The rating idea is trivially gameable. Do we assume that
all users are good citizens?
Given experience with onionland, unless you are
building your own review team, I too would be careful
with allowing random user input or believing it to have
any given percentage of good. There are already
if somebody wants to see the stats example please use this link:
https://antani.onion.to/antanistaticmap/stats/yesterday
in fact not all the nodes in the tor2web.org round robin implement it.
Giovanni
___
tor-dev mailing list
Hi,
Thank you George, Fabio and Giovanni! :)
I gathered these comments to the Google Docs:
https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing
I have wrote a comment to the each comment.
Furthermore, I modified the application:
- explained and
(resending to tor-dev because the original message didn't go through)
On 03/16/2014 11:52 PM, Yan Zhu wrote:
On 03/16/2014 07:59 PM, Gunes Acar wrote:
Dear All,
My name is Gunes Acar, a 2nd year PhD student at Computer Security and
Industrial Cryptography (COSIC) group of University of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Yan,
Glad that you're interested in the project.
It'd be very nice collaborate with you on this.
Indeed, we've been corresponding with Peter for a related project and
I mentioned my intention to work as a middleman between EFF and Tor.
In
Yawning Angel yawn...@schwanenlied.me wrote:
I just tagged the obfsclient v0.0.1 (Release)
Download at: https://github.com/Yawning/obfsclient/releases/tag/v0.0.1
[...]
Special thanks to Fabian Keil for help testing and fixing the various
release candidates.
My pleasure. Unfortunately I
Nurmi, Juha juha.nu...@ahmia.fi writes:
Hi,
Thank you George, Fabio and Giovanni! :)
I gathered these comments to the Google Docs:
https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing
I have wrote a comment to the each comment.
Furthermore, I
Hi Sukhbir,
Thanks for the quick reply and clarification.
We already have code ready for generating random
message-IDs
Yeah I saw the SHA-512 based random message-ID insertion in your
Thunderbird+Tor paper.
3. And using extension hooks with explicit calls instead of checking user
set
On 14/03/14 22:13, Sreenatha Bhatlapenumarthi wrote:
Hi there!
I am Sreenatha(lucyd). I am interested in working on Tor Weather this
summer as a part of GSoC 2014.
Hi Sreenatha! Glad to hear you're interested in Tor Weather!
Just a quick reminder about GSoC: the student application
Hi,
Gunes Acar:
Dear All,
My name is Gunes Acar, a 2nd year PhD student at Computer Security and
Industrial Cryptography (COSIC) group of University of Leuven.
I work with Prof. Claudia Diaz and study online tracking and browser
fingerprinting. I'd like to work on Panopticlick
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi Georg,
I plan to dedicate the 3 months, full time, from early June to early
September.
But I'm flexible with the dates.
I admit that doing all these might be unrealistic, maybe we can assign
priorities to different tasks.
Best,
Gunes
On Mon 17
Hi all. Just a friendly reminder that we're fast approaching the
deadline for student applications for Google Summer of Code. If you're
procrastinating until the last minute then please don't! It's better
to get an application in early so we can iterate on it with you.
Cheers! -Damian
On 17.03.2014 15:17, George Kadianakis wrote:
But now that you don't have a Search API project, what are you
going to do during the Globaleaks integration?
The search API was supposed to be a query API to the ahmia's database.
However, this is not a relevant feature at the moment.
Also, are
Hi Israel,
* Israel Leiva:
GetTor' project for the Google summer of code. I think that GetTor has a
huge impact on how to avoid censorship, and therefore it could be expanded
to do a lot more of what it does now. Here is my idea:
Thanks for your interest in Tor! That is correct, GetTor is an
Hi,
3. And using extension hooks with explicit calls instead of checking user
set configurations flags for removing timestamp data from header.
This it's
suggested will allow better handling of messages received/sent in the
background by Thunderbird.
Yes, that's correct. Figuring out
Juha Nurmi juha.nu...@ahmia.fi writes:
Also, are you sure that 1-3 workdays are sufficient to design
implement a banned domain synchronizer between tor2web and
ahmia?
Well, I cannot know that. Let's put one workweek for that. I am
hoping to spend a workday or two with Tor2web and we get
On Mon, 17 Mar 2014 13:26:25 +0100
Fabian Keil freebsd-lis...@fabiankeil.de wrote:
My pleasure. Unfortunately I apparently missed one issue on FreeBSD
8.4:
https://redports.org/~fk/20140317110212-48719-187908/obfsclient-0.0.1.log
Ah, that's a easy fix. FreeBSD 8.x's sys/cdefs.h doesn't
I do not see any paricular risk in exposing the hashed list. the
reason behind the hashed list is exactly that we want to allow
publishing without any risk to publish direct link to child porn
contents or other shit. anyhow i'm really interested in others
opinions.
i agree on the SHA-256; the
Giovanni `evilaliv3` Pellerano giovanni.peller...@evilaliv3.org
writes:
I do not see any paricular risk in exposing the hashed list. the
reason behind the hashed list is exactly that we want to allow
publishing without any risk to publish direct link to child porn
contents or other shit.
Nurmi, Juha juha.nu...@ahmia.fi writes:
Hi,
Thank you George, Fabio and Giovanni! :)
I gathered these comments to the Google Docs:
https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing
I have wrote a comment to the each comment.
Furthermore, I
Hi everyone!
Here is the release candidate 5 *and* 6 for Torsocks 2.x. Unfortunately,
right after the release 5, I've noticed a critical issue that made the
new allow inbound option misbehaved quite badly so I'm immediately
releasing rc6 containing that fix. Basically, you can ignore rc5 if you
David Goulet:
Github tarball: https://github.com/dgoulet/torsocks/archive/v2.0.0-rc6.tar.gz
TPO Tarball: https://people.torproject.org/~dgoulet/torsocks-2.0.0-rc6.tar.bz2
(sig: https://people.torproject.org/~dgoulet/torsocks-2.0.0-rc6.tar.bz2.asc)
Also available from Debian experimental:
Hi, friends!
This is another developer's meeting for working on the program tor.
(This won't cover all the other programs developed under the Tor
umbrella.)
We're going to try doing the weekly meeting on Wednesday.
The meeting time will be:
Wednesday March 12, 19:00 UTC.
(That's 3pm EST
23 matches
Mail list logo