[tor-dev] only one signature on TBB 3.6.4

2014-08-15 Thread Leif Ryge
Looking at https://www.torproject.org/dist/torbrowser/3.6.4/ I see that there is currently only one signature on sha256sums.txt for this release. As far as I can remember, every other stable release in the 3.x series has had signatures from at least 3 people. Is this an aberation or should users

[tor-dev] [PATCH 1/4] Remove some unused variables

2014-08-15 Thread Daniel Martí
Signed-off-by: Daniel Martí mv...@mvdan.cc --- lib/chutney/TorNet.py | 5 ++--- lib/chutney/Traffic.py | 1 - 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/lib/chutney/TorNet.py b/lib/chutney/TorNet.py index 3685ec0..9d8efd1 100644 --- a/lib/chutney/TorNet.py +++

Re: [tor-dev] RPM: migration to systemd service

2014-08-15 Thread Ondrej Mikle
On Thu, Aug 14, 2014 at 4:47 PM, Nusenu bm-2d8wmevggvy76je1wxnpfo8srpzt5yg...@bitmessage.ch wrote: Ondrej Mikle: If possible, I'd like to avoid the if-defs. Do you perhaps have a tip how to make the spec file nice and have it work both with old startup script and systemd? Maybe some

Re: [tor-dev] On picking Introduction Points in Next Generation Hidden Services

2014-08-15 Thread Matthew Finkel
On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote: One missing piece of rend-spec-ng.txt [0] is a section on how HSes should pick their Introduction Points (IPs). There are three main questions here: - How many IPs should an HS have? - Which relays can be IPs? - What's the

[tor-dev] [GSoC 2014] Revamp GetTor status update #6

2014-08-15 Thread Israel Leiva
Hi people. This is my sixth and last report for the 'Revamp GetTor' GSoC project. I'll try to summarize what I've done in the last two weeks. If you have any comments, please tell me! Achievements: [*] Solved pending issues on the XMPP module, and tested it on a couple more providers. [*]

Re: [tor-dev] Guard nodes and network down events

2014-08-15 Thread Matthew Finkel
On Wed, Aug 13, 2014 at 03:47:43PM +0300, George Kadianakis wrote: Hello friends :) This is a post to discuss how Tor should treat its entry guards when its network goes down. This is part of ticket #12595 [0] which aims to design better interfaces and data structures for entry guards.

[tor-dev] Decentralized VOIP over Tor

2014-08-15 Thread terryz
Hi, I'm interested an anonymous decentralized VOIP network on Tor. All traffic routed through Tor. Every Tor user being an optional server for PTT or Continuous Speech. How feasible does this sound? --TZ ___ tor-dev mailing list

Re: [tor-dev] Decentralized VOIP over Tor

2014-08-15 Thread Jordan
Hi, terryz, Thanks for the idea! Today I was actually wondering if *video* were possible, too. :-D Guardian project has [Ostel](https://guardianproject.info/apps/ostel/). Is that what you're wanting? If not, was there a feature you were wanting from Ostel or another application that has

Re: [tor-dev] Decentralized VOIP (or video chat) over Tor

2014-08-15 Thread Griffin Boyce
This is similar, though not *quite* the same. A while back ioerror released FreeNote[1], which makes it easier to broadcast audio and video on a hidden service. This is a pretty cool idea and works pretty well. AND it should be pointed out that two one-way conversations can be a two-way