On Tue, Jan 03, 2012 at 11:32:39AM -0800, Kevin Dyer wrote:
> >>> A sample session goes like this:
> >>> 1. The user starts a connector and a Tor client. The connector sends its
> >>>address to the facilitator, so that a proxy will know where to
> >>>connect to. (We call this step "rendezvo
>>> A sample session goes like this:
>>> 1. The user starts a connector and a Tor client. The connector sends its
>>>address to the facilitator, so that a proxy will know where to
>>>connect to. (We call this step "rendezvous.")
>>> 2. A flash proxy appears in a browser and asks the facilit
On Wed, Dec 21, 2011 at 09:31:52PM -0800, David Fifield wrote:
> A few months ago, Roger wrote about ideas for getting more bridge
> addresses
> (https://blog.torproject.org/blog/strategies-getting-more-bridge-addresses).
> One of the ideas is to make lightweight bridges that can run in a web
> br
On Wed, Dec 21, 2011 at 11:37:21PM -0800, Jacob Appelbaum wrote:
> On 12/21/2011 09:31 PM, David Fifield wrote:
> > This is our overview and demo page. Down at the bottom of the page is a
> > flash proxy badge.
> > https://crypto.stanford.edu/flashproxy/
> >
> > It's called a "flash proxy," an
On 12/21/2011 09:31 PM, David Fifield wrote:
> A few months ago, Roger wrote about ideas for getting more bridge
> addresses
> (https://blog.torproject.org/blog/strategies-getting-more-bridge-addresses).
> One of the ideas is to make lightweight bridges that can run in a web
> browser. I and some
A few months ago, Roger wrote about ideas for getting more bridge
addresses
(https://blog.torproject.org/blog/strategies-getting-more-bridge-addresses).
One of the ideas is to make lightweight bridges that can run in a web
browser. I and some others have been working on this for a few months. I
wa