Nefario
|
|
May 22, 2011, 01:34:48 PM |
|
Wow that's worth alot now.
|
PGP key id at pgp.mit.edu 0xA68F4B7C To get help and support for GLBSE please email support@glbse.com
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
October 20, 2011, 05:31:44 AM |
|
We still accept Bitcoin donations (and we're sitting on a large number of them). In case you lost hope, we will gladly accept the coins.
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
January 10, 2012, 12:59:42 PM |
|
Sorry, I don't want to spam you, but I want to reach out to all BTC donators, especially the one who left a message in our PrivacyBox, promising a lot of Bitcoins weekly. So far, this seems to be true, and we have turned over 700 coins into money and then into Tor exit servers thanks to you! I want to make sure you all know we appreciate your confidence into us!
We're going strong, pumping around 1500 MBit/s of Tor exit traffic for all those in need of anonymity on the net.
In case you missed it, we're an official charitable German non-profit now!
|
|
|
|
slush
Legendary
Offline
Activity: 1386
Merit: 1097
|
|
January 10, 2012, 01:14:04 PM |
|
Moritz, I really appreciate what you're doing for the Tor network and freedom of speech generally. I'm following you for years and I want encourage other Bitcoin members to support torservers by at least small donation, because they're doing good job!
|
|
|
|
Red Emerald
|
|
January 10, 2012, 11:51:26 PM |
|
I think tor is great and have been playing with it for years. I'm assuming you run a bitcoin client rather than using a web wallet. If that is the case, you should consider setting up a tor hidden service. Right now I believe the only two hidden services online are run by me. It's really easy to do. I'm sure you already know how considering the number of nodes you run. Just in case though, all you have to do is add 2 lines to your torrc. HiddenServiceDir /var/lib/tor/hidden_coin/ HiddenServicePort 8333 127.0.0.1:8333
The list is of nodes is at https://en.bitcoin.it/wiki/Fallback_Nodes#Tor_nodes, but like I said, mine are the only 2 that seem to be online.
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
January 11, 2012, 02:57:21 AM |
|
|
|
|
|
Red Emerald
|
|
January 11, 2012, 06:28:48 PM |
|
Awesome. It works! $ bitcoind getinfo { "version" : 50000, "balance" : 0, "blocks" : 161736, "connections" : 3, "proxy" : "127.0.0.1:9050",
|
|
|
|
finway
|
|
January 11, 2012, 06:29:48 PM |
|
Mark.
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
February 11, 2012, 10:29:57 PM |
|
As you might have read in the news, Iran is blocking all encrypted (SSL/HTTPS) traffic. We've been able to set up obfuscated proxies for Tor bridges on two of our Gbit servers. Tor usually sees hundreds of thousands of Iran users (2nd largest user group!), but I am proud that today over 150 Iranians found their way through our servers. Thank you! Without your donations, this would not be possible!
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
June 06, 2012, 06:52:53 PM |
|
I can only repeat what I've said before: THANK YOU! Without your donations, we would not be where we are today. I am still making sure that everything goes into fast Tor exits for all of the world to benefit.
Cheers!!
|
|
|
|
Red Emerald
|
|
June 06, 2012, 11:44:31 PM |
|
So the newest next-test from luke-jr has a bunch of code in it for Tor hidden services. I updated my server with it and now I have this in my conf proxy=127.0.0.1:9050 externalip=p2hwc26zdsrqxiix.onion listen=1 discover=1
You can also do addnode or connect directly to .onion instead of having to add a bunch of mapaddress lines to your torrc. It's been working well for me. 36 connections right now.
|
|
|
|
caveden
Legendary
Offline
Activity: 1106
Merit: 1004
|
|
June 07, 2012, 07:26:21 AM |
|
Red Emerald, you mean that with this patch bitcoin clients are able to send their .onion (or eventually another darknet) URL to other bitcoin nodes in the discovery process? The bitcoin network may now operate inside a darknet if everybody wants to?
|
|
|
|
Red Emerald
|
|
June 07, 2012, 05:57:50 PM |
|
Red Emerald, you mean that with this patch bitcoin clients are able to send their .onion (or eventually another darknet) URL to other bitcoin nodes in the discovery process? The bitcoin network may now operate inside a darknet if everybody wants to?
Yup. No need to require everybody, though. Just a few people (like me and you) need nodes that connect Torland to the Internet. My node is setup to talk to both networks.
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
June 10, 2012, 05:26:11 PM |
|
|
|
|
|
caveden
Legendary
Offline
Activity: 1106
Merit: 1004
|
|
June 11, 2012, 07:13:16 AM |
|
Yup. No need to require everybody, though. Just a few people (like me and you) need nodes that connect Torland to the Internet. My node is setup to talk to both networks.
I understand that's not needed to. But this is great news. I've always thought that running bitcoin behind Tor should be a "recommended practice", pretty much like using different address for each transaction. The only problem was that the more people following such practice, the less listening nodes we'd get. Not a problem anymore with this patch you talk about. I hope this patched is merged in the main version soon. By the way, I've never created a Tor hidden service. Is is something simple? And by simple, I mean something that an average computer user could do, like, is there a wizard install and all? If you have to go though text files, most people would just give up. If there's such a thing, it would be a good idea to start releasing a bitcoin+Tor* bundle that configures everything and launches your bitcoin already behind a hidden service. * I say Tor but I guess it could be I2P too... whichever is easier.
|
|
|
|
rapeghost
|
|
June 11, 2012, 01:51:23 PM |
|
Sounds like a great way to pay to have the government sniff you
</ troll>
|
|
|
|
Red Emerald
|
|
June 11, 2012, 03:36:20 PM |
|
By the way, I've never created a Tor hidden service. Is is something simple? And by simple, I mean something that an average computer user could do, like, is there a wizard install and all? If you have to go though text files, most people would just give up. If there's such a thing, it would be a good idea to start releasing a bitcoin+Tor* bundle that configures everything and launches your bitcoin already behind a hidden service.
* I say Tor but I guess it could be I2P too... whichever is easier.
No wizards. All you do is add 2 lines to your torrc and you have a hidden service. HiddenServiceDir /var/lib/tor/hidden_coin/ HiddenServicePort 8333 127.0.0.1:8333
Then you reload Tor, and 'cat /var/lib/tor/hidden_coin/hostname' To get bitcoin to use this, just add a couple lines to your bitcoin.conf proxy=127.0.0.1:9050 externalip=p2hwc26zdsrqxiix.onion listen=1 discover=1
The .onion in this example is me, it will obviously be something different for you. Sounds like a great way to pay to have the government sniff you
</ troll>
They can feel free to sniff my encrypted traffic. And if you are really paranoid, run https://www.torproject.org/projects/obfsproxy.html.en
|
|
|
|
rapeghost
|
|
June 12, 2012, 10:30:15 AM |
|
By the way, I've never created a Tor hidden service. Is is something simple? And by simple, I mean something that an average computer user could do, like, is there a wizard install and all? If you have to go though text files, most people would just give up. If there's such a thing, it would be a good idea to start releasing a bitcoin+Tor* bundle that configures everything and launches your bitcoin already behind a hidden service.
* I say Tor but I guess it could be I2P too... whichever is easier.
No wizards. All you do is add 2 lines to your torrc and you have a hidden service. HiddenServiceDir /var/lib/tor/hidden_coin/ HiddenServicePort 8333 127.0.0.1:8333
Then you reload Tor, and 'cat /var/lib/tor/hidden_coin/hostname' To get bitcoin to use this, just add a couple lines to your bitcoin.conf proxy=127.0.0.1:9050 externalip=p2hwc26zdsrqxiix.onion listen=1 discover=1
The .onion in this example is me, it will obviously be something different for you. Sounds like a great way to pay to have the government sniff you
</ troll>
They can feel free to sniff my encrypted traffic. And if you are really paranoid, run https://www.torproject.org/projects/obfsproxy.html.enIt was a joke.
|
|
|
|
torservers (OP)
Newbie
Offline
Activity: 52
Merit: 0
|
|
July 14, 2012, 02:02:48 PM |
|
|
|
|
|
molecular
Donator
Legendary
Offline
Activity: 2772
Merit: 1019
|
|
October 07, 2012, 03:33:30 PM |
|
thumbs up for torservers.net
|
PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0 3F39 FC49 2362 F9B7 0769
|
|
|
|