do
generalised EdDSA with Ristretto, [1] since the cofactor is elliminated.
I've been working with Trevor on this, it's called D.A.V.R.O.S. and it'll
be done… (as) soon (as I have more free time to finish it).
[0]: https://signal.org/docs/specifications/xedds
25479
[1]:
https://msdn.microsoft.com/en-us/library/windows/desktop/ms683472(v=vs.85).aspx)
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys
teor transcribed 0.7K bytes:
> I'm sorry, I didn't get Isis' original email, I think my spam folder ate it.
>
> Can you please re-send?
Of course! I actually didn't get a copy either; not sure what happened there.
- Forwarded message from isis agora lovecruft <i...@patternsi
debian.net/tor-meeting/2018/tor-meeting.2018-02-20-23.11.html
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
D
F)
2. Directory document keywords MUST be printable ASCII.
3. This change may break some descriptor/consensus/document parsers.
If you are the maintainer of a parser, you may want to start
thinking about this now.
[0]:
http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-02-12-21.0
82-remove-named-from-consensus.txt
¹ Please note that even if your name is not {isis,teor,nickm} that you are
warmly welcome to attend and participate.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2
ls/267-tor-consensus-transparency.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital
/torspec.git/tree/proposals/239-consensus-hash-chaining.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description
This one is in #tor-meeting, next Monday, 12 February from 21:00-22:00 UTC.
In local times:
* Monday, 12 February 13:00-14:00 PST
* Monday, 12 February 16:00-17:00 EST
* Monday, 12 February 22:00-23:00 CET
* Tuesday, 13 February 08:00-09:00 AEST
isis agora lovecruft transcribed 2.3K bytes
Reminder to please vote for a time for this if you'd still like to attend!
isis agora lovecruft transcribed 2.2K bytes:
> Hello,
>
> Let's schedule a proposal discussion for prop#285 "Directory documents
> should be standardized as UTF-8" [0] sometime between 12 - 13 Feb.
This is happening in #tor-meeting on Thursday, 8 February, 21:00-22:00 UTC.
In various local times:
* Thursday, 8 February, 13:00-14:00 PST
* Thursday, 8 February, 16:00-17:00 EST
* Thursday, 8 February, 22:00-23:00 CET
* Friday, 9 February, 08:00-09:00 AEST
isis agora lovecruft transcribed
s, or if I
forgot to take your timezone into account, please let me know.
https://doodle.com/poll/cnc6scybbfpky5f8
[0]: https://gitweb.torproject.org/torspec.git/tree/proposals/285-utf-8.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
_
Open
take your timezone
into account, please let me know.
https://doodle.com/poll/iahmzu95hpvxciex
[0]:
https://gitweb.torproject.org/torspec.git/tree/proposals/239-consensus-hash-chaining.txt
--
♥Ⓐ isis agora lovecruft
_
Open
isis agora lovecruft transcribed 2.9K bytes:
> Hello all,
>
> Is there an existing Tor proposal you'd like to discuss? Please use
> the following pad to nominate and vote for proposals for discussion.
>
> https://pad.riseup.net/p/Pxo2fQiiaSWo
>
> We'll be reviving
s,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
_
-22.03.html
[3]: https://pad.riseup.net/p/r.1c4c37baa9251fdfca5a1e1bd5c01f45
[4]:
https://gitweb.torproject.org/torspec.git/tree/proposals/249-large-create-cells.txt?id=5fe54569
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R
isis agora lovecruft transcribed 5.3K bytes:
> Hello all,
>
> What: A proposal discussion meeting for prop#249 "Allow CREATE cells with
> >505 bytes of handshake data". [0]
Hey,
Meetbot notes are available. [0] Nick and Tim took summary notes of
discussion items
- Wednesday, 13 December 00:00-01:00 CET
- Thursday, 14 December 09:00-10:00 AUST
teor transcribed 6.8K bytes:
>
> > On 9 Dec 2017, at 11:29, isis agora lovecruft <i...@torproject.org> wrote:
> >
> > Hello all,
> >
> > What: A proposal discussion m
e made about the text encoding or formatting
> of the document.
A specification for the documents that BWAuths produce would be an extremely
welcome contribution! but probably shouldn't be prerequisite to accepting
and implementing this proposal.
Thanks again for the prop
preparation.
Thanks!
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
7*492)=3906 bytes.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
__
that removing `u` on platforms which don't have `D`
enabled by default could break our reproducible builds.)
Please feel free to open a ticket if you're so inclined.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B
did Freud invent psychoanalysis? What are you doing during the idle
> cycles of your brain? One does not need a fancy degree to be an amateur at
> anything, or do you folks not call yourselves hackers?
I'd say "Best" but you could only be better,
since he's writing a Rust
parser for bridge descriptors as part of the Bridge Bandwidth Scanner
project) if I got anything wrong. :)
- Forwarded message from isis agora lovecruft <i...@torproject.org> -
> From: isis agora lovecruft <i...@torproject.org>
> Subject: Re
c/curve.rs#L270
[7]:
https://gitweb.torproject.org/tor.git/tree/src/ext/ed25519/donna/ed25519_tor.c?id=2032b9b1#n324
[8]:
https://gitweb.torproject.org/tor.git/tree/src/ext/ed25519/ref10/keyconv.c?id=2032b9b1b1#n6
[9]:
https://github.com/WhisperSystems/curve25519-java/blob/master/android/jni/ed25519/additio
Damian Johnson transcribed 2.0K bytes:
> On Thu, Jun 15, 2017 at 2:07 PM, teor <teor2...@gmail.com> wrote:
> >
> >> On 16 Jun 2017, at 03:49, isis agora lovecruft <i...@torproject.org> wrote:
> >>
> >> Hello all!
> >>
> >> I ha
hod is not subject to
the same patent claims as NewHope theoretically is.
¹ I am not a lawyer. (Fortunately.)
Best,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinth
things to change in minor ways during further refinement and
implementation. That said, we welcome all feedback and appreciate review.
[0]: https://patternsinthevoid.net/hyphae/hyphae.pdf
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP
Nick Mathewson transcribed 2.9K bytes:
> On Fri, Mar 31, 2017 at 10:20 PM, isis agora lovecruft
> <i...@torproject.org> wrote:
> > Hey hey,
> >
> > In summary of the breakaway group we had last Saturday on post-quantum
> > cryptography in Tor, there were a few
oup, and I apologise, but I
don't actually remember all the attendants off the top of my head. If either
of these were your idea, please message me off-list and I'll ensure you're
credited in the eventual proposal(s)/documentation.
Best regards,
--
♥Ⓐ
funding
for it) work on integrating standard NewHope is here:
https://gitweb.torproject.org/user/isis/tor.git/log/?h=feature/rebelalliance
Best,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB6
ns for other
> distributions.
>
> Feedback requested if this will negatively affect you!
For whatever it's worth, all of Tor's infrastructure runs on Debian stable,
and I'm not sure if weasel would make exceptions to enable backports.
Best,
--
♥Ⓐ isis agora lovecruft
chucks out the bridges without the Running flag (i.e. they don't get added to
the hashring). [0]
[0]:
https://gitweb.torproject.org/user/isis/bridgedb.git/tree/bridgedb/Bridges.py?id=78e352ec18bc55bbb519747a1b1d9e909e3640d7#n453
Best regards,
--
♥Ⓐ isis agora lovecruft
/blog.atagar.com/stem-release-1-5/>!
Awesome! Now I don't need to tell pip to build from git. :)
Thanks, Damian!
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsin
"ServerTransportPlugin snowflake" on Whonix Gateways
by default? And then "ClientTransportPluging snowflake" on workstations
behind the gateway?
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946AB
est regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
___
uploaded, etc.
Again, improving the control port notification interface is much welcome, and
patches are straightforward to review for timely inclusion.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0
isis agora lovecruft transcribed 8.6K bytes:
> For the repeated suggestion of SIDH, [3] I expect we'll soon see concrete
> details and improvements to the attacks mentioned in (and which they establish
> "direct validation" measures to defend against in §9 of) &q
f which are not bugs).
Thanks for pointing this out!
[0]: https://gitweb.torproject.org/tordnsel.git/
[1]: https://gitweb.torproject.org/check.git/
[2]: https://trac.torproject.org/projects/tor/ticket/19843
Best regards,
--
♥Ⓐ isis agora lovecruft
___
e) should be specified in #269.
Thanks for pointing this out! The SHAKE-256() call should actually be added
to #269, since it's acting as a replacement for the HKDF at the end of the
original ntor handshake, and it should be performed regardless of choice of PQ
KEM.
a strong track record of cryptanalysis of
> lattice crypto.
[0]:
https://gitweb.torproject.org/torspec.git/tree/proposals/proposal-status.txt
[1]: https://eprint.iacr.org/2015/287
[2]: https://lists.torproject.org/pipermail/tor-dev/2016-May/010964.html
[3]: https://twitter.com/isislovecruft/st
ensus document in the end would have somewhere between
5 and 9 CoSi signatures.
4. There's a typo in §5.2: s/witnesse's/witnesses'/
Thanks, everyone, for the great discussion!
Best regards,
--
♥Ⓐ isis agora lovecruft
___
468/prop259-redux-v3.txt#L414
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
_
could attend, but not before,
since I will be on a flight. If it works out better for everyone else to have
it at 14:00 instead, then that's also fine with me and please just let me know
afterwards what I can do to help.
Best regards,
--
♥Ⓐ isis ago
t-Quantum Cryptography (pp. 134-136). Berlin: Springer Verlag.
https://www.springer.com/us/book/9783540887010
[4]: http://link.springer.com/content/pdf/10.1007%2FBFb0052237.pdf
Best Regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R
Nicolas Vigier transcribed 6.8K bytes:
Hi Matthew and Isis,
On Sun, 22 Dec 2013, isis agora lovecruft wrote:
If proper packaging is helpful for Jenkins, however, I can easily do
so.
An idea could be to have a Debian package for bridgedb, and make Jenkins
update
Matthew Finkel transcribed 8.6K bytes:
On Thu, Dec 19, 2013 at 02:52:03AM +0100, Nicolas Vigier wrote:
On Tue, 17 Dec 2013, isis agora lovecruft wrote:
Nicolas Vigier transcribed 1.4K bytes:
Hi Nicolas!
Thanks again for following up on this!
Just in case you haven't seen
-design:/doc/proposals/XXX-bridgedb-database-improvements.txt
and
https://gitweb.torproject.org/bridgedb.git/blob/refs/heads/feature/7520-social-dist-design:/doc/proposals/XXX-bridgedb-social-distribution.txt
--
♥Ⓐ isis agora lovecruft
_
GPG
the executable inside TBB.
- Host it somewhere and also provide a SHA-256 hash on a website or in a
file.
Also, copies of the keys which made the signatures.
Hope this helps a bit,
--
♥Ⓐ isis agora lovecruft
_
GPG: 4096R/A3ADB67A2CDB8B35
Current
49 matches
Mail list logo