On Wed, Nov 20, 2013 at 08:36:30AM -0800, Watson Ladd wrote:
Is it just me, or is this protocol MQV with the client generating a
fake long term key?
Well yeah sort of, but the details are crucial. In Improving
efficiency and simplicity of Tor circuit establishment and hidden
services (available
Am 20.11.2013 um 18:19 schrieb Paul Syverson paul.syver...@nrl.navy.mil:
These authors found a
vulnerability in that protocol, improved on it, and proved their
protocol secure.
Actually, Ian Goldberg, Douglas Stebila, and Berkant Ustaoglu found the
vulnerability in Lasse and Paul's protocol
Sorry for taking so long to respond to this thread. Responses are
(mostly) inline below.
At a training event a couple of days ago, a user was sketched out by
the warning her Mac gave her -- in spite of the advance notice she'd
been given by the trainers.
Erinn Clark wrote:
Please see Ralf's
On Wed, Nov 20, 2013 at 11:02 AM, Nick Mathewson ni...@torproject.org wrote:
Hi, all!
Here's
Incidentally, the canonical location for proposals is the torspec
repository. Since this email went out, I've applied some fixes to the
proposal to fix up some mistakes in it, and more mistakes I made.
Hi Tom,
being the admin for groups is a thankless task! I've mentioned a couple of
times that the tor project does have availability of a spare VM with unique
IPv4 for testing on. This offer has never been taken up. I'm a tester, not
a coder, as I already run a relay I'm not sure what else I can