tor-dev
Thread
Date
Earlier messages
Later messages
Messages by Thread
[tor-dev] Fwd: Upcoming Tor security releases to fix a denial-of-service issue
Nick Mathewson
[tor-dev] Walking Onions status update: week 2 notes
Nick Mathewson
Re: [tor-dev] Walking Onions status update: week 2 notes
teor
Re: [tor-dev] Walking Onions status update: week 2 notes
teor
Re: [tor-dev] Walking Onions status update: week 2 notes
Nick Mathewson
Re: [tor-dev] Walking Onions status update: week 2 notes
teor
Re: [tor-dev] Walking Onions status update: week 2 notes
Nick Mathewson
Re: [tor-dev] Walking Onions status update: week 2 notes
Nick Mathewson
[tor-dev] SOOC (Same Origin Onion Certificates) discussion tomorrow
Richard Pospesel
Re: [tor-dev] SOOC (Same Origin Onion Certificates) discussion tomorrow
[email protected]
[tor-dev] Walking Onions status update: week 1 notes
Nick Mathewson
[tor-dev] Regarding GSoC 2020
Aman Rastogi
Re: [tor-dev] Regarding GSoC 2020
Pili Guerra
[tor-dev] interested in working on a ticket
indigo omega
Re: [tor-dev] interested in working on a ticket
teor
Re: [tor-dev] interested in working on a ticket
grarpamp
[tor-dev] tor sending requests with a token
Pouya Miralaee
[tor-dev] TOR Browser Circuit Selection of Exit Nodes
Vianney Gomezgil Yaspik
Re: [tor-dev] TOR Browser Circuit Selection of Exit Nodes
nusenu
Re: [tor-dev] TOR Browser Circuit Selection of Exit Nodes
teor
[tor-dev] Making Tor's CI Faster
teor
Re: [tor-dev] Making Tor's CI Faster
Hans-Christoph Steiner
[tor-dev] Proposal 313: Relay IPv6 Statistics
teor
Re: [tor-dev] Proposal 313: Relay IPv6 Statistics
Karsten Loesing
Re: [tor-dev] Proposal 313: Relay IPv6 Statistics
teor
Re: [tor-dev] Proposal 313: Relay IPv6 Statistics
Nick Mathewson
[tor-dev] CVE-2020-8516 Hidden Service deanonymization
juanjo
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
David Goulet
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
Paul Syverson
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
Mike Perry
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
George Kadianakis
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
Mike Perry
Re: [tor-dev] CVE-2020-8516 Hidden Service deanonymization
s7r
[tor-dev] Request for onionbalance v3 pre-alpha testing
George Kadianakis
Re: [tor-dev] Request for onionbalance v3 pre-alpha testing
George Kadianakis
Re: [tor-dev] Request for onionbalance v3 pre-alpha testing
George Kadianakis
[tor-dev] Options for Congestion Control in Tor-like Networks
Mike Perry
[tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
teor
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
s7r
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
s7r
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
teor
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
s7r
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
Mirimir
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
s7r
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
Mirimir
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
teor
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
Nick Mathewson
Re: [tor-dev] Proposal 312: Automatic Relay IPv6 Addresses
teor
[tor-dev] Prop 311: Relay IPv6 Reachability
teor
Re: [tor-dev] Prop 311: Relay IPv6 Reachability
Nick Mathewson
Re: [tor-dev] Prop 311: Relay IPv6 Reachability
teor
Re: [tor-dev] Prop 311: Relay IPv6 Reachability
Nick Mathewson
[tor-dev] Snowflake server and traffic analysis questions
[email protected]
[tor-dev] Vanguard Plugin Options
[email protected]
Re: [tor-dev] Vanguard Plugin Options
Mike Perry
[tor-dev] Tor Proposal 295
Tomer Ashur
[tor-dev] Should we remove the ClientAutoIPv6ORPort option?
Neel Chauhan
[tor-dev] OK got mix vanguards from packages.debian.org with Tor from deb.torproject.org repository?
Patrick Schleizer
Re: [tor-dev] OK got mix vanguards from packages.debian.org with Tor from deb.torproject.org repository?
Iain Learmonth
Re: [tor-dev] OK got mix vanguards from packages.debian.org with Tor from deb.torproject.org repository?
Patrick Schleizer
[tor-dev] Changes to accessing and using MaxMind's databases
Karsten Loesing
Re: [tor-dev] Changes to accessing and using MaxMind's databases
Nick Mathewson
[tor-dev] Request info about how the Tor HS DoS works
juanjo
[tor-dev] Snowflake server and traffic analysis questions
[email protected]
Re: [tor-dev] Snowflake server and traffic analysis questions
Cecylia Bocovich
[tor-dev] Bridge benefits stackable?
[email protected]
[tor-dev] Stem and Nyx bug tracking moved
Damian Johnson
[tor-dev] Adding Tracing to little-t tor
David Goulet
[tor-dev] Evaluating rendezvous circuit build up CPU usage
Valentin Franck
Re: [tor-dev] Evaluating rendezvous circuit build up CPU usage
David Goulet
Re: [tor-dev] Evaluating rendezvous circuit build up CPU usage
juanjo
Re: [tor-dev] Evaluating rendezvous circuit build up CPU usage
Valentin Franck
[tor-dev] Updates to Prop306: A Tor Implementation of IPv6 Happy Eyeballs
Neel Chauhan
Re: [tor-dev] Updates to Prop306: A Tor Implementation of IPv6 Happy Eyeballs
teor
Re: [tor-dev] Updates to Prop306: A Tor Implementation of IPv6 Happy Eyeballs
Neel Chauhan
Re: [tor-dev] Updates to Prop306: A Tor Implementation of IPv6 Happy Eyeballs
teor
[tor-dev] Probability of Guessing a v3 Onion Address
[email protected]
Re: [tor-dev] Probability of Guessing a v3 Onion Address
s7r
Re: [tor-dev] Probability of Guessing a v3 Onion Address
Matt Traudt
[tor-dev] Trip Report: Reproducible Builds Summit
Hans-Christoph Steiner
[tor-dev] Open Source Design Workshop, Brussels, January 31
sajolida
[tor-dev] Onion DoS: Killing rendezvous circuits over the application layer
George Kadianakis
Re: [tor-dev] Onion DoS: Killing rendezvous circuits over the application layer
Nick Mathewson
Re: [tor-dev] Onion DoS: Killing rendezvous circuits over the application layer
teor
Re: [tor-dev] Onion DoS: Killing rendezvous circuits over the application layer
meejah
[tor-dev] Practracker regen in #30381
teor
Re: [tor-dev] Practracker regen in #30381
David Goulet
Re: [tor-dev] Practracker regen in #30381
George Kadianakis
Re: [tor-dev] Practracker regen in #30381
teor
Re: [tor-dev] Practracker regen in #30381
teor
[tor-dev] 转发: Which elliptic curve Tor use & use safe curve only
Tom255
[tor-dev] torsocks configure bug (uClibc, maybe other nonstandard libcs)
akater
Re: [tor-dev] torsocks configure bug (uClibc, maybe other nonstandard libcs)
grarpamp
[tor-dev] introduce some customization on the tbb
sarpedon montecarlo
Re: [tor-dev] introduce some customization on the tbb
Richard Pospesel
Re: [tor-dev] introduce some customization on the tbb
sarpedon montecarlo
Re: [tor-dev] introduce some customization on the tbb
Richard Pospesel
Re: [tor-dev] introduce some customization on the tbb
[email protected]
Re: [tor-dev] introduce some customization on the tbb
Richard Pospesel
[tor-dev] Acceptable clock skew in tor 0.4.1
intrigeri
Re: [tor-dev] Acceptable clock skew in tor 0.4.1
George Kadianakis
Re: [tor-dev] Acceptable clock skew in tor 0.4.1
anonym
[tor-dev] [paper] Breaking and (Partially) Fixing Provably Secure Onion Routing
Eugen Leitl
[tor-dev] Onion Service Intro Point Retry Behavior
David Goulet
Re: [tor-dev] Onion Service Intro Point Retry Behavior
Michael Rogers
[tor-dev] New python Tor client implementation
James Brown
Re: [tor-dev] New python Tor client implementation
Damian Johnson
Re: [tor-dev] New python Tor client implementation
James
Re: [tor-dev] New python Tor client implementation
Damian Johnson
Re: [tor-dev] New python Tor client implementation
vignesh kannan
[tor-dev] Comparing Proposals 295 and 308
Tomer Ashur
Re: [tor-dev] Comparing Proposals 295 and 308
Jean Paul Degabriele
[tor-dev] Proposal 271 - improvements
Florentin Rochet
Re: [tor-dev] Proposal 271 - improvements
Roger Dingledine
Re: [tor-dev] Proposal 271 - improvements
Florentin Rochet
Re: [tor-dev] Proposal 271 - improvements
Nick Mathewson
[tor-dev] maint-0.4.2 is now a separate branch; master is now 0.4.3.x
Nick Mathewson
[tor-dev] HSv3 descriptor work in stem
George Kadianakis
Re: [tor-dev] HSv3 descriptor work in stem
Damian Johnson
Re: [tor-dev] HSv3 descriptor work in stem
George Kadianakis
Re: [tor-dev] HSv3 descriptor work in stem
Damian Johnson
Re: [tor-dev] HSv3 descriptor work in stem
George Kadianakis
Re: [tor-dev] HSv3 descriptor work in stem
George Kadianakis
[tor-dev] Raising exceptions in add_event_listener() threads (was Re: HSv3 descriptor work in stem)
George Kadianakis
Re: [tor-dev] Raising exceptions in add_event_listener() threads (was Re: HSv3 descriptor work in stem)
teor
Re: [tor-dev] Raising exceptions in add_event_listener() threads (was Re: HSv3 descriptor work in stem)
Damian Johnson
Re: [tor-dev] Raising exceptions in add_event_listener() threads (was Re: HSv3 descriptor work in stem)
George Kadianakis
Re: [tor-dev] HSv3 descriptor work in stem
George Kadianakis
[tor-dev] Exposing onion service errors to Tor Browser
George Kadianakis
Re: [tor-dev] Exposing onion service errors to Tor Browser
Jeremy Rand
Re: [tor-dev] Exposing onion service errors to Tor Browser
[email protected]
Re: [tor-dev] Exposing onion service errors to Tor Browser
Jeremy Rand
[tor-dev] Timing of opening pre-emptive circuits?
Jeremy Rand
Re: [tor-dev] Timing of opening pre-emptive circuits?
s7r
Re: [tor-dev] Timing of opening pre-emptive circuits?
Jeremy Rand
[tor-dev] Network team: New status page for 0.4.2; feature freeze; want to work on any tickets?
Nick Mathewson
[tor-dev] Preferred compression type?
Steve Snyder
Re: [tor-dev] Preferred compression type?
Nick Mathewson
Re: [tor-dev] Preferred compression type?
Steve Snyder
[tor-dev] Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
Jean Paul Degabriele
Re: [tor-dev] Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
Nick Mathewson
Re: [tor-dev] Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
Jean Paul Degabriele
Re: [tor-dev] Counter Galois Onion: A New Proposal for Forward-Secure Relay Cryptography
Tomer Ashur
[tor-dev] reproducible builds for Android tor daemon
Hans-Christoph Steiner
Re: [tor-dev] reproducible builds for Android tor daemon
Georg Koppen
Re: [tor-dev] reproducible builds for Android tor daemon
Hans-Christoph Steiner
Re: [tor-dev] reproducible builds for Android tor daemon
Georg Koppen
Re: [tor-dev] reproducible builds for Android tor daemon
teor
Re: [tor-dev] reproducible builds for Android tor daemon
Hans-Christoph Steiner
Re: [tor-dev] reproducible builds for Android tor daemon
Matthew Finkel
Re: [tor-dev] reproducible builds for Android tor daemon
Nathan Freitas
Re: [tor-dev] reproducible builds for Android tor daemon
Nicolas Vigier
Re: [tor-dev] reproducible builds for Android tor daemon
Santiago Torres-Arias
Re: [tor-dev] reproducible builds for Android tor daemon
Michael Rogers
Re: [tor-dev] reproducible builds for Android tor daemon
Matthew Finkel
[tor-dev] Non-endorsed methods for accessing Tor hidden services
Rishab Nithyanand
[tor-dev] New Orbot, tor-android and AndroidPluggableTransport updates
Nathan Freitas
Re: [tor-dev] New Orbot, tor-android and AndroidPluggableTransport updates
Georg Koppen
Re: [tor-dev] New Orbot, tor-android and AndroidPluggableTransport updates
Nathan Freitas
[tor-dev] txtorcon 19.1.0
meejah
[tor-dev] Compile warns
grarpamp
Re: [tor-dev] Compile warns
Nick Mathewson
Re: [tor-dev] Compile warns
grarpamp
Re: [tor-dev] Compile warns
Nick Mathewson
Re: [tor-dev] Compile warns
grarpamp
Re: [tor-dev] Compile warns
Nick Mathewson
[tor-dev] Orbot 16.1.1... now with 64-bit tor
Nathan Freitas
[tor-dev] Q: Links to external apps
LA_FORGE
Re: [tor-dev] Q: Links to external apps
LA_FORGE
[tor-dev] Enhanced Tor Browser sandboxing upstreaming
[email protected]
[tor-dev] TBB Memory Allocator choice fingerprint implications
[email protected]
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Tom Ritter
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Patrick Schleizer
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Daniel Micay
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Shawn Webb
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
teor
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Tom Ritter
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Shawn Webb
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Tom Ritter
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Daniel Micay
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Nicolas Vigier
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Daniel Micay
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Ryan Duff
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Richard Pospesel
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Daniel Micay
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Daniel Micay
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Damian Johnson
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
Tom Ritter
Re: [tor-dev] TBB Memory Allocator choice fingerprint implications
[email protected]
[tor-dev] [prop305] Introduction Point Behavior
David Goulet
Re: [tor-dev] [prop305] Introduction Point Behavior
teor
Re: [tor-dev] [prop305] Introduction Point Behavior
George Kadianakis
[tor-dev] Putting onion services behind a third-party TCP proxy
Pop Chunhapanya
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
teor
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
Pop Chunhapanya
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
teor
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
Pop Chunhapanya
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
teor
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
Pop Chunhapanya
Re: [tor-dev] Putting onion services behind a third-party TCP proxy
teor
Earlier messages
Later messages