exit nodes under a policy of "wont' be
lifting it any time soon". The group owns several brands spanning data
centers in a varie
Hi,
I know it might be something strange, but still so interesting, you have to see
it here <http://quastugopro.campassure.net/drug.php?dey>
My Best, tor-talk-boun...@lists.torproject.org
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings
Metrics portal shows a drop of around half million direct connecting users:
https://metrics.torproject.org/userstats-relay-country.html
Does someone has a good explanation what happened? The top 5 countries show
the same drop. Is this another botnet that got knocked out?
torland
--
tor-talk
On Sunday 03 January 2016 18:52:29 Nurmi, Juha wrote:
> Hi,
>
> I released refactored new version of Ahmia search engine :)
>
Thanks. It seems that Ahmia does not like adding hidden services with https
URLs.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscri
Hi,
I have my nick registered with OFTC. How do I configure tor-messenger that it
uses the client certificate on connecting to OFTC?
Thanks/regards,
torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi
ice in this mailing list for your
perceived problem (but seem to not have accepted it, being hostile
instead) (IE: getting a separate, portable machine). That really is
the best starting point if you are worried about hardware compromise.
Moving along now, perhaps?
--
tor-talk mailing list -
Or maybe they do realize.
We already know that the NSA/GCHQ do not appreciate Tor (per their own
"Tor Stinks" report included within the Edward Snowden released
content). A process which over time encourages the internet at large
to reject Tor connections (plus makes ISPs generally
e rest of your mail I fully agree.
-n
p.s. I also concur that an ideal network should always have way more
available than used capacity in order to provide a decent level of
service.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
-US/security/advisories/mfsa2015-78/
>
> This one seems specially nasty in the context of Tor. Notice the following
sentence:
> > Mozilla has received reports that an exploit based on this vulnerability
> > *has been found in the wild*.
>
As long as the Mozilla fix is n
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 20.05.2015 05:10, Paul A. Crable wrote:
> I suppose I sound like a disapproving fussbudget, but I have
> trouble understanding how and why we allow TOR to be used this way.
> I'm all for free speech, but it's still illegal to f
On 04/30/2015 09:15 PM, Frederick Zierold wrote:
>
>
> Hi,
>
> I am very curious how a vendor is detecting Tor Project traffic.
>
> My questions is what are they seeing to alert upon? I have asked
them,
> but I was told "that is in the special sauce."
&g
d/or traffic) to
determine everybody else's uses for Tor).
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
is
possible with the type of product you're presenting. "Instantly stop
NSA spying with this powerful software" orly?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
now I think petitioning the existing CA's who have
> policy influence may be a better route.
How about "Let's encrypt"? Are they willing to sign .onion?
Regards,
torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Monday 29 December 2014 09:11:20 Cypher wrote:
> "The client must not be running a Tor router of their own..."
>
> That made me thing of a few questions but I'm specifically wondering
> what they mean here.
>
> 1. Do they mean that it is confusing to the
On 2014-12-26 11:43, Justaguy wrote:
what should happen to these all
Slap 'em all with BadExit flags?
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
I have already a web server running to serve clearnet and I want to
provide access to the same site on the same machine via onion service.
What is the easiest way to do so?
Thanks,
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
ually done". "How it is
actually done" is exactly the critical point, in particular if someone
is trying to declare a plague on all Tor hidden services.
Another possibility, for example - we don't know how well these
darknet sites were set up. If they had the same developer(s
VTJf
HXJesWRalHVt3Wjs51w=
=xD7V
-----END PGP SIGNATURE-
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
zxIzkX2t2b5+AI6hbylxl3/KQaQZRqa65OkM/2h6EEGEyVGc3MACI
RRGbJXsOSPIhzwW1knGfbJ7rOW1Tvu0rDpj7U6Jm5K5YysZGhxYefXljkOo5uuTd
QrF7dS4d7I1ZapS1oi0m
=vnUr
-END PGP SIGNATURE-----
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproj
On 10/12/2014 6:56 PM, subk...@riseup.net wrote:
> [cross-posted on tor-talk and tor-relays]
>
> i've found that the Tor GoodBadISPs list [1] is somewhat outdated on
> current hosts that allow Tor (exit) relays to be hosted. i'm trying to
> find a cheap host that allows
oVhXN6okohrWLzCPo6AXsN+H88L8a9
9KFej5j8/sDr1YA6mLdf
=3AVZ
-END PGP SIGNATURE-
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
The question was whether any users need Tor on Mac OS 10.6, and I made the case
for the users of a new system we are about to announce. Also, all we really
want is the tor executable, not the browser component, but we want it to be
signed by the Tor Project (or an equally trustworthy authority
[Short answer]
As an individual user, I don't need Tor on Mac OS 10.6, but as a developer of a
soon to be released Tor-dependent project I would like to see support continue.
[Long answer]
We are developing a system called HideMeta that relies on Tor and other proven
security componen
Hi,
This work could be of interest for the TOR project.
https://gnunet.org/sites/default/files/ma_kirsch_2014.pdf
Quote:
"TCP Stealth replaces the traditional random TCP SQN number with a token
that authenticates the client and (optionally) the first bytes of the TCP
payload. Client
Hi,
Not sure if that has been discussed yet... the site
torbundlebrowser.org is a almost perfect copy of the TOR webpage and
has a TBB download which has malware in it. (down at the moment)
http://dustri.org/b/torbundlebrowserorg.html
--
Regards
--
tor-talk mailing list - tor-talk
regarding bad-relays discussion should be tighter than even a
closed mailing list, is my thought.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On 7/21/2014 10:40 AM, ttzeqq wrote:
> I am in US.What can I do?
You could try using a VPN before using tor.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
rs addresses will be openly associated with my project (and
I'm not hiding my association with it), so it is fine if the unusual exponent
marks them as such.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 07/11/2014 11:12 PM, Helder Ribeiro wrote:
> 4. Make the Popcorn Time fork also **be a relay by default*
> whenever possible**.
>
> Nobody would agree to do this on the main tor software for a
> thousand reasons, but it's
t;> Date: Tue, 1 Jul 2014 17:55:18 -0400
>> From: grif...@cryptolab.net
>> To: tor-talk@lists.torproject.org
>> Subject: Re: [tor-talk] Illegal Activity As A Metric of Tor
Security andAnonymity
>>
>> Mark McCarron wrote:
>>> Tor was designed to f
hing that you've got.
>
> Your choice.
>
> Regards,
>
> Mark McCarron
All he did was use the word stupid.
-
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
About tor-talk
English (USA)
This mailing list is for all discussion about the
This is wrong in so many ways.
Edward Snowden's info, hand-in-hand with Prism's details, shows how
NSA/GCHQ hates Tor because they can't break it very well. They have to
exploit browser flaws and/or go around Tor to get what they want. If
they owned Tor from the network pe
can be stolen there, and redirected
elsewhere for examination.
Anything going out in plaintext had best not be particularly
de-anonymizing or useful to someone who is sniffing (such as logins
would be), let's just say that.
--
tor-talk mailing list - tor-talk@lists.torproject.o
On 25 Jun 2014, at 11:09 PM, Mirimir wrote:
> ... any Tor user can host a
> hidden service. But few people, even experienced web engineers, know
> enough to do it securely enough. Also, hidden services are far more
> vulnerable than Tor users, simply because they serve stuff.
O
I did run a tor exit with only port 25 blocked, did push 850 tb in 4 months
and did got 3 abuses so far, 3 % bad traffic is much to high i think
Am 25.05.2014 12:11 schrieb "Griffin Boyce" :
> Hi all,
>
> Is there a good reference for the assertion by DOJ that 3% of Tor&
>I'm a bit of a newb at this (all of it). But this email thread
>(tor-talk) is completely unencrypted, right? And it has to be that
>way?
You can see this thread securely using lynx with this URL:
snews://news.gmane.org:563/cacykwb0hzfvsa_k_a6dp4-ppoacjonn+htntlbvxymmrpon...@
Hi,
the metrics page shows that the performance of the Tor network degraded during
the last 7 days from around 1.5 sec per 50kb towards 2 secs to complete a 50kb
request:
https://metrics.torproject.org/performance.html?graph=torperf&start=2013-02-18&end=2014-02-16&source=all&a
On Friday 07 February 2014 09:50:52 Sebastian Hahn wrote:
> The idea is to recommend all versions which aren't known to be bad, so
> that an operator who reads their Tor logs will realize their Tor really
> needs to be upgraded in order to remain secure/operational when theysee
>
+0.2.4.8-alpha +0.2.4.11-alpha +0.2.4.16-rc
Does it make sense to still recommend 0.2.4.X-alpha/rc client versions now
that 0.2.4 is stable? Or am I misunderstanding the notice.
regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go
Hi,
What happened to the fast exit statistics on https://metrics.torproject.org?
Why was it removed?
Regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi,
What happened to the fast exit statistics on https://metrics.torproject.org?
Why was it removed?
Regards,
Torland
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 01/16/2014 09:50 PM, Tim Chorney wrote:
> When asked how to run Filezilla through Tor to protect website
> passwords, Tim Kosse of Filezilla advised I should “use FTP over
> TLS (FTPS) or SSH File Transfer Protocol (SFTP) to connec
Hi,
the metrics page provides a graph about tor relay versions and shows that
version 0.2.4 goes straight up. I am wondering if there are statistics
about the different client versions that are used by end users.
thanks & regards,
torland
--
tor-talk mailing list - tor-
ction features more
powerful. If there was a checkbox client side where I could select
such a behavior, I would . Not saying it's feasible, or a good idea to
do it that way, or even necessary. But in theory, sure.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or
oblem here is that this is not a technological issue.
> it's a user issue that will, in the end, breakdown at the "rtfm" point.
> currently, the tor browser bundle has a link on the opening page which
> documents the standard tips on remaining anonymous. outside of writing
On Friday 03 January 2014 18:25:32 C B wrote:
> Incomplete list
>
> Blocking access from Tor Browser
>
>
> Also blocking access from Tor exit nodes
>
> https://www.healthcare.gov/
> https://www.kohls.com/
I can access both with TorBrowser via this exit:
https://at
e are capable of RTFM--and I heartily agree that this person is not a
good example of tor usage for a variety of reasons--appear not to be RTFM
for whatever reason. While I don't condone this user's choices, I hope
it's not controversial to suggest that this person probably now wi
This student did some really stupid things and in many ways is a "bad
example" of Tor use, but when Harvard students--even the ones who seem to
have come unhinged and clearly made reprehensible decisions--don't realize
that their university (or other institution's network admi
> Exim or postfix are not so hard to learn and roundcube is pretty
> easy to install :)
Postfix does not work with tor.
There are a few problems:
- Postfix does not have a SOCKS4a proxy option (in fact, no proxy
option)
- TorDNS cannot handle MX lookups. So running postfi
e GSM f/w controls a radio, and thus the power, it may need a
FCC certification. In which case you would need someone to finance
the certification every time a new version of the Gnu firmware is
released (FSF perhaps?).
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or c
> >> 1) Create a list of tor exit nodes that do not block port 25
> >> 2) Command the tor daemon to exit those nodes exclusively.
> >SSL-SMTP configured to works over 465 port in most cases.
> On Windows Yes.
> SMTP over ssl/tls is configured on port 25.
Hi,
in October I tried to access the blog of Neelie Kroes with Tor browser. Neelie
Kroes is Vice-President of the European Commission and responsible for the
Digital Agenda for Europe. At that time she asked the public in her blog about
their views:
http://ec.europa.eu/commission_2010-2014
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/19/2013 07:04 PM, Mark McCarron wrote:
>> Date: Tue, 19 Nov 2013 11:47:06 +0100 From:
>> t...@unterderbruecke.de To: tor-talk@lists.torproject.org Subject:
>> Re: [tor-talk] New TOR Service Suggestions and Enhancements
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/19/2013 06:50 AM, Mark McCarron wrote:
>> Date: Mon, 18 Nov 2013 21:11:40 +0100 From:
>> t...@unterderbruecke.de To: tor-talk@lists.torproject.org Subject:
>> Re: [tor-talk] New TOR Service Suggestions and Enhancements
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/18/2013 05:23 PM, Mark McCarron wrote:
> With all the recent crack downs on civil liberties, seizure of TOR
> services and general censorship that is now hitting even
> mainstream search engines, I would like to propose a s
needed until the message is
sent. This means it should make attempts in this order:
1) Create a list of tor exit nodes that do not block port 25
2) Command the tor daemon to exit those nodes exclusively.
3) Send the message SSL over Tor, direct to the recipients mail server.
4) If that fails
e be made on the fly while connected to Tor?
You can use the Tor Compass page to get a nice overview of all fast exit
nodes:
http://is.gd/1kmZRB
On the Torstatus page you can see all currently running relays:
http://torstatus.blutmagie.de/index.php?SR=Bandwidth&SO=Desc
For node selection
:
> Hi there,
>
> I have a concern regarding exit nodes in Tor. In my mind it is possible
> for an attacker to run a malicious exit server that gathers information
> at the exit point. Of course, this does not compromise anonymity per se,
> but it still can reveal sensitive data to m
DER SPIEGEL has an article (german) about how to setup a Tor router
using Rasperry Pie:
http://is.gd/FhUEQ4
It is interesting to see how this kind of news reaches mainstream
media after the PRISM disclosure.
Regards,
Torland
___
tor-talk mailing
en services
> configurable by the user.
is torservers.net able and allowed to run this hidden service? a trusted
organization is needed to run web-tor relay and hidden service.
> > if inbox size is limited to a few mbs
>
> I'd maybe want to limit the amount of email a u
Yesterday evening the German TV magazine "ttt" showed a
program about the darknet and Tor. Online there is a
recording available:
http://is.gd/eofnVF
Unfortunately only in German. But the page also provides a
German transcript of the TV program.
Regards
> I would think that simply finding a mail server that doesn't log
> ANYTHING (like what StartMail is about to offer) and encrypting
> everything should be enough. Of course, you'd need to trust that the
> service really isn't logging anything but that could be solve
think? the setup is easy to maintain. if inbox size is limited to a
few mbs any cheap vps thats like 20$ a year can be used to service hundreds of
thousands of accounts. a trusted umbrella organization is needed to maintain
the server as anonymity is increased by increasing users count. is the tor
1 - 100 of 274 matches
Mail list logo