I agree as well and have discussed this use case with NRL colleagues for a
while now. Some thoughts that we have had:
1. “Encrypted service” is a terrible name because it sounds like its only
providing encryption and also is too generic. The idea needs a name that
communicates that it is
George Kadianakis desnac...@riseup.net writes:
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
FWIW, I skimmed the thread and collected all the tasks that
On 10/20/14 3:37 PM, George Kadianakis wrote:
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
[snip]
== Performance Improvements ==
This is the most juicy
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/25/2014 06:19 AM, George Kadianakis wrote:
George Kadianakis desnac...@riseup.net writes:
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
Fabio Pietrosanti - lists li...@infosecurity.ch writes:
On 10/20/14 3:37 PM, George Kadianakis wrote:
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
[snip]
On 29/10/14 13:01, George Kadianakis wrote:
Christopher Baines cbain...@gmail.com writes:
On 20/10/14 14:37, George Kadianakis wrote:
f) On a more researchy tone, this might also be a good point to start
poking at the HS scalability project since it will really affect HS
performance.
Christopher Baines cbain...@gmail.com writes:
On 20/10/14 14:37, George Kadianakis wrote:
f) On a more researchy tone, this might also be a good point to start
poking at the HS scalability project since it will really affect HS
performance.
We should look at Christopher Baines'
Nick Mathewson ni...@torproject.org writes:
On Mon, Oct 20, 2014 at 9:37 AM, George Kadianakis desnac...@riseup.net
wrote:
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
Any Twisted application written in a network endpoint agnostic manner
may be used with the txtorcon hidden service endpoint...
For instance serving files from a Tor hidden service can be done with
Meejah's one-liner:
pip install txtorcon twistd -n web --port onion:80 --path ~/public_html
However
correction... I meant #11291.
On Wed, Oct 29, 2014 at 1:04 AM, David Stainton dstainton...@gmail.com wrote:
Any Twisted application written in a network endpoint agnostic manner
may be used with the txtorcon hidden service endpoint...
For instance serving files from a Tor hidden service can
Hi all,
NRL is effectively partnered with the Tor Project Inc. for the
SponsorR efforts. Our (NRL's) tasking is largely overlapping and
somewhat complementary to that of TPI. As such I thought it would be
good to mention the basics of what we are working on to better inform
and coordinate the
Virgil Griffith i...@virgil.gr writes:
- Opt-in HS indexing service
I offer to captain and lead development of this one.
Thanks for offering to help!
My main goal with this project would be to increase visibility of
Hidden Services: make it easy for people to find Hidden Services that
want
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
George Kadianakis wrote:
== Opt-in HS indexing service ==
This seems like a fun project that can be used in various ways in
the future. Of course, the feature must remain opt-in so that only
services that want to be public will surface.
On Mon, Oct 20, 2014 at 02:37:49PM +0100, George Kadianakis wrote:
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
Thanks for getting this going!
== Safe statistics
Roger Dingledine wrote:
h) Back to the community again. There have recently appeared a few
messaging protocols that are inherently using HSes to provide link
layer confidentiality and anonymity [1]. Examples include Pond,
Ricochet and TorChat.
There are also a fair few IRC and XMPP
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
I'm going to focus only on the subset of those categories that
Roger/David told me are the most important for the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/20/2014 08:37 AM, George Kadianakis wrote:
If we are more experimental, we can even build a basic petname
system using the HS authority [2]. Maybe just a simple NAME -
PUBKEY database where HSes can register themselves in a FIFO
fashion.
On Oct 20, 2014, at 7:37 AM, George Kadianakis desnac...@riseup.net wrote:
d) There are various projects that are using HSes these days (TorChat,
Pond, GlobaLeaks, Ricochet, etc.). We should think whether we want
to support these use cases and how we can make their life easier.
For
[Removed tor-dev from cc]
On Mon, Oct 20, 2014 at 9:37 AM, George Kadianakis desnac...@riseup.net wrote:
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
Hi!
- Opt-in HS indexing service
I offer to captain and lead development of this one.
-V
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
20 matches
Mail list logo