November 2009 Archives by date
Starting: Sun Nov 1 14:16:11 UTC 2009
Ending: Mon Nov 30 10:41:23 UTC 2009
Messages: 199
- Tor 0.2.1.19 on Ubuntu 9.10
Gitano
- Tor 0.2.1.19 on Ubuntu 9.10
Andrew Lewman
- Tor 0.2.1.19 on Ubuntu 9.10
Ted Smith
- OS X stable test package with Vidalia 0.2.6-svn
Andrew Lewman
- OS X stable test package with Vidalia 0.2.6-svn
Darren Thurston
- Distribution of bridge information
Ryan Day
- OS X stable test package with Vidalia 0.2.6-svn
Johannes Frölich
- Load external content? message seems inappropriate
Thomas Anderson
- getinfo ns/desc question
grarpamp
- Load external content? message seems inappropriate
Andrew Lewman
- Load external content? message seems inappropriate
Thomas Anderson
- (FWD) Load external content? message seems inappropriate
krishna e bera
- Distribution of bridge information
hgiuh ghj
- Distribution of bridge information
Ryan Day
- Distribution of bridge information
Andrew Lewman
- Firefox 3.6 beta and personas
Marco Bonetti
- Distribution of bridge information
hgiuh ghj
- TLS Man-In-The-Middle Vulnerability
Marcus Griep
- TLS Man-In-The-Middle Vulnerability
Marcus Griep
- TLS Man-In-The-Middle Vulnerability
Nick Mathewson
- Permission denied error, Tor exiting
gregorwsky at googlemail.com
- Tor 0.2.2.4-alpha and 0.2.2.5-alpha are out
Jon Cosby
- all traffic through a VPN on top of tor, if only...
jackwssp q
- Tor WIN in germany :)
Juliusz Chroboczek
- is it possible...
anon
- [warn] Error binding network socket: Address already in use
Olaf Selke
- [warn] Error binding network socket: Address already in use
D-503
- [warn] Error binding network socket: Address already in use
Drake Wilson
- [warn] Error binding network socket: Address already in use
Olaf Selke
- [warn] Error binding network socket: Address already in use
Drake Wilson
- [warn] Error binding network socket: Address already in use
Olaf Selke
- [warn] Error binding network socket: Address already in use
Olaf Selke
- [warn] Error binding network socket: Address already in use
Drake Wilson
- Tor WIN in germany :)
Brian Mearns
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
Brian Mearns
- Tor WIN in germany :)
Carolyn Anhalt
- Tor WIN in germany :)
Brian Mearns
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
krishna e bera
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
Sharif Olorin
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
John Case
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
Scott Bennett
- Tor WIN in germany :)
morphium
- Tor WIN in germany :)
Carolyn Anhalt
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
Flamsmark
- Kaspersky wants to make Tor illegal and supports a globalized policed internet.
Eugen Leitl
- TLS Man-In-The-Middle Vulnerability
Andrew S. Lists
- directory server tor.dizum.com
Olaf Selke
- TLS Man-In-The-Middle Vulnerability
Nick Mathewson
- About running Tor on a private network
Sambuddho Chakravarty
- Related topic (Privacy): Brittain wants to track all telecom usage
Brian Mearns
- all traffic through a VPN on top of tor, done!
Andrea Ratto
- all traffic through a VPN on top of tor, done!
John Case
- all traffic through a VPN on top of tor, done!
Andrea Ratto
- all traffic through a VPN on top of tor, done!
Andrew Lewman
- About running Tor on a private network
Andrew Lewman
- Testing Tor Browser Bundle 1.2.10
Andrew Lewman
- Tor 0.2.2.4-alpha and 0.2.2.5-alpha are out
Andrew Lewman
- Permission denied error, Tor exiting
Andrew Lewman
- all traffic through a VPN on top of tor, done!
John Case
- all traffic through a VPN on top of tor, done!
Paul Syverson
- Tracing internal errors
Jon Cosby
- Tracing internal errors
Marco Bonetti
- Tracing internal errors
Fabian Keil
- directory server tor.dizum.com
Alex de Joode
- all traffic through a VPN on top of tor, done!
Andrea Ratto
- directory server tor.dizum.com
Olaf Selke
- directory server tor.dizum.com
Olaf Selke
- Permission denied error, Tor exiting
gregorwsky at googlemail.com
- all traffic through a VPN on top of tor, done!
John Case
- all traffic through a VPN on top of tor, done!
Erilenz
- all traffic through a VPN on top of tor, done!
Marco Bonetti
- Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz
- Reduce hops when privacy level allows to save Tor network bandwidth
Andrew Lewman
- Reduce hops when privacy level allows to save Tor network bandwidth
Georg Sluyterman
- Reduce hops when privacy level allows to save Tor network bandwidth
Gregory Maxwell
- all traffic through a VPN on top of tor, done!
Paul Syverson
- Reduce hops when privacy level allows to save Tor network bandwidth
Brian Mearns
- all traffic through a VPN on top of tor, done!
Ted Smith
- private exit node
moris blues
- private exit node
andrew at torproject.org
- Reduce hops when privacy level allows to save Tor network bandwidth
Jim
- Reduce hops when privacy level allows to save Tor network bandwidth
Tim Wilde
- Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz
- Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz
- Reduce hops when privacy level allows to save Tor network bandwidth
Marcus Griep
- private exit node
moris blues
- abot hidden services
moris blues
- single hop proxy?
moris blues
- weak algorithm in tor
moris blues
- single hop proxy?
Gregory Maxwell
- private exit node
Runa Sandvik
- Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz
- Reduce hops when privacy level allows to save Tor network bandwidth
Jim
- Reduce hops when privacy level allows to save Tor network bandwidth
Andrew Lewman
- Reduce hops when privacy level allows to save Tor network bandwidth
Erilenz
- HTML5 deanonymization attacks
Marco Bonetti
- Reduce hops when privacy level allows to save Tor network bandwidth
Brian Mearns
- HTML5 deanonymization attacks
Mike Perry
- Reduce hops when privacy level allows to save Tor network bandwidth
Flamsmark
- HTML5 deanonymization attacks
Gregory Maxwell
- Reduce hops when privacy level allows to save Tor network bandwidth
krishna e bera
- HTML5 deanonymization attacks
Marco Bonetti
- HTML5 deanonymization attacks
Marco Bonetti
- HTML5 deanonymization attacks
Mike Perry
- Tor Browser Bundle 1.2.10 released
Andrew Lewman
- weak cipher in TLS?
moris blues
- Tor 0.2.2.6-alpha is out
Roger Dingledine
- weak cipher in TLS?
Roger Dingledine
- HTML5 deanonymization attacks
Scott Bennett
- Connections through Tor
force44 at Safe-mail.net
- Microsoft .NET Add-on
Koh Choon Lin
- weak cipher in TLS?
moris blues
- Microsoft .NET Add-on
andrew at torproject.org
- Microsoft .NET Add-on
Jon Cosby
- Microsoft .NET Add-on
Lee Fisher
- TLS Man-In-The-Middle Vulnerability
Erwin Lam
- Tor: Scroogle blocked, Google not ? (November 2009)
dreamcat four
- Tor: Scroogle blocked, Google not ? (November 2009)
gabrix
- Tor: Scroogle blocked, Google not ? (November 2009)
Hannah Schroeter
- TLS Man-In-The-Middle Vulnerability
andrew at torproject.org
- TLS Man-In-The-Middle Vulnerability
Scott Bennett
- Tor: Scroogle blocked, Google not ? (November 2009)
Scott Bennett
- TLS Man-In-The-Middle Vulnerability
Erwin Lam
- The Case for Banning Reduced Hop Count Implementations
Lucky Green
- Tor: Scroogle blocked, Google not ? (November 2009)
Kai-Uwe Behrmann
- The Case for Banning Reduced Hop Count Implementations
Gregory Maxwell
- Tor: Scroogle blocked, Google not ? (November 2009)
Jim
- TLS Man-In-The-Middle Vulnerability
Marco Bonetti
- TLS Man-In-The-Middle Vulnerability
Marco Bonetti
- torsocks on pogo
Eugen Leitl
- The Case for Banning Reduced Hop Count Implementations
Paul Syverson
- Connections through Tor
Roger Dingledine
- Tor: Scroogle blocked, Google not ? (November 2009)
Gitano
- The Case for Banning Reduced Hop Count Implementations
Gregory Maxwell
- TLS Man-In-The-Middle Vulnerability
Scott Bennett
- TLS Man-In-The-Middle Vulnerability
Erwin Lam
- TLS Man-In-The-Middle Vulnerability
Roger Dingledine
- Tor-ramdisk 20091123 (i686) and 20091124 (MIPS) released
basile
- livejournal ban tor-nodes
James Brown
- livejournal ban tor-nodes
Brian Mearns
- livejournal ban tor-nodes
Jacob Appelbaum
- livejournal ban tor-nodes
James Brown
- AN idea of non-public exit-nodes
James Brown
- (FWD) Vidalia bundle upgrade fails on OS X
Roger Dingledine
- AN idea of non-public exit-nodes
Ted Smith
- AN idea of non-public exit-nodes
Roger Dingledine
- livejournal ban tor-nodes
Jacob Appelbaum
- AN idea of non-public exit-nodes
Ted Smith
- AN idea of non-public exit-nodes
Damian Johnson
- livejournal ban tor-nodes
Kyle Williams
- AN idea of non-public exit-nodes
Flamsmark
- Danish TPB DNS Blocks
Flamsmark
- AN idea of non-public exit-nodes
James Brown
- livejournal ban tor-nodes
James Brown
- AN idea of non-public exit-nodes
James Brown
- AN idea of non-public exit-nodes
Scott Bennett
- Danish TPB DNS Blocks
Nils Vogels
- AN idea of non-public exit-nodes
Andrew Lewman
- livejournal ban tor-nodes
Marcus Griep
- AN idea of non-public exit-nodes
Gregory Maxwell
- Danish TPB DNS Blocks
Georg Sluyterman
- Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Georg Sluyterman
- AN idea of non-public exit-nodes
Paul Syverson
- AN idea of non-public exit-nodes
Gregory Maxwell
- Danish TPB DNS Blocks
Flamsmark
- Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Flamsmark
- Danish TPB DNS Blocks
Erwin Lam
- Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Georg Sluyterman
- Timing attacks from a user's point of view
Just A. User
- Timing attacks from a user's point of view
Xinwen Fu
- livejournal ban tor-nodes
Jacob Appelbaum
- livejournal ban tor-nodes
James Brown
- cross-posting abuse (was Re: Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?)
Scott Bennett
- Danish TPB DNS Blocks
Scott Bennett
- AN idea of non-public exit-nodes
Scott Bennett
- DisableAllSwap question
Scott Bennett
- Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
basile
- DisableAllSwap question
Jacob Appelbaum
- livejournal ban tor-nodes
James Brown
- Danish TPB DNS Blocks
Flamsmark
- Timing attacks from a user's point of view
Just A. User
- Timing attacks from a user's point of view
Xinwen Fu
- Danish TPB DNS Blocks
tor-operator at sky-haven.net
- Tor: Scroogle blocked, Google not ? (November 2009)
Jim
- Danish TPB DNS Blocks - tor-ramdisk DNS fix, how?
Niels Elgaard Larsen
- Danish TPB DNS Blocks
Scott Bennett
- Danish TPB DNS Blocks
Olaf Selke
- Call for volunteers
jon
- No subject
moris blues
- padlock patch for tor
Udo van den Heuvel
- padlock patch for tor
Roger Dingledine
- Ubuntu Karmic repository?
Matej Kovacic
- Ubuntu Karmic repository?
Marco Bonetti
- padlock patch for tor
Udo van den Heuvel
- padlock patch for tor
Udo van den Heuvel
- "The browser you're using refuses to sign in. (cookies rejected)"
James Brown
- "The browser you're using refuses to sign in. (cookies rejected)"
Drake Wilson
- "The browser you're using refuses to sign in. (cookies rejected)"
Andrew Lewman
- directory server tor.dizum.com
Olaf Selke
Last message date:
Mon Nov 30 10:41:23 UTC 2009
Archived on: Tue Mar 1 03:50:53 UTC 2011
This archive was generated by
Pipermail 0.09 (Mailman edition).