I'll be short because I'm not used to mailing lists, it's 6 AM and I
haven't slept yet.
After implementing the torchat protocol and seeing how bad it is, but
how nice the idea is, I started thinking it would be cool to have a
more general protocol for P2P use through hidden services.
My question
meh. writes:
After implementing the torchat protocol and seeing how bad it is, but
how nice the idea is, I started thinking it would be cool to have a
more general protocol for P2P use through hidden services.
My question is, how would it scale and what would be the implications
of such a
On 9/26/12, meh. m...@schizofreni.co wrote:
After implementing the torchat protocol and seeing how bad it is, but
how nice the idea is, I started thinking it would be cool to have a
more general protocol for P2P use through hidden services.
My question is, how would it scale and what would
On Tue, Sep 25, 2012 at 11:01:14PM -0700, Seth David Schoen wrote:
meh. writes:
After implementing the torchat protocol and seeing how bad it is, but
how nice the idea is, I started thinking it would be cool to have a
more general protocol for P2P use through hidden services.
My
On 9/25/12 7:31 PM, Webmaster wrote:
Can anyone suggest a vps provider that is friendly to tor hidden
services. This would not be for an exit node.
Consider that on a VPS the Tor Hidden Service RSA Private Key will be
fully exposed to the VPS provider.
That means that the VPS provider would
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 26/09/12 10:06, Nathan Freitas wrote:
After implementing the torchat protocol and seeing how bad it
is, but how nice the idea is, I started thinking it would be cool
to have a more general protocol for P2P use through hidden
services.
ah,below the connection-status
there are usually 5 items, and when I click on one item, the details will
be shown on the right, the details usually include 3 hosts.
so this means the items are actually circuits and the 3 hosts are the
entry, middle and exit node respectively? is it right?
when I
Hi everyone,
The Tor Cloud images [1] for all the seven regions have been updated
to fix a bug found in the unattended-upgrades configuration. The
normal bridge images have also been updated to include obfsproxy [2],
which attempts to help users circumvent censorship by transforming the
Tor
2012/9/26 t...@lists.grepular.com:
After implementing the torchat protocol and seeing how bad it
is, but how nice the idea is
What is bad about the torchat protocol? Is it its pragmatism and the
fact that it does not use xml and other bloat?
___
On Wed, Sep 26, 2012 at 03:17:39PM +0200, Bernd wrote:
2012/9/26 t...@lists.grepular.com:
After implementing the torchat protocol and seeing how bad it
is, but how nice the idea is
What is bad about the torchat protocol? Is it its pragmatism and the
fact that it does not use xml and
On Wed, Sep 26, 2012 at 02:36:34PM +0530, Nathan Freitas wrote:
I am concerned in the long run about
scalability and reliability of this. It is not unheard of for apps
that work well and do something cool to suddently have 1M+ users, and
already are nearing half that with Orbot.
That is
On Wed, 2012-09-26 at 11:42 +0100, t...@lists.grepular.com wrote:
This is not the same as using XMPP over Tor. XMPP requires a trusted
third party server to handle the relaying. This is P2P direct
communication using hidden services. It's not real-time IM chat. It's
SMS style chat (with
2012/9/26 meh. m...@schizofreni.co:
It's not pragmatist at all, it wastes time and resources doing
replaces when it could have just been really binary and prepend the
length of the packet, which is the sane way to do something like that
instead of using an end of packet separator.
No, these
Ted Smith:
On Wed, 2012-09-26 at 11:42 +0100, t...@lists.grepular.com wrote:
This is not the same as using XMPP over Tor. XMPP requires a trusted
third party server to handle the relaying. This is P2P direct
communication using hidden services. It's not real-time IM chat. It's
SMS style chat
Nathan Freitas:
On 09/26/2012 10:08 AM, meh. wrote:
After implementing the torchat protocol and seeing how bad it is,
but how nice the idea is, I started thinking it would be cool to
have a more general protocol for P2P use through hidden services.
This is something we have definitely
On Wed, Sep 26, 2012 at 07:17:32PM +0200, Bernd wrote:
2012/9/26 meh. m...@schizofreni.co:
It's not pragmatist at all, it wastes time and resources doing
replaces when it could have just been really binary and prepend the
length of the packet, which is the sane way to do something like
Thus spake Nathan Freitas (nat...@freitas.net):
On 09/26/2012 10:08 AM, meh. wrote:
After implementing the torchat protocol and seeing how bad it is,
but how nice the idea is, I started thinking it would be cool to
have a more general protocol for P2P use through hidden services.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 09/26/2012 08:53 PM, Ted Smith wrote:
Further, SMS is basically real-time. An SMS app that had
hidden-service type delays (which would be especially bad when
roaming between network connections, causing you to rebuild all of
your circuits)
adrelanos:
A malicious certificate for torproject.org has been given out at least
twice by broken certificate authorities. (Comodo, DigiNotar, who is next...)
To prevent that in future, I'd like to pin the SSL certificate's
fingerprint. How can that be done? Running an own local CA or is
Allow me to combine some quotes from this recent thread alone...
I've had an idea for a while for a killer service for...
I'd be very much interested to see it in reality. I guess the
delays will be more then acceptable.
it would be cool to have a more general protocol for P2P use
through
While we don't need a very complex p2p design (in short, we are mostly
just talking about simple HTTP servers running on each device, behind
a hidden service .onion), I am concerned in the long run about
scalability and reliability of this.
Is, or can Tor be, useful or optimal? On which
grarpamp:
Given that these services are surely coming in force... and from
directions that see these networks more as a raw transport than
say, primarily for the purposes outlined on their respective web
pages... it seems the usual echo of we're a nice project, don't
do that, too much load
My question is, how would it scale and what would be the implications
of such a system (every user would be a hidden service and would be
constantly connected to other hidden services it wants to interact
with)?
thrash the HS
directory system excessively, and probably overload the users'
Thus spake adrelanos (adrela...@riseup.net):
grarpamp:
Given that these services are surely coming in force... and from
directions that see these networks more as a raw transport than
say, primarily for the purposes outlined on their respective web
pages... it seems the usual echo of
24 matches
Mail list logo