[tor-dev] working back to socks_request_t

2015-05-03 Thread CJ Ess
So I'm doing a bit of an experiment, the idea being that if you have a group of tor users sharing common infrastructure then its a slightly different situation then one lone user, and you wantto emphasize that resources should not be shared, caching should be minimal and non-persistent, you need

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-03 Thread warms0x
On Sat, 2 May 2015 20:37:17 -0700 coderman coder...@gmail.com wrote: a friend and i are working on a Tor router design that doesn't compromise anonymity for convenience. [0][1][2][3][4] we're soliciting feedback as part of a go / no-go decision on continuing this effort. in particular,

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-03 Thread coderman
On 5/3/15, warms0x warm...@riseup.net wrote: ... I am bored so I figured I would read this big document, here are some comments from somebody who took the time to care: thanks! :) 1.3 Warning conditions: Is the Client privacy leak detected meaning the software would warn in the case of

Re: [tor-dev] working back to socks_request_t

2015-05-03 Thread teor
Date: Sun, 3 May 2015 12:34:51 -0400 From: CJ Ess zxcvbn4...@gmail.com On Sun, May 3, 2015 at 11:06 AM, teor teor2...@gmail.com wrote: Date: Sun, 3 May 2015 02:50:46 -0400 From: CJ Ess zxcvbn4...@gmail.com So I'm doing a bit of an experiment, the idea being that if you have a group

[tor-dev] Damian's Status Report - April 2015

2015-05-03 Thread Damian Johnson
Hi all! My April was split between SoP prep and Nyx. Changes for the later unfortunately aren't yet ready so this is gonna be a shorter status report than usual. Tor Summer of Privacy

Re: [tor-dev] design for a Tor router without anonymity compromises

2015-05-03 Thread coderman
On 5/3/15, intrigeri intrig...@boum.org wrote: ... Just to clarify, the threat model explicitly doesn't include Attacker is able to reconfigure Tor on a client system to use an arbitrary set of bridges, right? correct. neither bridges nor pluggable transports are supported. i have added a

Re: [tor-dev] working back to socks_request_t

2015-05-03 Thread teor
Date: Sun, 3 May 2015 02:50:46 -0400 From: CJ Ess zxcvbn4...@gmail.com So I'm doing a bit of an experiment, the idea being that if you have a group of tor users sharing common infrastructure then its a slightly different situation then one lone user, and you wantto emphasize that

Re: [tor-dev] working back to socks_request_t

2015-05-03 Thread CJ Ess
So underlying idea in this case is to pass thru the proxy credentials from the browser, so they don't have to be had coded in plain text in the tor config - you exit the browser and the credential goes away (or maybe its encrypted in the browser password manager), if you change your password you