Nicholas Hopper writes:
> On Tue, Feb 25, 2014 at 5:04 PM, Nicholas Hopper wrote:
>> Another thought: we also should investigate how various thresholds
>> affect the relationship between the cumulative guard weight total and
>> the total exit weight.
>
> Well, that turns out not to be a real iss
Tariq Elahi writes:
> Hey George,
> Glad to see that guard questions are still being asked.
> Some thoughts from your plots.
>
> On 24-Feb-14 9:06 PM, George Kadianakis wrote:
>>
>> And because release-early-release-often, here is a graph:
>> https://
Greetings humans,
this is an email to remind you that the regular biweekly pluggable
transports meeting is going to happen today. Place is the #tor-dev
IRC channel in OFTC. Time is 17:00 UTC (it's in an hour!).
Cheers!
___
tor-dev mailing list
tor-dev
Jeremy Rand writes:
> Hi Tor developers,
>
> I'm interested in participating in GSoC. I'm an undergrad majoring in
> computer science at University of Oklahoma, and I've been a major Tor
> enthusiast for years.
>
> There are two possible projects which I'm considering; I'm looking for
> some fee
Hello David,
the other day you asked for a quick way to test Linux capabilities and
pluggable transports (to combine #7875 and #8195).
What you probably want to do, is write a small script that prints the
active Linux capabilities, spawn it as a pluggable transport, and
check its output to see if
Jeremy Rand writes:
> Hi George, thanks for the reply.
>
> On 03/02/2014 06:27 AM, George Kadianakis wrote:
>> I'd like to see human-readable names in HSes, but I'm not very
>> familiar with Namecoin. I don't want to discourage you from working on
>> t
Nick Mathewson writes:
> I've revised proposal 220 based on commentary from Roger. The biggest
> changes is tweaking all of the things called "certificates" to make
> them actually follow the same format to greatest the extent possible.
>
> To see diffs, you can use git, or browse the gitweb sit
"Nurmi, Juha" writes:
> Hi All,
>
Hello,
> Ahmia.fi interested in participating in GSoC.
>
> Ahmia.fi's back-end is designed by Kordex (Mikko Kortelainen) and I (Juha
> Nurmi) have built the front-end.
>
> In practise, I will apply as a student. Also, kordex might apply.
>
Be warned, that even
Nicholas Hopper writes:
> On Tue, Feb 25, 2014 at 5:04 PM, Nicholas Hopper wrote:
>> Another thought: we also should investigate how various thresholds
>> affect the relationship between the cumulative guard weight total and
>> the total exit weight.
>
> Well, that turns out not to be a real iss
Rémi writes:
> Hy,
>
> I am currently a master student with a focus on natural language
> processing, machine learning, information retrieval and data mining.
>
> The Tor website lists a bunch of ideas, one of which is "Search Engine
> for Hidden Services"[1]. This project suits me well given my
Tariq Elahi writes:
> On 05-Mar-14 5:19 PM, George Kadianakis wrote:
>>
>> OK, let's get back to this. This subthread is blocking us from writing
>> a proposal for this project, so we should resolve it soon.
>>
>> There is one very important performance fa
irregula...@riseup.net writes:
> Hello people,
>
> I'm investigating how may we combine the traffic obfuscation provided by
> obfsproxy+scramblesuit with OpenVPN instead of Tor.
>
> I completely understand how this combination does not provide anonymity,
> but nevertheless I think it will be of so
Roger Dingledine writes:
> On Mon, Mar 10, 2014 at 06:00:13PM +0100, Marc Juarez wrote:
>> I'm a PhD student at COSIC (COmputer Security and Industrial
>> Cryptography) in KU Leuven, Belgium. My research topic is related to
>> network traffic analysis and I'm now focused in the more specific
>> p
Greetings humans,
this is an email to remind you that the regular biweekly pluggable
transports meeting is going to happen tomorrow. Place is the #tor-dev
IRC channel in OFTC. Time is 17:00 UTC.
Cheers!
___
tor-dev mailing list
tor-dev@lists.torproject.
tl;dr: analysis seems to indicate that switching to one guard node
might not be catastrophic to the performance of Tor. To improve
performance some increased guard bandwidth thresholds are proposed
that seem to help without completely destroying the anonymity of the
network. Enjoy the therapeutic q
Juha Nurmi writes:
>> And what would you like to do over the summer so that: a) Something
>> useful and concrete comes out of only 3 months of work. b) Your
>> work will also be useful after the summer ends.
>>
>> I would be interested to see some areas that you would like to work
>> on over the
"Nurmi, Juha" writes:
> Hi,
>
> Thank you George, Fabio and Giovanni! :)
>
> I gathered these comments to the Google Docs:
> https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing
>
> I have wrote a comment to the each comment.
>
> Furthermore, I modified
Juha Nurmi writes:
> On 17.03.2014 15:17, George Kadianakis wrote:
>> But now that you don't have a "Search API" project, what are you
>> going to do during the Globaleaks integration?
>
> The search API was supposed to be a query API to the ahmia's da
Juha Nurmi writes:
Also, are you sure that 1-3 workdays are sufficient to design &
implement a banned domain synchronizer between tor2web and
ahmia?
>>>
>>> Well, I cannot know that. Let's put one workweek for that. I am
>>> hoping to spend a workday or two with Tor2web and we ge
"Giovanni `evilaliv3` Pellerano"
writes:
> I do not see any paricular risk in exposing the hashed list. the
> reason behind the hashed list is exactly that we want to allow
> publishing without any risk to publish direct link to child porn
> contents or other shit. anyhow i'm really interested in
"Nurmi, Juha" writes:
> Hi,
>
> Thank you George, Fabio and Giovanni! :)
>
> I gathered these comments to the Google Docs:
> https://docs.google.com/document/d/1XB42HM4uESYBAnoHHRuaqKMP64VFDI91Qa-CtIuye2E/edit?usp=sharing
>
> I have wrote a comment to the each comment.
>
> Furthermore, I modified
Frank Young writes:
> I have noticed that since the release of version 0.2.4.18-rc - 2013-11-16,
> Attempts to fetch v2 rendezvous service descriptor are failing.
> The issue seems to get worse as many people are updating their clients.
>
> The calculation of decriptor ids based on specification
Replying to some new additions in the proposal:
> Thanks asn! "Ask help from organizations that are crawling" Today I
> emailed to duckduckgo and asked is there an easy way to search new
> .onions using their search engine. "Checking out the backlinks from
> public WWW" With known onion address it
Roger Dingledine writes:
> On Thu, Mar 13, 2014 at 10:21:38PM +0000, George Kadianakis wrote:
>> From {2}, we see that the Tor network has 6000MiB/s advertised guard
>> bandwidth (orange line), but supposedly is only using the 3500MiB/s
>> (yellow line). This means, that s
I promised Nick I would have something for him by today's little-t-tor
meeting.
Here is a draft of the guard node security proposal.
Definitely needs more work:
Filename: xxx-single-guard-node.txt
Title: The move to a single guard node
Author: George Kadianakis
Created: 2014-03-22
Status:
Greetings humans,
this is an email to remind you that the regular biweekly pluggable
transports meeting is going to happen tomorrow. Place is the #tor-dev
IRC channel in OFTC. Time is 17:00 UTC.
Cheers!
___
tor-dev mailing list
tor-dev@lists.torproject.
Hello people of the Trac,
could you make us some Trac components for some PT projects?
Specifically, it would be great if you could make us the following components:
a) "meek"
b) "FTE"
c) "obfsclient"
Thank you!
___
tor-dev mailing list
tor-dev@lists.t
Nicholas Hopper writes:
> I think I'll have more to say later, but...
>
> On Wed, Mar 26, 2014 at 11:36 AM, George Kadianakis
> wrote:
>> 1.3. Age of guard as a factor on guard probabilities
>>
>>By increasing the guard rotation period we also increase
Greetings humans,
this is an email to remind you that the regular biweekly pluggable
transports meeting is going to happen today. Place is the #tor-dev
IRC channel in OFTC. Time is 17:00 UTC.
Cheers!
___
tor-dev mailing list
tor-dev@lists.torproject.org
> On Mon, Apr 7, 2014 at 11:34 AM, George Kadianakis > So, based on your
> response, IIUC, the idea is that because young
> > guards are underutilized, we want to increase the probability of them
> > being chosen in non-guard positions, so that they become more utilized
>
Yawning Angel writes:
> Hello,
>
> The topic of routing pluggable transports through other proxys (SOCKS
> and HTTP CONNECT) has come up a few times recent, both as bug reports
> from users and as something that probably should be done to round out
> the pluggable transport concept since they wil
Nicholas Hopper writes:
> On Fri, Apr 11, 2014 at 7:45 AM, George Kadianakis
> wrote:
>> I see. That makes sense, I think.
>
> Good.
>
>> I will ponder on this a bit more, and then edit the proposal.
>
> When/if you become convinced, let me know if you want m
Ximin Luo writes:
> ## Background
>
> Pluggable Transports are proxy programs that help users bypass censorship.
>
> [App client] -> XXX EVIL CENSOR HAS YOU XXX ACCESS DENIED XXX
> [App client] -> [PT client] -> (the cloud!) -> [PT server] -> [App server]
>
> The structural design, on the client
Juha Nurmi writes:
> Hi,
>
> I'm a student who is starting to work with ahmia.fi search engine as a
> part of Google Summer of Code. :)
>
> The proposal is online here https://ahmia.fi/gsoc/
>
> In practise, I have now time and funding to develop my search engine.
> George is my primary mentor an
Hello friends,
just wanted to remind you that the regular biewekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC.
Place is the #tor-dev IRC channel in OFTC.
Please note that we *changed* the time from 17:00 to 16:00 UTC.
Thanks!
Juha Nurmi writes:
> On 22.04.2014 17:35, George Kadianakis wrote:
>> Enjoy GSoC :)
>
> I will :)
>
>> BTW, looking again at your proposal, I see that you are going to
>> do both popularity tracking and backlinks.
>
> Yes, another crawler gathers backlinks fr
Nicholas Hopper writes:
> On Tue, Apr 15, 2014 at 6:35 AM, George Kadianakis
> wrote:
>> A patch for the proposal would be useful. If you don't have time to do
>> it, just tell me and I will do it myself.
>
> Here's a patch:
> https://www-users.cs.um
Kevin P Dyer writes:
> Hi Mike,
>
> It looks like [1] broke FTE [2].
>
> Can you hold off on pushing any releases public, until we resolve #11629?
>
> George - Can we revert obfsproxy back to 0.2.4, to give me time to sort
> this out?
>
Sure, that seems reasonable for now. Could you ensure that
Christopher Baines writes:
> On 08/10/13 06:52, Christopher Baines wrote:
>> I have been looking at doing some work on Tor as part of my degree, and
>> more specifically, looking at Hidden Services. One of the issues where I
>> believe I might be able to make some progress, is the Hidden Service
Hello friends,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC.
Place is the #tor-dev IRC channel in the OFTC network.
Please note that we recently *changed* the time from 17:00 to 16:00 UTC.
Thanks!
___
waldo writes:
> El 02/05/14 02:34, Christopher Baines escribió:
>> On 02/05/14 00:45, waldo wrote:
>>> El 30/04/14 17:06, Christopher Baines escribió:
On 08/10/13 06:52, Christopher Baines wrote:
> I have been looking at doing some work on Tor as part of my degree, and
> more specifi
Michael Rogers writes:
> On 10/05/14 21:09, George Kadianakis wrote:
>> It's interesting that you say this, because we pretty much took
>> the opposite approach with guard nodes. That is, the plan is to
>> extend their rotation period to 9 months (from the current 2-3
Hello friends,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur today at 16:00 UTC.
Place is the #tor-dev IRC channel in the OFTC network.
Please note that we recently *changed* the time from 17:00 to 16:00 UTC.
Thanks!
__
Marc Juarez writes:
> Hi all,
>
> I am a GSoC student working in a new PT for the development of future
> Website Fingerprinting countermeasures in Tor.
>
> The PT is not targeting any specific defense, but to link padding
> defenses in general. The idea is to implement a set of primitives that
>
Hello Ian,
hope you are well :)
I have a question wrt a new PT and ntor.
Yawning Angel has been developing a new PT called obfs4 (temp name),
which is basically scramblesuit using ntor and elligator2. This
results in better performance than UniformDH.
You can find the spec of obfs4 here:
https:
Ian Goldberg writes:
> On Sat, May 31, 2014 at 05:51:16PM +0100, George Kadianakis wrote:
>> Hello Ian,
>>
>> hope you are well :)
>>
>> I have a question wrt a new PT and ntor.
>>
>> Yawning Angel has been developing a new PT called obfs4 (temp na
Nick Mathewson writes:
> Hi, all!
>
> I noticed that proposal 236 doesn't mention directory guards. (See
> proposal 207, implemented in Tor 0.2.4.) I think that we should
> consider retaining multiple directory guards while going to a single
> guard for multi-hop circuits.
>
> My rationale here
Hello friends,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur today at 16:00 UTC.
Place is the #tor-dev IRC channel in the OFTC network.
Please note that we recently *changed* the time from 17:00 to 16:00 UTC.
Thanks!
__
Nicholas Hopper writes:
> On Mon, May 5, 2014 at 12:07 PM, Nick Mathewson wrote:
>> I noticed that proposal 236 doesn't mention directory guards. (See
>> proposal 207, implemented in Tor 0.2.4.) I think that we should
>> consider retaining multiple directory guards while going to a single
>> gu
Hello friends,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur today at 16:00 UTC.
Place is the #tor-dev IRC channel in the OFTC network.
Thanks!
___
tor-dev mailing list
tor-dev@lists.torproject.org
ht
During our meeting in Iceland, we talked a lot about guard nodes. Some
of that discussion eventually turned into proposal 236 [0].
During our discussions, we looked into the state file of Roger, and we
noticed that there are 50 or so guard nodes in there. And that made us
wonder: "Why does Roger h
Hello friends,
the PT meeting last week was a bit quiet because it was conflicting
with the Tor dev meeting.
To compensate for that, we are thinking of throwing an extra PT
meeting this Friday. The agenda can be modified according to the
participants, but we are planning to spend some time writin
Hey Nick,
this mail is about the schemes we were discussing during the dev
meeting on how to protect HSes against guard discovery attacks (#9001).
I think we have some ideas on how to offer better protection against
such attacks, mainly by keeping our middle nodes more static than we
do currently
"Sebastian G. " writes:
> 11.07.2014 14:31, Ian Goldberg:
>> On Fri, Jul 11, 2014 at 01:44:36PM +0300, George Kadianakis wrote:
>>> Hey Nick,
>>>
>>> this mail is about the schemes we were discussing during the dev
>>> meeting on how
Hello Roger and Nick,
as far as I know, bridge support was hastily implemented in
little-t-tor, and it does not support all the features we would like
it to support.
During the dev meeting roadmapping, we added a task about improving
the bridge implementation in Tor. Some of the items in the task
Ian Goldberg writes:
> On Fri, Jul 11, 2014 at 01:44:36PM +0300, George Kadianakis wrote:
>> Hey Nick,
>>
>> this mail is about the schemes we were discussing during the dev
>> meeting on how to protect HSes against guard discovery attacks (#9001).
>>
>&g
Hello!
It seems that many PT people (including me) won't be able to attend
the scheduled PT meeting this Friday.
For this reason, we are calling this meeting off.
Feel free to lurk in IRC in any case. Maybe someone will want to talk
PT with you even if there is no scheduled meeting :)
Thanks an
Am 2014-06-10 02:26, schrieb Virgil Griffith:
> For a while I've been seeking to grow the Tor network in both size and
> goodput. Towards this end, I've explored various avenues such as
> increasing user-awareness via tor2web. More recently, I've been exploring
> financial incentives like TorCoin
Hello brothers and sisters,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC.
Place is the #tor-dev IRC channel in the OFTC network.
Thanks!
___
tor-dev mailing list
tor-dev@lists.t
Matthew Finkel writes:
> Hi All,
>
> Below is a draft proposal for making all relays also be directory
> servers (by default). It's almost ready for a number, but it can use
> some feedback beforehand (give or take a few days).
>
> Tonight I also found that Nick actually created a similar proposa
One of the aims of proposal 236 is to reduce the period of
inactiveness when a relay becomes a guard (see 'Phase three' of
[0]). This phenomenon will become worse when the lifetime of the guard
gets increased to 9 months, so we need to find a good fix.
Proposal 236 tries to make young guards more
Nicholas Hopper writes:
> On Thu, Jul 31, 2014 at 11:24 AM, George Kadianakis
> wrote:
>> - You can see that old guards (like RichardFeynman) see a shrinkage
>> both on their guard and on their middle probabilities. This happens
>> because both the total guard wei
Nicholas Hopper writes:
> On Thu, Jul 31, 2014 at 11:24 AM, George Kadianakis
> wrote:
>> - You can see that old guards (like RichardFeynman) see a shrinkage
>> both on their guard and on their middle probabilities. This happens
>> because both the total guard wei
Hello list,
in my monthly status report [0] I mentioned that some PT-related parts
of the website are in need of improvement. As a response, a few people
sent me a private email asking me what kind of improvements I was
thinking about. Instead of replying individually, I decided to send a
mail to
tl;dr: From now on, Tor PT meetings happen on Wednesdays. Same time.
Next PT meeting: Wednesday 13th of August, at 16:00 UTC.
Hello friends,
I want to inform you of a schedule change that affects Pluggable
Transport meetings.
Because of the diverse set of timezones participating in the bi
tibi...@riseup.net writes:
> Hi everyone,
>
> Is there any project in little-t tor that needs another hacker? I have
> (under another name) been writing tor unit tests, which I've "finished".
> What should I work on next? Happy to work on either new code or more unit
> tests.
>
FWIW, if you want
Gareth Owen writes:
> Hi all
>
> I thought I'd give you an update on where the Tor Research Framework is now
> at as there's been lots of development over the last few weeks. At present,
> the framework is a largely fully functional tor client with code that is
> easy to read, follow and cruciall
One missing piece of rend-spec-ng.txt [0] is a section on how HSes
should pick their Introduction Points (IPs). There are three main
questions here:
- How many IPs should an HS have?
- Which relays can be IPs?
- What's the lifetime of an IP?
==Introduction Points attacks==
Before exploring thes
Hola brothers and sisters,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
As you see, the meeting day was recently changed from Fridays to
Wednesdays:
https://lists.
Gareth Owen writes:
> Hi George
>
> Thanks for your reply and information+links. Tim (cc-ed) is leading the
> work on the fuzzer and is looking at a couple of different frameworks.
> I've set up a example that can do port-forwarding to a BEGIN_DIR service
> - so you can just point a fuzzer at
Tim writes:
>> On 13 Aug 2014, at 0:10, George Kadianakis wrote:
>>
>> Gareth Owen writes:
> ...
>>> The framework implements the tor protocol so should be easy to modify to do
>>> fuzzing of the actual protocol but I'm skeptical how successful thi
Hello friends :)
This is a post to discuss how Tor should treat its entry guards when
its network goes down. This is part of ticket #12595 [0] which aims to
design better interfaces and data structures for entry guards.
This thread investigates what should happen when the network goes down
and To
Tim writes:
> On 13 Aug 2014, at 22:33 , George Kadianakis wrote:
>
>> My plan was to make a Peach fuzzer to achieve this [0], but as I
>> mentioned in a previous email I never got past the V3 link handshake
>> since I actually had to implement Tor's crypto to g
Matthew Finkel writes:
> On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote:
>> One missing piece of rend-spec-ng.txt [0] is a section on how HSes
>> should pick their Introduction Points (IPs). There are three main
>> questions here:
>> - How
d and the number of months considered
should also be mentioned somewhere in the votes?
>From de60f2daaab573912fcd78057a93bc7e12eda96c Mon Sep 17 00:00:00 2001
From: George Kadianakis
Date: Thu, 21 Aug 2014 13:24:11 +0300
Subject: [PATCH] Specify how Guard Appearance Fraction voting shou
George Kadianakis writes:
> I inline a patch that specifies how voting should happen in proposal 236.
>
> The changes reflect a discussion I had yesterday with nickm during the
> Tor IRC meeting.
>
> BTW, while I like the simplicity of the new vote (just an integer),
> I
Hola brothers and sisters,
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
As you see, the meeting day was recently changed from Fridays to
Wednesdays:
https://lists.
Tim writes:
> On 13 Aug 2014, at 22:33 , George Kadianakis wrote:
>
>> My plan was to make a Peach fuzzer to achieve this [0], but as I
>> mentioned in a previous email I never got past the V3 link handshake
>> since I actually had to implement Tor's crypto to g
Paul Syverson writes:
> On Fri, Jul 11, 2014 at 08:31:05AM -0400, Ian Goldberg wrote:
>> On Fri, Jul 11, 2014 at 01:44:36PM +0300, George Kadianakis wrote:
>> > Hey Nick,
>> >
>> > this mail is about the schemes we were discussing during the dev
>> >
Michael Rogers writes:
> On 13/09/14 14:07, George Kadianakis wrote:
>> a) To reduce the ownage probabilities we could pick a single
>> middle node instead of 6. That will greatly improve guard
>> discovery probabilities, and make us look like this:
>>
>> HS -&
==Guardiness: Yet another external dirauth script==
Introduction
One well-known problem with Tor relays, is that Guards will suffer a
big loss of traffic as soon as they get the Guard flag. This happens
because clients pick guards every 2-3 months, so young guards will not
get picked by o
Damian Johnson writes:
>> - Q: Why do you slow stem instead of parsing consensuses with Python on your
>> own?
>>
>> This is another part where I might have taken the wrong design
>> decision, but I decided to not get into the consensus parsing business
>> and just rely on stem.
>>
>> This is al
Sebastian Hahn writes:
> On 16 Sep 2014, at 16:15, George Kadianakis wrote:
>> How guardiness works
>> The idea was that the guardiness script will be an external script
>> that is run by Tor in a similar fashion to the bandwidth auth
>> scripts. We chose that
Nicholas Hopper writes:
> On Tue, Apr 15, 2014 at 6:35 AM, George Kadianakis
> wrote:
>> A patch for the proposal would be useful. If you don't have time to do
>> it, just tell me and I will do it myself.
>
> Here's a patch:
> https://www-users.cs.umn.edu/
George Kadianakis writes:
> Damian Johnson writes:
>
>>> - Q: Why do you slow stem instead of parsing consensuses with Python on
>>> your own?
>>>
>>> This is another part where I might have taken the wrong design
>>> decision, but I dec
George Kadianakis writes:
> ==Guardiness: Yet another external dirauth script==
>
> Introduction
>
> One well-known problem with Tor relays, is that Guards will suffer a
> big loss of traffic as soon as they get the Guard flag. This happens
> because clients pick gu
Roger Dingledine writes:
> On Sat, Sep 13, 2014 at 04:07:13PM +0300, George Kadianakis wrote:
>> So let's say that along with our guard, we also pick 6 second-tier
>> guards (middle nodes) that also get pinned for 2-3 months. This makes
>> us look like this:
>
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur today at 16:00 UTC. Place is the
#tor-dev IRC channel in the OFTC network.
As you see, the meeting day was recently changed from Fridays to
Wednesdays:
https://lists.torproject.org/pipermai
== What is bridge reachability data? ==
By bridge reachability data I'm referring to information about which
Tor bridges are censored in different parts of the world.
The OONI project has been developing a test that allows probes in
censored countries to test which bridges are blocked and which a
I attach a patch that adds a link to Nick Hopper's proof of the
keyblinding scheme in rend-spec-ng.txt.
Thanks!
>From 2bc39a9721ed9639220b9c94c62d52cc5affd12b Mon Sep 17 00:00:00 2001
From: George Kadianakis
Date: Mon, 6 Oct 2014 21:29:14 +0100
Subject: [PATCH] rend-spec-ng: Link
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur today at 16:00 UTC. Place is the
#tor-dev IRC channel in the OFTC network.
Thanks for your attention!
___
tor-dev mailing list
tor-dev@lists.torpr
George Kadianakis writes:
> George Kadianakis writes:
>
>> ==Guardiness: Yet another external dirauth script==
>>
>>
>>
>
> FWIW, a weasel suggested to me a potentially better solution than the
> iffy summary files.
>
> He suggested parsing consensu
Hello,
this is an attempt to collect tasks that should be done for
SponsorR. You can find the SponsorR page here:
https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
I'm going to focus only on the subset of those categories that
Roger/David told me are the most important for the s
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
___
tor-dev mailing list
tor-dev@lists.to
Virgil Griffith writes:
>> - Opt-in HS indexing service
>
> I offer to captain and lead development of this one.
>
Thanks for offering to help!
My main goal with this project would be to increase visibility of
Hidden Services: make it easy for people to find Hidden Services that
want to be foun
Christopher Baines writes:
> On 20/10/14 14:37, George Kadianakis wrote:
>> f) On a more researchy tone, this might also be a good point to start
>>poking at the HS scalability project since it will really affect HS
>>performance.
>>
>>We should look
Griffin Boyce writes:
> Roger Dingledine wrote:
>
>
>
>
>>> - #8902 Rumors that hidden services have trouble scaling to 100
>>> concurrent connections
>
> I've been curious about this ticket for a while, and happy to
> structure&run a follow-up test on a controlled server. Since the
> ori
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
___
tor-dev mailing list
tor-dev@lists.to
"A. Johnson" writes:
>> As I've suggested before, I really really think you should also analyze
>> an I2P-like scheme where HSs try really hard to maintain path
>> persistence to their RPs for some fixed time period on the order of an
>> hour (but which can be parameterized and analyzed to give t
Hello,
inspired by the recent discussions on guard discovery, I went ahead
and implemented a small patch for Tor that tries to help defend
against Hidden Service guard discovery attacks.
It basically allows the operator to specify a set of nodes that will
be pinned as middle nodes in Hidden Servi
301 - 400 of 584 matches
Mail list logo