[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Spoofing location - possible?
- To: or-talk@xxxxxxxxxxxxx
- Subject: Spoofing location - possible?
- From: buralex@xxxxxxxxx
- Date: Tue, 06 May 2008 07:04:38 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Tue, 06 May 2008 07:04:48 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; bh=n7SMdQkJBQtlgHLvC9rGlPxrW1XgH5a56HqXmj/FZH8=; b=U0mq1hnt2+SsRjDlFBy2VAEEBJqiQylHnMSO9sYFL49msQzvinYe+lpJhi6mZJQlXi8iVBU29d9cYSDNPKbQTwb1c/RF5Xeicvw61H2wDf/LiMgGoWxcTRlcQMU9dtAC227IX9JyESXiiFL2S3eZfrfjPiv/oyRIDeymcPOWi98=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:subject:content-type:content-transfer-encoding; b=Y5cs4PAfdur/mV3NQvudPXz0IK1hNFM6x9WL+rzLR9AEtSn46Q4qlmMJKVQk2HANZ+RZ6ZD8nmoxcxjKP78NfQLsI6Pzkt4UPB2UXhKHDwHid9L7mMrbK3eSucjofhGBb+kap/BtpRXwlTrmloAGI55qtDRLsf71CNZqReCaTPQ=
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
- User-agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:18.104.22.168) Gecko/20080421 Thunderbird/22.214.171.124 ThunderBrowse/126.96.36.199.1 Mnenhy/0.7.5.666
Jamie McCarthy <jamie@xxxxxxxxxxx> said on May 05, 2008 12:38 -0400
I've done even less research than Jamie had for his question and I think
have less technical background than he but ...
Please forgive me for not doing more thorough research before
emailing. I'm not part of the Tor community and not really
interested in getting too into it. I'm just looking for some quick
I came to TOR looking not so much for the ability to surf anonymously
but to convince my end target that I'm from a particular country.
Primarily to allow use of streaming media (radio and video) from sites
that restrict access to those from the United States.
I set up TOR and verified using http://torcheck.xenobite.eu/ that when
using TOR I was usually identified as coming from a different country
than my location (CANADA). From my limited understanding I would need a
means to request/require that my exit node be in a particular country
In the TheOnionRouter/TorFAQ I found these links that seem somewhat on
so ... is what I'm looking for possible?
and assuming it is ... is there any prospect that TOR would be able to
deliver enough throughput for effective streaming?
ANSWER: YES!! (google video works) so did http://www.pandora.com/
(streaming radio - not available non-US locations) but only briefly.
Maybe I was temporarily using a US-exit node? Attempting to get
streaming US television from big three www.cbs.com, www.abc.com and
www.nbc.com all failed with error messages about US-locations only. (I
was able to get one "deleted scene" from NBC but when I tried the next
one got the "you can't watch this from where you are" message)
Now that I've verified (I think) that speed is fine, is there any way to
request an exit point from a particular country?
oops ... almost missed this down at the bottom -
referred to near the top in
If you want to choose the exit node for a specific request, you can
give the hostname as hostname.nickname.exit (eg.
http://cnn.com.myfavoritetornode.exit). This will work fine if you're
using Privoxy. You can also install
Blossom, which is a client-side Tor controller that lets you specify
what country you want to exit from when accessing a given resource.
but the link to Blossom: http://afs.eecs.harvard.edu/~goodell/blossom/
gives a 404 and according to the internet archive
was last available "live" on Jun 01, 2007. Quick read there seems to say
that it used a Python script and depended on some additional web pages:
so .... is there any way for a non-technical Windows XP user to
accomplish my goal?
Our implementation of Blossom uses the onion routing network Tor as a
substrate and consists of the following components:
* Blossom itself, written in Python.
* A comprehensive web page providing the status of nodes in the
Blossom Network, including the address, capacity, operating system,
and exit policy of each Blossom forwarder. [We also have a web page
providing the status of nodes in the Tor Network.]
* edgeproxy, an HTTP proxy that provides a very basic Blossom
functionality to web browsers; this daemon relays traffic between a
web browser and another proxy such as Privoxy.
* The Blossom User Interface, which provides an intuitive way to
view web pages from the perspective of specified nodes in the Tor network.
We also have some experimental results.
Regards ... Alec -- buralex-gmail