The following tickets were largely achieved (last is in process of
debugging)
- adding config file (see branch
https://github.com/TheTorProject/stegotorus/tree/f--modus-operandi)
- adding elligator handshake (
https://github.com/TheTorProject/stegotorus/tree/f--circuit-handshake) [0]
- moving
I looked at Ostel. Can Ostel be routed over Tor or is there another way to get
anonymity using Ostel?
I said decentralized VOIP because no central servers would be managing the
communications. Any Tor node could possibly be a VOIP server. The network data
would have to be continually
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Status Report 6
August 17th, 2014.
So the past couple of weeks have been a little more hectic than usual,
but these are the things that I got to work on:
1) Continuing work on fixing leak:
On the Mozilla side, I had a long discussion with snorp and
Matthew Finkel matthew.fin...@gmail.com writes:
On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote:
One missing piece of rend-spec-ng.txt [0] is a section on how HSes
should pick their Introduction Points (IPs). There are three main
questions here:
- How many IPs should an HS
Hi all
I wonder if someone might be able to help me with the above. I understand,
that to generate the digest, the PK must be encoded in PKCS#1 format. And
further to this, the public keys in the router descriptors are NOT in
PKCS#1 format, but plain ASN.1.
I'm trying to generate the
ter...@safe-mail.net:
I said decentralized VOIP because no central servers would be managing
the communications. Any Tor node could possibly be a VOIP server.
Tor is a transport network. Relays only transport data, they do not
offer services other than what's needed for Tor clients to work.
--
On Sun, 17 Aug 2014 16:19:56 +0100
Gareth Owen gareth.o...@port.ac.uk wrote:
I'm trying to generate the fingerprint given just the pubilc key in
Java and after almost a whole day I'm about to give up. Does anyone
have a sample PKCS#1 encoded public key that is used immediately
before SHA-1
Yawning
Thanks very much - you've saved me another few days down the wrong path!
It seems I was taking the onion-key not the signing key. Would never have
caught that this far down the rabbit hole without your response!
Now to work out why Tor is detecting a different identity to the SSL cert
Hello everyone,
This is the sixth and last status report of my Google Summer of Code
project, which is to implement consensus diffs for Tor.
Two weeks ago I had two main tasks left for the project to get to a
minimal functioning state. The first was to figure out a clean way to
cache old
Hi Nick,
On 25 Feb 2014, at 17:18, Nick Mathewson ni...@torproject.org wrote:
To mirror the way that authority identity keys work, we'll fully
support keeping Ed25519 identity keys offline; they'll be used to
sign long-ish term signing keys, which in turn will do all of the
heavy
10 matches
Mail list logo