The Eudyptula Challenge is for kernel hacking and was inspired by the
Matasano Challenges.
I hear that several patches are already being submitted to the Linux
kernel thanks to its onboarding process nature.
http://eudyptula-challenge.org/
Would something like this make sense for Tor? Is there
Hello list,
There's a meeting [1] of one or two dozen delegate countries
relating to Internet governance in Sao Paulo next week.
A typical discussion topic is UNESCO's proposal [2] (search
for 'privacy' or 'anonymity'.)
Maybe a little off topic here, but this could be considered
of peripheral
[1] http://www.netmundial.br/
[2]
http://content.netmundial.br/contribution/unesco-comprehensive-study-on-internet-related-issues-draft-concept-paper-proposed-by-the-secretariat-for-consultations/155/
The full paper is at wikileaks.
___
tor-dev
On 16/04/14 15:56, George Kadianakis wrote:
Ximin Luo infini...@torproject.org writes:
snip
So instead of having, as currently:
(old, hacky) Bridge flashproxy (dummy addr)
We would have the following cases:
(1) Bridge flashproxy (real addr)
(2) Bridge flashproxy (real addr)
On 16/04/14 16:11, Ximin Luo wrote:
On 16/04/14 15:56, George Kadianakis wrote:
Ximin Luo infini...@torproject.org writes:
Hm, but this kind of kills the magic of indirect PTs, right? That is,
users who want to use flashproxy in the way above, will have to know
an address or a fingerprint of