Non corporate? >>> non navy how bout ? It has been analyzed that USG is
Authoritarian Capitalism and a hybrid of corp and gov ... > interlocked in
a special way ... hand in hand ... BFF... heart emojis

Why navy need you on tor network? Cover

On Mon, 29 Apr 2019 at 08:07, grarpamp <grarp...@gmail.com> wrote:

> >> It can be communitied, or forked.
> > Seems unlikely.
>
> Either can work if people want them to,
> that is the very point of opensource if so merited.
>
> >>> Reported bugs have been closed without action.
> >> What ticket numbers are of interest?
>
> > https://trac.torproject.org/projects/tor/ticket/24902
> > https://trac.torproject.org/projects/tor/ticket/19966
> > https://trac.torproject.org/projects/tor/ticket/24973
>
> > I can't find the one where they explicitly said that it's not worth
> fixing
> > v2-specific bugs.
>
> Statements always nice to have for reference.
> Bugs not needing architecture rework should be fixed.
>
> >>> Fetches of v2 rendezvous descriptors fail, and so OnionCat services
> are "unavailable".
> > Analysis? Not really, just lots of notices logs. Basically the same
> stuff as
> > in #19966. Lots of it.
>
> Any tickets should be revalidated using current release
> on unix, then bumped if still valid to get them fixed.
> The version issues below can be gamed as needed if applicable.
>
> > how tinc uses onion circuits vs how OnionCat does.
>
> They're just apps bound to onions, no special knowledge of tor.
> There can be things like layer 2/3/+ keepalive packets, etc
> going on depending on the app. Circuit timeout settings, etc.
>
> See also OnionBalance regarding overall subject.
>
> > Or maybe v3 onions work better than v2 onions, either because
> > they're better designed, or better supported.
>
> v2 is still in the code and will be for a long time,
> even possibly modularized for third parties indefinitely.
> So if there are v2 problems, ticket them, join together,
> and get them fixed.
>
> > It's also possible that I've tested them differently. With OnionCat, I
> was
> > using Freenet. And with tinc, I've used bittorrent. So maybe Freenet and
> > bittorrent have different enough packet dynamics.
>
> Tests should only change one variable at a time.
>
> > I initially picked that IPv4 range because of ChaosVPN. But maybe it'd be
> > better to integrate with dn42, and use IPv6
>
> IPv4 is dead, IPv6 gives much more room for people to play
> without colliding with each other or other things... lots of
> people's stacks and private usage treat RFC1918 as their own,
> not that of some third party apps (which really need to use their
> own space outside of RFC1918, etc). So you need more space.
> Overlays can use either 4/6 on clearnet and emulate either
> 4/6//N-bits for internal use, and can also setup separate instances
> integrating into each. IPv6 has some space options, and lots
> of unallocated slack space. But also search "AF_OVERLAY"
> for a grander more universal overlay interop scheme than
> even IPv6 can ever provide.
>
> > What worries me is that the Tor community will see this
>
> Though exit is and should be a priority in tor at the moment
> given the gamut of todays overlays, tor does not, should not,
> and won't have exclusive claim to that functionality in both other
> currently developing and future overlay networks.
>
> > as DDoS, and implement blocks.
>
> tor-0.3.2.9 was the last version without some statistical blocking
>
> changelog 0.3.2.10: "denial-of-service mitigation"
>
> > I wonder whether they've done that with OnionCat.
>
> No. Tor can't pick out apps like that, only patterns,
> those can be really hard for an overlay (like tor) to
> discern, and impeding of many false positive users.
>
> Fork tor if tor censors people (they've already tried to
> censor relay operators and posters for speaking freely).
> Say to a non-corporate more globally volunteer opensource tor.
> Or simply support the development of and migrate to
> better more resistant overlay networks going forward.
> Diversity in designs, and with more deployed overlay
> networks in live competition, are important.
>
> Anyway, happy hacking :)
>
-- 
<https://about.me/carimachet?promo=email_sig&utm_source=product&utm_medium=email_sig&utm_campaign=gmail_api&utm_content=thumb>
cari machet
about.me/carimachet
<https://about.me/carimachet?promo=email_sig&utm_source=product&utm_medium=email_sig&utm_campaign=gmail_api&utm_content=thumb>

Reply via email to