Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices tagged with tor, page 7

  1. Radix Hacklab (radix@chaos.social)'s status on Monday, 07-Jan-2019 12:29:34 EST Radix Hacklab Radix Hacklab

    We now have an #onion service in place to make browsing of our website easier through #Tor.

    Fire up you Tor Browser and try it out!

    http://radixxsjj2ddbiar.onion

    In conversation Monday, 07-Jan-2019 12:29:34 EST from chaos.social permalink
  2. dabnotu (dabnotu@mastodon.art)'s status on Wednesday, 05-Dec-2018 04:46:28 EST dabnotu dabnotu
    • Tim

    @tim Spain, but browsing through #Tor, usually. That's a shame. Smokey is a good listen, pretty much always. Here's another one that expresses the sentiment: https://hooktube.com/watch?v=PssFhERkTNs

    In conversation Wednesday, 05-Dec-2018 04:46:28 EST from mastodon.art permalink
  3. deutrino (deutrino@mstdn.io)'s status on Sunday, 25-Nov-2018 11:56:43 EST deutrino deutrino

    Tired: Pleroma as a Service (PaaS)
    Wired: #Pleroma as a Hidden Service (PaaHS)

    #tor #wishlist

    In conversation Sunday, 25-Nov-2018 11:56:43 EST from mstdn.io permalink
  4. sávoy (pinguino@fosstodon.org)'s status on Wednesday, 21-Nov-2018 10:41:40 EST sávoy sávoy

    Protip to make unsuspecting people think you're doing something important:

    Browse the web with Tor and keep open a terminal window running "tail -f /var/log/tor/debug.log"

    #linux #tor #cli

    In conversation Wednesday, 21-Nov-2018 10:41:40 EST from fosstodon.org permalink
  5. Brian Ó (blacksam@social.gibberfish.org)'s status on Tuesday, 06-Nov-2018 20:02:53 EST Brian Ó Brian Ó

    #gibberfish #blog #privacy #opensource #news #features #backups #updates #tor

    In conversation Tuesday, 06-Nov-2018 20:02:53 EST from social.gibberfish.org permalink
  6. nuron :Anoxinon: (nuron@social.tchncs.de)'s status on Thursday, 01-Nov-2018 17:13:26 EDT nuron :Anoxinon: nuron :Anoxinon:

    Kann mir jemand sagen ob, und wenn ja wie, man einem #tor #relay sagen kann, das er maximal 80% der CPU Leistung haben darf?

    #followerpower

    In conversation Thursday, 01-Nov-2018 17:13:26 EDT from social.tchncs.de permalink
  7. Gwmngilfen (gwmngilfen@fosstodon.org)'s status on Wednesday, 31-Oct-2018 11:59:46 EDT Gwmngilfen Gwmngilfen

    TFW when the local WiFi blocks client-to-client connections, so you're SSH'ing between two side-by-side machines via sshd exposed as a Tor Hidden Service...

    #tor #onion #TheresAlwaysAWay

    In conversation Wednesday, 31-Oct-2018 11:59:46 EDT from fosstodon.org permalink
  8. Aussie Rockman (aussierockman@infosec.exchange)'s status on Tuesday, 23-Oct-2018 05:29:11 EDT Aussie Rockman Aussie Rockman

    A data only Sim card which won't function unless it's through #Tor. Genius idea for the #privacy conscious folks out there! #infosec #security
    https://motherboard.vice.com/en_us/article/d3qqj7/sim-card-forces-data-through-tor-brass-horn-communications

    In conversation Tuesday, 23-Oct-2018 05:29:11 EDT from infosec.exchange permalink

    Attachments

    1. This SIM Card Forces all of Your Mobile Data Through Tor
      from Motherboard
      "This is about sticking a middle finger up to mobile filtering, mass surveillance."
  9. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Friday, 05-Oct-2018 23:01:40 EDT Mike Gerwitz Mike Gerwitz
    It drives me crazy when sites block access via #Tor to read-only resources (like articles)---it doesn't make much sense to me. It's probably a quick decision by a team of people that don't really care or think about it, but it has strong effects that in the best case discourage use of an important privacy/anonymity tool, and in the worst case outright prevent certain users from accessing those resources (if Tor is their only option).

    A common workaround I use is to prepend "https://web.archive.org/" to the URL to load it in the #WaybackMachine from the Internet Archive. Sometimes websites block even that.

    The Internet Archive does great, important work, btw. Here's a recent article that emphasizes some of the major problems they're solving:

    https://blog.archive.org/2018/10/01/more-than-9-million-broken-links-on-wikipedia-are-now-rescued/
    In conversation Friday, 05-Oct-2018 23:01:40 EDT from social.mikegerwitz.com permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      More than 9 million broken links on Wikipedia are now rescued
      By Mark Graham from Internet Archive Blogs
      More than 9 million broken links on Wikipedia are now rescued
  10. Brian Ó (blacksam@social.gibberfish.org)'s status on Friday, 05-Oct-2018 21:01:55 EDT Brian Ó Brian Ó

    Hello folks! Gibberfish was founded two years ago to bring private, decentralized services to people who need them. We provide private cloud servers to other nonprofits at no charge. We also run a bunch of free, anonymous, public services, including this pod. While we're very happy to be doing this work, it's expensive to maintain. Since we started, I and my fellow founders have poured thousands of our own dollars into the project. Unfortunately, this is not sustainable. So, here is our ask:

    If you use our Diaspora* pod, our chat server, our anonymous search engine, or any of our other services, please reflect on their value to you and to the online community. If you feel that it's worth $1 per month, please consider supporting us on an ongoing basis on Patreon.

    If you're already a Patreon user, it's only a couple of clicks. If you don't wish to use Patreon, please visit our website for other ways to donate. If we can reach a level where we can reliably cover our monthly operating costs, we will be able to add extra capacity to improve our existing services, as well as offer new ones. Please feel free to make suggestions.

    Thank you for being awesome. Please share this post.

    Sincerely,
    @[Brian Ó 🐟](/u/blacksam)
    Executive Director @ Gibberfish

    #gibberfish #nonprofit #diaspora #xmpp #searx #tor #privacy #anonymity #freedom #encryption #patreon

    In conversation Friday, 05-Oct-2018 21:01:55 EDT from social.gibberfish.org permalink
  11. domo (dom@gnusocial.net)'s status on Wednesday, 03-Oct-2018 12:52:22 EDT domo domo
    ¡Jueves 4/4pm! en CDMX se hablará de anonimato, autocuidados digitales, y de cómo habitar internet hasta generar espacios seguros https://gnusocial.net/attachment/1458978 #SomosTormenta #InternetFeminista #TOR
    In conversation Wednesday, 03-Oct-2018 12:52:22 EDT from gnusocial.net permalink
  12. infosec-handbook.eu (infosechandbook@mastodon.at)'s status on Monday, 10-Sep-2018 12:12:10 EDT infosec-handbook.eu infosec-handbook.eu

    Details about zero-day vulnerability in :tor: Tor Browser 7.x published on Twitter by security company:

    https://www.zdnet.com/article/exploit-vendor-drops-tor-browser-zero-day-on-twitter/

    – full bypass of the "Safest" security level of the NoScript extension
    – allows malicious code to run inside the Tor Browser
    – Tor Browser 8.x is not affected
    – update to NoScript "Classic" version 5.1.8.7 / Tor Browser 8.x

    #tor #vulnerability #anonymity #privay #security #zeroday #noscript #infosec #cybersecurity #update

    In conversation Monday, 10-Sep-2018 12:12:10 EDT from mastodon.at permalink
  13. Tux Machines (tuxmachines@mastodon.technology)'s status on Thursday, 06-Sep-2018 09:50:27 EDT Tux Machines Tux Machines

    New Release: #Tor Browser 8.0
    http://www.tuxmachines.org/node/115286 #freesw

    In conversation Thursday, 06-Sep-2018 09:50:27 EDT from mastodon.technology permalink
  14. fridaysforfuture, but everyday (paulfree14@todon.nl)'s status on Thursday, 30-Aug-2018 17:27:16 EDT fridaysforfuture, but everyday fridaysforfuture, but everyday

    #tor just not working well for me or for others too?

    In conversation Thursday, 30-Aug-2018 17:27:16 EDT from todon.nl permalink
  15. Frank (frank@toot.koeln)'s status on Saturday, 04-Aug-2018 09:14:18 EDT Frank Frank

    Ich würde euch um eure Meinung bitten:

    Ich überlege ob ich einen #Raspberry-Pi mit #TOR konfigge und als #Exit nutze. Wäre das sinnvoll? Was für Alternative gäbe es?

    In conversation Saturday, 04-Aug-2018 09:14:18 EDT from toot.koeln permalink
  16. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 31-Jul-2018 22:10:58 EDT Mike Gerwitz Mike Gerwitz
    This article is popular right now on HN:

    https://pxlnv.com/blog/bullshit-web/

    It's something that many of us have been saying for many years. But I've been largely insulated from it: I have blocked all scripts and ads (for privacy and security reasons, but also because most sites serve proprietary JavaScript code) for years. If it weren't for my research (https://mikegerwitz.com/talks), I wouldn't have realized just how bad it has become.

    I've also run all my browsing through #Tor for years. And what this article reminds me of (but does not mention; this is unrelated) is how Tor used to be so painfully slow---worse than dialup. It has improved drastically over the years, but by design, it's always going to be slower than directly connecting to a webserver.

    But despite that, websites often finish loading for me much faster than those who use the "normal" web over a normal connection, because it's not loading so much shit. That also allows me to stick to <256MiB of data per month on my mobile plan, despite browsing sites linked to on HN and despite the extra packets from Tor itself. (Btw, text.npr.org is great, for those who didn't know of it.)

    The very things that got me downvoted into oblivion on HN years ago are now the popular, obvious things. Why do things have to get so _bad_ before most people begin to care?
    In conversation Tuesday, 31-Jul-2018 22:10:58 EDT from social.mikegerwitz.com permalink

    Attachments

    1. The Bullshit Web
      My home computer in 1998 had a 56K modem connected to our telephone line; we were allowed a maximum of thirty minutes of computer usage a day, because my parents — quite reasonably — did not want to have their telephone shut off for an evening at a time. I remember webpages loading slowly: ten […]
  17. FSFE Berlin (fsfeberlin@libranet.de)'s status on Monday, 23-Jul-2018 00:47:05 EDT FSFE Berlin FSFE Berlin
    Zwiebelsuppe

    Am Donnerstag, den 26. Juli findet das nächste Treffen der berliner Unterstützer*innen der FSFE https://libranet.de/redir/99138?url=display/0b6b25a8195b555ae3abb6c648430309 statt.

    Aus aktuellem Anlass möchten wir das Treffen den Zwiebelfreunden https://www.zwiebelfreunde.de/ widmen.

    Nicht nur weil die #Zwiebelfreunde als gemeinnütziger Verein Technologie und Wissen im Bereich #Anonymität, #Privatsphäre und #Sicherheit im Internet fördern (u.a. betreiben sie #Tor Exit-Knoten), sondern vor allem auch, weil unserer Ansicht nach eine anonyme und vertrauliche Kommunikation insgesamt ein fundamentaler Baustein einer freien Gesellschaft ist, möchten wir als Zeichen der Unterstützung beim nächsten Berliner FSFE-Treffen https://libranet.de/redir/99138?url=display/0b6b25a8195b555ae3abb6c648430309 am Donnerstag Zwiebelsuppe servieren. Essen gegen #Spende -- die Einnahmen gehen (dank mehrerer Spender, die die Materialkosten stemmen, u.a. #LinuxWorks) vollständig als Spende an die Zwiebelfreunde.

    Nach dieser Stärkung möchte uns Tobias in einem Workshop eine Einführung in das Tor-Netzwerk und die damit verbundenen Tools wie z.B. den Tor-Browser und die App Briar geben.


    Kommt hungrig und bringt eure Freund_innen mit!

    Wir freuen uns auf euch!

    P.S.: es wäre nett, wenn Ihr Euer Kommen ankündigen könntet, z.B.
    an <tomas(at)fsfe.org>, damit wir die Mengen planen können. Trotzdem:
    unangekündigt kommen ist immer noch besser als gar nicht :-)
    In conversation Monday, 23-Jul-2018 00:47:05 EDT from social.diekershoff.de permalink

    Attachments

    1. FSFE Berlin
      Treffen der FSFE Gruppe Berlin/Brandenburg Beginnt: Donnerstag, 26. Juli 2018, 19:00 Endet: Donnerstag, 26. Juli 2018, 22:00 Die #FSFE Gruppe #Berlin / #Bran...
  18. Victorhck (victorhck@mastodon.social)'s status on Tuesday, 17-Jul-2018 09:34:24 EDT Victorhck Victorhck
    • The Tor Project

    @torproject En 1 semana podrás compartir con la comunidad de #Tor en Barcelona!

    https://victorhckinthefreeworld.com/2018/06/11/encuentro-de-la-comunidad-tor-en-barcelona/

    Si mantienes un nodo de la red, estás interesado/a en mantener un nodo o quieres aprender más sobre cómo involucrarte con Tor, esperamos verte por allí

    In conversation Tuesday, 17-Jul-2018 09:34:24 EDT from mastodon.social permalink
  19. infosec-handbook.eu (infosechandbook@mastodon.at)'s status on Friday, 13-Jul-2018 09:31:44 EDT infosec-handbook.eu infosec-handbook.eu

    I just came across an interesting observation: According to the tool Exodus, Orfox (Tor browser for Android) contains 4 trackers:

    - Adjust
    - Google Ads
    - Google DoubleClick
    - Google Firebase Analytics

    https://reports.exodus-privacy.eu.org/reports/11967/

    https://guardianproject.info/apps/orfox/

    #orfox #exodus #privacy #tracking #google #tor #android

    In conversation Friday, 13-Jul-2018 09:31:44 EDT from mastodon.at permalink
  20. Maltimore (maltimore@masto.themimitoof.fr)'s status on Wednesday, 11-Jul-2018 14:04:04 EDT Maltimore Maltimore

    My #Tor client tells me that the tor servers in my circuit "are failing more connections than usual", and I get this warning for different circuits.

    Does someone know more?

    In conversation Wednesday, 11-Jul-2018 14:04:04 EDT from masto.themimitoof.fr permalink
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.