-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 14/07/14 23:29, isis wrote:
Yep, the idea is pretty old. A variant of it was even written up
into RFC1751 in 1994. [0] That one is already in the pycrypto
module, [1] at `Crypto.Util.RFC1751`.
Some people on the messag...@moderncrypto.org
Sebastian Hahn transcribed 2.5K bytes:
On 05 Jul 2014, at 15:08, Roman Mamedov r...@romanrm.net wrote:
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation
Hi there,
Am 05.07.2014 um 15:08 schrieb Roman Mamedov r...@romanrm.net:
Well, what is the format of a E-Mail response with a bridge list?
If it's just plain text, why not instead send them as a picture in attachment,
with bridge IP addresses encoded in CAPTCHA style to not be
On Sat, Jul 5, 2014 at 12:36 AM, isis i...@torproject.org wrote:
Ergo, as Jacob has pointed out to me, the regexes which are released should be
assumed to be several years out of date, and also shouldn't be assumed to be
representative of the entire ruleset of any deployed XKS system.
The
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets, however we shouldn't do anything that will hurt our users nor
should be
On 05 Jul 2014, at 15:08, Roman Mamedov r...@romanrm.net wrote:
On Sat, 5 Jul 2014 03:59:28 +
Matthew Finkel matthew.fin...@gmail.com wrote:
This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets,
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Eugen Leitl transcribed 5.8K bytes:
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014