im already on my first blacklist XD http://www.ircproxy.net/torlist/21-03-2011-tor-nodes-list.html stupid turks i think ill start up tor just to keep myself on there list
:dunno:
:dunno: :eyebrow:
That's racist, sparkler should also be on a white list. ;D
its not racist there turks according to google and they have created a stupid list also i don't seem to be on a whitelist as google says did not match any documents
So, how did you manage to get on their stupid list?
Still :dunno: :slap: ::) Can somebody please give me a useful clue what this thread is all about? :eek4:
Onions ;D
Sausages? ;) Pork pies? ;) Egg and Chips? ;) :dunno:
well this thread soon got round to food.
i guess admin will be in soon to clear things up :red:
I thought it might be amusing to let it stew a little longer. ;)
You just caught it before it started to boil over.
TOR (https://www.torproject.org/index.html.en) is an anonymous proxy service that bounces your data through a random number of servers ( Nodes ) to prevent snoopers from see who is downloading what from where.
It appears that his I.P. address is considered to be a TOR Node.
Thanks Alan.
Quote from: Steve on Apr 14, 2011, 19:17:23
Onions ;D
The Tor project uses the Onion logo https://www.torproject.org/docs/trademark-faq.html.en >:D
having an onion logo on a proxy doesn't seem to make sense to me
Quote from: sparkler on Apr 14, 2011, 20:45:38
having an onion logo on a proxy doesn't seem to make sense to me
Tor is an implementation of onion routing, hence the onion logo. In fact the current name of Tor originated as an acronym of The Onion Router which was the projects previous name. Description of onion routing at: http://en.wikipedia.org/wiki/Onion_routing
Thanks for clearing that up then. ???
Yes, but onion routing does not provide perfect sender or receiver anonymity against all possible eavesdroppers—that is, it is possible for a local eavesdropper to observe that an individual has sent or received a message. It does provide for a strong degree of unlinkability, the notion that an eavesdropper cannot easily determine both the sender and receiver of a given message. Even within these confines, onion routing does not provide any absolute guarantee of privacy; rather, it provides a continuum in which the degree of privacy is generally a function of the number of participating routers versus the number of compromised or malicious routers.
it is possible to beadle to be able to tell the source, destination and also the contents (unless encrypted by the website the users are viewing) for all the traffic on the tor network just by hacking the nodes that tor lets everyone see and placing a rootkit to record all in/out traffic and also to extract the encryption keys and recording the traffic between the nodes than decrypt the data with tor's keys and then you know everything
Quote from: Simon on Apr 14, 2011, 19:00:22
So, how did you manage to get on their stupid list?
:whistle:
;D
Quote from: wdforte on Apr 14, 2011, 21:00:50
Thanks for clearing that up then. ???
Yes left me in a vegative state too ???
Nodes and Tors and stupid lists .... this is a wierd place at times ;D