On Wed, Apr 16, 2014 at 04:51:20PM +0100, Ximin Luo wrote:
> As a side point though, I realised another issue for flashproxy. At
> the moment, the PT client sets the facilitator (the controller) on the
> command line. This means we can't use Bridges that come from different
> facilitators. Meek see
Hi list,
On Wed., Apr. 16, 2014, Jacob Appelbaum wrote:
>On 4/16/14, grarpamp wrote:
>>> [1] http://www.netmundial.br/
>>>
>I'll be there - I land in Brazil on Saturday and I'll be there
>for around a week. I expect to have a lot of discussions about the
>importance of Free Software, the need for
On 4/16/14, grarpamp wrote:
>> [1] http://www.netmundial.br/
>> [2]
>> http://content.netmundial.br/contribution/unesco-comprehensive-study-on-internet-related-issues-draft-concept-paper-proposed-by-the-secretariat-for-consultations/155/
>
I'll be there - I land in Brazil on Saturday and I'll be
On Tue, Apr 15, 2014 at 02:28:17PM -0400, Nick Mathewson wrote:
> On Tue, Apr 15, 2014 at 2:27 PM, Nick Mathewson wrote:
> > On Mon, Apr 14, 2014 at 5:32 AM, carlo von lynX
> > wrote:
> > [...]
> >> So the question is, would it be okay to catch ESPIPE in
> >> all cases, thus having it ignored in
On Wed, Apr 16, 2014 at 5:57 AM, Helder Ribeiro wrote:
> The Eudyptula Challenge is for kernel hacking and was inspired by the
> Matasano Challenges.
>
> I hear that several patches are already being submitted to the Linux
> kernel thanks to its "onboarding process" nature.
>
> http://eudyptula-ch
On 16/04/14 16:24, Ximin Luo wrote:
> On 16/04/14 16:11, Ximin Luo wrote:
>> On 16/04/14 15:56, George Kadianakis wrote:
>>> Ximin Luo writes:
>>>
>>> Hm, but this kind of kills the magic of indirect PTs, right? That is,
>>> users who want to use flashproxy in the way above, will have to know
>>>
On 16/04/14 15:56, George Kadianakis wrote:
> Ximin Luo writes:
>
>>
>>
>>
>> So instead of having, as currently:
>>
>> (old, hacky) Bridge flashproxy (dummy addr)
>>
>> We would have the following cases:
>>
>> (1) Bridge flashproxy (real addr)
>> (2) Bridge flashproxy (real addr) (fingerprint)
On 16/04/14 16:11, Ximin Luo wrote:
> On 16/04/14 15:56, George Kadianakis wrote:
>> Ximin Luo writes:
>>
>> Hm, but this kind of kills the magic of indirect PTs, right? That is,
>> users who want to use flashproxy in the way above, will have to know
>> an address or a fingerprint of the bridge be
Ximin Luo writes:
> ## Background
>
> Pluggable Transports are proxy programs that help users bypass censorship.
>
> [App client] -> XXX EVIL CENSOR HAS YOU XXX ACCESS DENIED XXX
> [App client] -> [PT client] -> (the cloud!) -> [PT server] -> [App server]
>
> The structural design, on the client
> [1] http://www.netmundial.br/
> [2]
> http://content.netmundial.br/contribution/unesco-comprehensive-study-on-internet-related-issues-draft-concept-paper-proposed-by-the-secretariat-for-consultations/155/
The full paper is at wikileaks.
___
tor-dev ma
Hello list,
There's a meeting [1] of one or two dozen delegate countries
relating to Internet governance in Sao Paulo next week.
A typical discussion topic is UNESCO's proposal [2] (search
for 'privacy' or 'anonymity'.)
Maybe a little off topic here, but this could be considered
of peripheral i
The Eudyptula Challenge is for kernel hacking and was inspired by the
Matasano Challenges.
I hear that several patches are already being submitted to the Linux
kernel thanks to its "onboarding process" nature.
http://eudyptula-challenge.org/
Would something like this make sense for Tor? Is there
12 matches
Mail list logo