Recent comments in /f/Tor
mr4channer wrote
based
Rambler OP wrote
Reply to comment by !deleted152 in How to get Thunderbird to work over TOR? by Rambler
Thanks!
~$ torsocks curl -s https://check.torproject.org/ | grep Congratulations.
Congratulations. This browser is configured to use Tor.
Congratulations. This browser is configured to use Tor.
Still no go in Thunderbird with setting up the proxy. I'll dig into it more, because I think that's the ticket. The TorBirdy plugin is outdated and has been for a while, which is what seems to be used previously. I may boot up in Tails or something similar to see if the issue persists.
Rambler wrote
Reply to comment by boobs in Requirement for a exit node? by Jogger
the primary requirement for an exit node that no one tells you about:
balls of steel.
Has anyone ever been arrested or held legally liable for running an exit node (in a modern country, like the US/CA/UK/Etc)?
I've thought about running one as well since my server provider is okay with it as long as I handle the abuse complaints which is basically copy/pasting a cookie cutter response on how it's an exit-node and not possible to tell the origin of whatever it is the complaint is about.
boobs wrote
Reply to Requirement for a exit node? by Jogger
the primary requirement for an exit node that no one tells you about:
balls of steel.
Jogger OP wrote
Reply to comment by z3d in Requirement for a exit node? by Jogger
Oh cool that's even better it's backed by the torproject. I'll check it out!
z3d wrote
Reply to Requirement for a exit node? by Jogger
For a terminal based Tor monitor, look no further than nyx: https://nyx.torproject.org/
Jogger OP wrote
Reply to comment by Rambler in Requirement for a exit node? by Jogger
Ok cool thanks. I just wanted to see network charts basically. I will look into those.
Rambler wrote
Reply to Requirement for a exit node? by Jogger
Per https://community.torproject.org/relay/relays-requirements/
A <40 Mbit/s non-exit relay should have at least 512 MB of RAM available.
A non-exit relay faster than 40 Mbit/s should have at least 1 GB of RAM.
On an exit relay we recommend at least 1.5 GB of RAM per tor instance.
Not sure about the control panel to manage it, but that'd add overhead to the RAM requirement. Hopefully someone will correct me if I'm wrong, but I'm pretty sure it's "set it and forget it". What are you wanting to do with a control panel? See network graphs and stats and stuff? Observium or Librenms will collect pretty much any server related stat that you could ever need. Those will chart and graph things like CPU, RAM, Disk IO, Network Graphs, uptime, etc all over time. From very recent to multiple years if you keep it running long enough.
RichardButte wrote
Reply to comment by MrBlack in How does a captcha prevent a DDOS attack? by MrBlack
That's basically it, all those request clogs up them internet pipes.
Regular sites often use CDN's (server networks to share the load), and a clearnet solution would have one server sort out illegitimate requests and serve CAPTCHA's while a different server that doesn't see any of the unwanted traffic host the site.
Wahaha wrote
Reply to comment by self in How does a captcha prevent a DDOS attack? by MrBlack
Is this a problem solvable through certificates? Like you hide the certificates behind a captcha and revoke certificates of misbehaving users.
MrBlack OP wrote
Reply to comment by self in How does a captcha prevent a DDOS attack? by MrBlack
Oh okay I guess that makes a bit more sense. I always thought a DDOS attack had to have a specific port or webpage as a target. But I don't know how one would be sent through the tor network and I dont even really know how they're sent through the regular internet other than it's just a bunch of requests from different locations.
self wrote
Reply to How does a captcha prevent a DDOS attack? by MrBlack
From my understanding, the CAPTCHA is a very low intensity operation that barely takes any server load, while logging in ot registration or making purchases or even browsing like a script would do repeatedly to complete a DDoS attack. Having a CAPTCHA effectively prevents scripts from doing these high intensity operations multiple times per second.
For clear web sites this is an awful approach, but since you can’t really block IPs on Tor, it’s the best and most effective tool market owners have.
Rambler wrote
Reply to comment by not_bob in A IRC chat room on Tor by piamie
Not really... Unfortunately. Though I'll add it to the list.
not_bob wrote
Reply to comment by Rambler in A IRC chat room on Tor by piamie
Would it be possible to require a time delay for upvotes and posts for new accounts? Even an hour or two would be enough to make it a pain to do this sort of thing.
Rambler wrote (edited )
Reply to A IRC chat room on Tor by piamie
Just so members know, someone has created dozens of accounts just to upvote this one submission.
Not saying it was /u/piamie but obviously I'd be suspicious and weary of any link that gets upvoted in such a dishonest and manipulative way.
Src: New user log with a bunch of new users using the format: [same-name][random-letters] all with 1 submission vote. Not hard to figure out what they're voting for when this is the highest voted submission on the site and when the amount of created accounts is within a few numbers of a 'normal' submission upvote. (Most things get 2 or 3 upvotes, so if there are 29 new accounts all with the same name, all that have only upvoted 1 submission... It's safe to say it's likely this one. I can't see what people vote for but I can see how many votes people have given out, but nothing specific.)
hideyourlies wrote
Suppose I best update some of my onion addresses for the foreseeable future.
HulkHoganBot wrote
Reply to comment by hideyourlies in Onion search engine or link index that filters out dead links? by rm_rf
Hell yeah brother.
hideyourlies wrote
You can use directory's such as Underdir and they say if an onion is online, so you can browse them.
A couple search engines I know of are Not Evil and Phobos Search.
boobs wrote
Reply to Safe to ssh over tor? by notaspook
someone can correlate your connection to your real identity if you use the same public key as you do without tor.
santorihelix wrote
Reply to Safe to ssh over tor? by notaspook
Just be sure to check (and know beforehand) the signing key of your server so the exit node can't MitM. At first connect you'll get something like
The authenticity of host omecha.info (89.234.176.136)' can't be established.
ECDSA key fingerprint is SHA256:v7u4albDUtGH1EXWEwlt0KnzY9GDY5EqodUymKSbiSw
Are you sure you want to continue connecting (yes/no)?
When you say yes
the server will be added to ~/.ssh/known_hosts
so from then on ssh
has you covered; that is, it'll error if the pubkey doesn't match the one saved in your file.
MrBlack OP wrote
Reply to comment by !deleted152 in Why does Tor download images as a "webp" file but the same site on the clearnet the image will download as a "jpg"? by MrBlack
Makes me paranoid >_<
Tor was created by the government and webp files were developed by Google. A great combination that we should definitely trust lol...
MrBlack OP wrote
Reply to Why does Tor download images as a "webp" file but the same site on the clearnet the image will download as a "jpg"? by MrBlack
I tried it on this website and the images download as images but on reddit if you're using tor they're downloading as .webp weird!
https://file.org/extension/webp
The WEBP file format was developed by Google, Inc. This is an image file format that aims to provide users with around 34% smaller file sizes for storing digital graphics and images. Google developed the .webp file format to make photo and image sharing on the Web faster, more efficient and easier for users. The data stored in these WEBP files may include digital graphics, vector images, photos and metadata details. This file format allows users to store digital images and photos in lossy or lossless formats. These .webp files can be opened using Adobe Photoshop, which is an image development and photo editing application. Google Chrome can also be used to open and view the graphics stored in these WEBP files.
santorihelix wrote (edited )
Reply to What are some good .onion sites to visit? Most wikis and guides are dated and full of broken links. by Rambler
There's this github repo which is full of websites that also offer onions, maybe that doesn't count. Some I know are
Dread
http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion/
GitHide: Git, but hidden
http://githidep2hynhdmutuv7n2tei4iie2c7lyqz5fes3r5zzoxe5dshtxyd.onion/
GnomeChumpsky OP wrote
I can try on another ios device
mr4channer wrote
Reply to How to get Thunderbird to work over TOR? by Rambler
don't use it, use claws mail