On 08/29/2010 09:21 PM, Gregory Maxwell wrote:
> Tcpcrypt (http://tcpcrypt.org/) proposes a new extension to TCP to
> enable opportunistic encryption with optional authentication. From a
> features and performance perspective, it's probably exactly what we
> need to get away from the almost-everyth
Tcpcrypt (http://tcpcrypt.org/) proposes a new extension to TCP to
enable opportunistic encryption with optional authentication. From a
features and performance perspective, it's probably exactly what we
need to get away from the almost-everything-in-the-clear Internet that
we have today.
Unfortun
Thus spake Gregory Maxwell (gmaxw...@gmail.com):
> On Sun, Aug 29, 2010 at 3:54 AM, Mike Perry wrote:
> [snip]
> > Any classifier needs enough bits to differentiate between two
> > potentially coincident events. This is also why Tor's fixed packet
> > size performs better against known fingerprin
Thus spake Paul Syverson (syver...@itd.nrl.navy.mil):
> On Sun, Aug 29, 2010 at 12:54:59AM -0700, Mike Perry wrote:
> > Any classifier needs enough bits to differentiate between two
> > potentially coincident events. This is also why Tor's fixed packet
> > size performs better against known finger
On Sat, Aug 28, 2010 at 3:25 PM, intrigeri wrote:
>...
> Please don't misunderstand me. I'm not a fan of VM-based solutions and
> pretty much prefer the bare-metal + Live OS approach, but I feel we
> need to consider their pros and cons in a more detailed way than
> discarding them on the assumpti
On Sat, Aug 28, 2010 at 3:25 PM, intrigeri wrote:
> ...
> Another "cost" mentioned by coderman was "elevated privs for
> accelerated virtualization / para-virtualization". AFAIK VirtualBox
> does not need any special privileges (once the kernel part of the
> software is installed, and the modules/
On Sun, 29 Aug 2010 00:25 +0200, "intrigeri" wrote:
> Hi,
>
> Gregory Maxwell wrote (22 Aug 2010 00:55:49 GMT) :
> > I think it's obvious that the best way of using tor is running your
> > torrified apps in a VM which can only access the outside world via
> > TOR.
>
> I doubt there is somethin
On Sun, Aug 29, 2010 at 12:54:59AM -0700, Mike Perry wrote:
> Thus spake Paul Syverson (syver...@itd.nrl.navy.mil):
>
> > > For those who want more background, you can read more at item #1 on
> > > https://www.torproject.org/research.html.en#Ideas
> > > (I hoped to transition
> > > https://www.tor
Hi,
Gregory Maxwell wrote (22 Aug 2010 00:55:49 GMT) :
> I think it's obvious that the best way of using tor is running your
> torrified apps in a VM which can only access the outside world via
> TOR.
I doubt there is something like "the" best way of using Tor. One
always needs to balance the ris
On Sun, Aug 29, 2010 at 3:54 AM, Mike Perry wrote:
[snip]
> Any classifier needs enough bits to differentiate between two
> potentially coincident events. This is also why Tor's fixed packet
> size performs better against known fingerprinting attacks. Because
> we've truncated the lower 8 bits off
Thus spake Paul Syverson (syver...@itd.nrl.navy.mil):
> > For those who want more background, you can read more at item #1 on
> > https://www.torproject.org/research.html.en#Ideas
> > (I hoped to transition
> > https://www.torproject.org/volunteer.html.en#Research over to that new
> > page, but ha
11 matches
Mail list logo