On 4 Aug 2015, at 00:32 , Ian Goldberg i...@cs.uwaterloo.ca wrote:
Nice work! A couple of minor comments:
On Mon, Aug 03, 2015 at 05:03:38PM +0300, George Kadianakis wrote:
A shared random document requires 50% + 1 authority signatures to be
considered valid. As this proposal is
Nice work! A couple of minor comments:
On Mon, Aug 03, 2015 at 05:03:38PM +0300, George Kadianakis wrote:
A shared random document requires 50% + 1 authority signatures to be
considered valid. As this proposal is being written, there are 9
authorities thus we would need 5.
Careful
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Tor 0.2.7.x will support Ed25519 router identities along with the
traditional 1024-bit RSA ones which will be used simultaneously for
some time, until we will completely deprecate RSA router identities.
I would like to document what Tor needs
Hi everyone,
This is just to let you know that Tor compiles without modification
using the CompCert C compiler.
This week I'll run it in the C interpreter to see what happens.
http://compcert.inria.fr/man/manual004.html#cinterp
Mansour
___
tor-dev
Hi everyone,
As I stated in my last status report, I promised to work on server-to-server
communication in preparation for a beta test. Quite a bit of work was done in
this area, with the result that the server-server protocols are now working as
intended and fairly reliably. The changes
On 4 Aug 2015, at 00:03 , George Kadianakis desnac...@riseup.net wrote:
…
3.1.2. Shared Random Document During Commitment Phase [SRDOCCOMMIT]
…
Also, an authority should not be able to register a commitment value for a
different authority. Hence, an authority X should only vote and place
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello list,
This is an announcement/reminder that there will be an IRC meeting of
the Measurement Team on
Wednesday, August 5, 2015, 14:00 UTC in #tor-project
https://www.timeanddate.com/worldclock/fixedtime.html?iso=20150805T14
Last week's