-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
But bottom line, the Tor Project apparently did nothing with the
information.
Well, they apparently made (according to phw) an informed decision on
which attacks they should be spending the little available resources.
That is certainly more than
On 2015-07-02 09:40:31 (+0200), Karsten Loesing wrote:
Julius and I have been working on a design mockup for the ExoneraTor
service for the past few months and would want to hear what you think
about this:
https://people.torproject.org/~karsten/volatile/exonerator-mockup/
Good job! This
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
OVH is by far the biggest AS on the tor network, in terms of
consensus weight (12%),
guard probability (15%),
middle propability (14%)
and in the top 3 by exit probability(7%).
Here are some AS stats for June 2015, that show which ASes added
t...@dserrano5.es thus spoke:
Results: do we really need the Exit: yes column? Seems pretty redundant to
me.
How so? All exits are relays, but not all relays are exits. And if a relay is
only configured as an exit for part of the time, that's a potentially important
part of the historic
I find it more worrying that we do not hear about the 'more serious
attacks' that keep them busy and don't allow them to look into i.e.
'AviatoChortler' (even after a few weeks). That might mean that there
is a constant stream of 'more serious attacks' (without information I
can only guess).
On Sat, 4 Jul 2015 19:34:45 -0400
Ben Serebin b...@reefsolutions.com wrote:
I'll hijack the response I'm a sysadmin, an unloved Windows one.
My unwanted $0.02 are:
- Windows installer (omg, Windows, the evil one which if you really
want greater adoption is the answer! Oh smokes, someone
Sorry for hijacking, but I wasn't sure where best to put this.
As a programmer, where should I start if I am considering lending my time
to the tor project? While I feel that the BAD EXIT issue needs some love, I
defer to those with more knowledge on the state of things to direct my
efforts.
Is
Sorry for hijacking, but I wasn't sure where best to put this...
Glad you want to get involved! This would be more suited for its own
thread on tor-dev@ but that said, my top suggestion is: pick something
that interests you. Enjoying your involvement with open source and, by
extension, sticking
Date: Sat, 4 Jul 2015 19:34:45 -0400
From: Ben Serebin b...@reefsolutions.com
Subject: Re: [tor-relays] unflagged BAD EXIT nodes
?I'll hijack the response I'm a sysadmin, an unloved Windows one. My
unwanted $0.02 are:
- Windows installer (omg, Windows, the evil one which if you
On 5 Jul 2015, at 11:37 , teor teor2...@gmail.com wrote:
Date: Sat, 4 Jul 2015 19:34:45 -0400
From: Ben Serebin b...@reefsolutions.com
Subject: Re: [tor-relays] unflagged BAD EXIT nodes
?I'll hijack the response I'm a sysadmin, an unloved Windows one. My
unwanted $0.02 are:
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
2. Openness. Traditionally there's been some contention about where
to draw the line between openness and secrecy. Personally this is
what turned me off to this space [3]. Thankfully Philipp's moving
us toward being a little less secretive. [4]
On 2015-07-04 11:38:18 (-0400), Magnus Hedemark wrote:
t...@dserrano5.es thus spoke:
Results: do we really need the Exit: yes column? Seems pretty redundant to
me.
How so? All exits are relays, but not all relays are exits. And if a relay
is only configured as an exit for part of the
At 10:04 7/4/2015 +0200, nusenu wrote:
I find it more worrying that we do not hear
about the 'more serious attacks' that keep
them busy and don't allow them to look into
i.e. 'AviatoChortler' (even after a few
weeks). That might mean that there is a
constant stream of 'more serious attacks'
13 matches
Mail list logo