Re: If the machine run the introducer down,what can i do

2014-03-10 Thread David Stainton
yes eventually they'll get merged. hopefully... meanwhile i port foolscap to twisted endpoints. i'll post a message when all the unit tests pass ;-) On Tue, Mar 11, 2014 at 2:06 AM, str4d wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > This is exactly why the I2P version of Tahoe-L

Re: If the machine run the introducer down,what can i do

2014-03-17 Thread David Stainton
Hi Zooko, Yes... a once a week meeting sounds good and doable. I reside in Berlin... and I am usually awake during CET daylight hours. I would like to suggest we meet at 17:00 UTC because it would be convenient for me as I would simply stay in my office a bit longer and chat with you two. 22:00

announcement/call for testing ansible role for tahoe-lafs

2014-04-16 Thread David Stainton
Greetings, I recently wrote a Tahoe-LAFS Ansible role. https://github.com/david415/ansible-tahoe-lafs It can be used to write many different kinds of Ansible playbooks for dealing with Tahoe-LAFS component servers such as Introducers, Storage nodes and clients... for instance the readme shows an

adding endpoint plugins

2014-04-30 Thread David Stainton
Greetings, I wrote a simple IStreamClientEndpointStringParser for using the SOCKS5ClientEndpoint with Tor: https://gist.github.com/david415/26a4ed59078d2e27376f I modified a txsocksx code example for testing the new endpoint descriptor: https://gist.github.com/david415/7c6040117319cc3b0230 ...bu

tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
Greetings, Today I wrote an endpoint parser for Meejah's txtorcon Tor Hidden Service endpoint. Now that we have foolscap ported to twisted endpoints (branch needs review but I should probably rebase first) we'd like to be able to simply specify an "onion" endpoint descriptor in Tahoe-LAFS configu

Re: adding endpoint plugins

2014-05-02 Thread David Stainton
id415/txsocksx.git On Wed, Apr 30, 2014 at 1:42 PM, David Stainton wrote: > Greetings, > > I wrote a simple IStreamClientEndpointStringParser for using the > SOCKS5ClientEndpoint with Tor: > https://gist.github.com/david415/26a4ed59078d2e27376f > > I modified a txsocksx code e

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
descriptors from the user and passes them to foolscap. On Fri, May 2, 2014 at 2:20 PM, Tristan Seligmann wrote: > On 2 May 2014 15:59, David Stainton wrote: >> This will work fine for the txsocksx tor client endpoint parser I >> wrote... However the txtorcon Tor Hidden Service

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
Ah ha! Of course it is so obvious now that you point it out to me. The onion endpoint parser can do this setup work in it's `listen` method which returns a `Deferred`. Thanks for your observation/advice! Cheers! David On Fri, May 2, 2014 at 3:01 PM, wrote: > On 02:53 pm, dstainton...@gmail.co

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
>> Ah ha! Of course it is so obvious now that you point it out to me. >> The onion endpoint parser can do this setup work in it's `listen` >> method which returns a `Deferred`. >> Thanks for your observation/advice! > > Cool! Thanks for doing this. Can I pull it into txtorcon when it's > finished?

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
Ah yeah... twisted endpoints that support udp... Perhaps when Yawning Angel finishes Lightweight Obfuscated Datagram Protocol (LODP) there will be interesting things we can do with this... and a more immediate perceived need for twisted datagram endpoint interfaces. On Fri, May 2, 2014 at 9:16 PM

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-02 Thread David Stainton
ch this soon. For now my hacky development/testing flow works OK. On Fri, May 2, 2014 at 9:18 PM, Glyph Lefkowitz wrote: > > On May 2, 2014, at 6:59 AM, David Stainton wrote: > > Today I wrote an endpoint parser for Meejah's txtorcon Tor Hidden > Service endpoint. > > > This i

Re: Accepted tahoe-lafs 1.10.0-2 (source all)

2014-05-02 Thread David Stainton
Sweet! Does this help Tahoe-LAFS get into the next release of TAILS? On Fri, May 2, 2014 at 10:11 PM, Daira Hopwood wrote: > Woo! > > Original Message > From: Ramakrishnan Muthukrishnan > To: debian-devel-chan...@lists.debian.org > Subject: Accepted tahoe-lafs 1.10.0-2 (source

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-05 Thread David Stainton
OK... I decided that txtorcon's endpoint constructor should only take string arguments besides the reactor arg... because serverFromString passes only str args to the endpoint constructor. I wrote the endpoint parser to be as simple as possible. The endpoint's `listen` method now handles the tor c

Re: [Twisted-Python] tor hidden service endpoint parser returns a deferred

2014-05-06 Thread David Stainton
> The endpoint constructor should do _construction_. The endpoint parser > should do _parsing_. The task of parsing is of taking strings and producing > meaningful values. Ah yeah I see what you mean. OK... I changed it: https://github.com/david415/txtorcon/commit/1e96d550c40bef1be1b45c3c975c0da

Foolscap endpoint port: request for preliminary code review

2014-05-09 Thread David Stainton
Greetings, I believe the Foolscap-endpoints-port is at least ready for code review. pull request: https://github.com/warner/foolscap/pull/18/files So... after code review and perhaps code cleanup... I can squash/rebase if needed to clean up the git history a bit: Str4d's server side foolscap endp

Re: Foolscap endpoint port: request for preliminary code review

2014-05-09 Thread David Stainton
I talked with Leif today. Now I am going to work on making my foolscap branch fully compatible with the current release of Tahoe. All the Foolscap and Tahoe unit tests should pass at that point... Cheers, David On Fri, May 9, 2014 at 9:19 AM, David Stainton wrote: > Greetings, > >

Foolscap endpoints: status update

2014-05-10 Thread David Stainton
Greetings, My Foolscap branch is now backwards compatible with Foolscap 0.6.4... What I mean is: all of the Tahoe-LAFS unit tests pass when using my branch of Foolscap. All of the Foolscap unit tests pass too. I was hanging out with Leif working on Foolscap today... and when I was thinking about

tor hidden service endpoint designs

2014-05-11 Thread David Stainton
Dear Meejah, I'm replying by e-mail because it might be better than a conversation inside a github pull request. Excellent idea about not launching tor all the time! We were just talking about that. My friend Leif Ryge and I were discussing possible designs for this tor hidden service endpoint...

Re: tor hidden service endpoint designs

2014-05-11 Thread David Stainton
Hi Meejah, Briefly changing subject to the IListeningPort interface: http://foolscap.lothar.com/trac/ticket/203 please read trac comment #19 ---> http://foolscap.lothar.com/trac/ticket/203#comment:19 Reading Foolscap trac ticket 203 caused me to think about the exact object implementing IListen

Re: tor hidden service endpoint designs

2014-05-15 Thread David Stainton
> I also don't mind doing a 0.9.x release with this in it as a "preview" > feature, even if it's not completely-fully-baked -- especially if having > a version of this on PyPI helps your Tahoe dev. Is this something you > need? Thanks! That's very nice of you to offer swift code merges. The Tahoe

Re: Accepted tahoe-lafs 1.10.0-2 (source all)

2014-05-20 Thread David Stainton
I volunteer! On Tue, May 20, 2014 at 6:36 PM, Zooko Wilcox-OHearn wrote: > On Sat, May 3, 2014 at 12:51 AM, David Stainton > wrote: >> Sweet! Does this help Tahoe-LAFS get into the next release of TAILS? > > Well, according to https://labs.riseup.net/code/issues/6227

Fwd: mail server design

2014-05-29 Thread David Stainton
Hey Michael, This reminds me of a conversation that came up a few days ago. If you are going to write the client AND the server then why use SMTP at all? Why not just use pond (https://pond.imperialviolet.org/)? David On Wed, May 28, 2014 at 11:50 PM, Michael Samuel wrote: > Hi, > > I've draw

Tahoe-LAFS backup scheduling daemon proposal

2014-05-30 Thread David Stainton
Hi, In the interest of completing the Tails + Tahoe-LAFS integration (see https://labs.riseup.net/code/issues/6227), I propose a Tahoe-LAFS backup scheduler daemon. Leif and I discussed it the other day and I want to know what others think of it. I hope Leif or others will correct me if I say anyt

Fwd: [Tails-dev] Tahoe-LAFS persistence

2014-05-30 Thread David Stainton
-- Forwarded message -- From: BitingBird Date: Fri, May 30, 2014 at 2:06 AM Subject: Re: [Tails-dev] Tahoe-LAFS persistence To: The Tails public development discussion list David Stainton: > Hi, > [...] > 1. the Tahoe-LAFS debian package: > > This part

Re: [Tails-dev] Tahoe-LAFS persistence

2014-06-01 Thread David Stainton
>> 1. the Tahoe-LAFS debian package: >> >> This part is done. Great! >> > Congratulation :) > Tahoe documentation could mention this: > https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/quickstart.rst OK... I volunteer to update https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/quickstart.rst

Re: Tahoe-LAFS backup scheduling daemon proposal

2014-06-01 Thread David Stainton
Hi Daira, Thanks for all the info! > +1. There are two existing tickets about scheduled backups: =-) > https://tahoe-lafs.org/trac/tahoe-lafs/ticket/643 I reviewed this ticket and thought about it too. It doesn't seem appropriate for what I had in mind... and there may be problem/solution conf

Re: Public WUI ?

2014-06-05 Thread David Stainton
Hi! If I understand correctly, then your question might be rephrased as: How do I access a TCP service on localhost from outside of my NAT device? I suggest investigating ssh port forwarding. (i don't think the question or answer are specific to tahoe... but maybe someone else on the list knows s

Re: [Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
> Additionally, on any relevant Debian system, the command-line sftp > client is shipped as part of the openssh-client package, that is > installed in Tails. > >> Does it come with a Bittorrent client? > > No: https://tails.boum.org/support/faq/#index22h2 > >> Can we make Tahoe-LAFS be the third th

[Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
-- Forwarded message -- From: intrigeri Date: Thu, Jun 5, 2014 at 12:23 AM Subject: Re: [Tails-dev] Tahoe-LAFS persistence To: The Tails public development discussion list Cc: tahoe-dev@tahoe-lafs.org, David Stainton Hi, [Snipping large chunks of discussion about how various

[Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
-- Forwarded message -- From: intrigeri Date: Thu, Jun 5, 2014 at 3:03 PM Subject: Re: [Tails-dev] Tahoe-LAFS persistence To: David Stainton Cc: The Tails public development discussion list , tahoe-dev Hi, (Disclaimer: I still have not read this full thread.) David Stainton

Re: [Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
> (Disclaimer: I still have not read this full thread.) OK... >> is there any reason not to? > > If someone properly integrates Tahoe-LAFS withing Tails (including > patching tails-persistence-setup, design doc, and whatever nobody has > thought of yet), then I'm happy. Since you didn't read the

Fwd: [Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
-- Forwarded message -- From: intrigeri Date: Thu, Jun 5, 2014 at 6:07 PM Subject: Re: [Tails-dev] Tahoe-LAFS persistence To: David Stainton Cc: The Tails public development discussion list , tahoe-dev Hi, David Stainton wrote (05 Jun 2014 16:58:52 GMT) : > Since you did

Re: [Tails-dev] Tahoe-LAFS persistence

2014-06-05 Thread David Stainton
> Looks good. Still, will need to persist the Tahoe-LAFS configuration. > Hence my proposal. Ahhh OK! I understand. > Have you actually tried installing Tahoe-LAFS on Tails, in a way that > it's re-installed automatically on every boot, and you don't have to > reconfigure it every time you start

Re: upcoming Tahoe Summit: Jun30+Jul01, SF

2014-06-20 Thread David Stainton
I too am interested but I unfortunately will not be back in SF in time for this. On Thu, Jun 19, 2014 at 10:03 PM, Zancas Dearana wrote: > Interested! Don't know if I can make it. > > > On Tue, Jun 17, 2014 at 5:43 PM, Brian Warner wrote: >> >> We're trying to assemble a small Tahoe Summit fo

Fwd: "serialization" of ListeningPort

2014-07-22 Thread David Stainton
post it on a new twisted trac ticket... -- Forwarded message -- From: David Stainton Date: Thu, Jul 3, 2014 at 8:16 AM Subject: "serialization" of ListeningPort To: twisted-pyt...@twistedmatrix.com Greetings, I wanted to see what people think of this before attempting

Foolscap endpoints code review

2014-08-31 Thread David Stainton
Dear Warner, I have without much trouble broken out the Foolscap client side endpoint code into it's own branch: https://github.com/david415/foolscap/tree/endpoint_client1 All Tahoe-LAFS and Foolscap unit tests pass. Is this OK? Is this commit a small enough unit of code? This is definitely not

Re: Foolscap endpoints code review

2014-08-31 Thread David Stainton
to be TCP. https://github.com/david415/foolscap/tree/endpoint_server1 On Sun, Aug 31, 2014 at 6:19 PM, David Stainton wrote: > Dear Warner, > > I have without much trouble broken out the Foolscap client side > endpoint code into it's own branch: > > https://github.com/david4

Tahoe-LAFS cryptoparty at Noisebridge (San Francisco, CA)

2014-09-06 Thread David Stainton
this event yet. Cheers, David Stainton contact info → https://www.lumiere.net/~mrdavid/contact.txt signature.asc Description: Digital signature ___ tahoe-dev mailing list tahoe-dev@tahoe-lafs.org https://tahoe-lafs.org/cgi-bin/mailman/listinfo/tahoe-dev

Re: Tahoe-LAFS cryptoparty at Noisebridge (San Francisco, CA)

2014-09-10 Thread David Stainton
. > > On Sat, Sep 6, 2014 at 12:10 PM, David Stainton > wrote: >> >> >> Dear Tahoe-LAFS enthusiasts, >> >> I am organizing a Tahoe-LAFS cryptoparty at Noisebridge in the next coming >> weeks >> and I'd be delighted if some of you woul

Re: How to let these ports listen only on one device?

2014-09-13 Thread David Stainton
https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/configuration.rst#overall-node-configuration tub.port must be set to something like: tcp:interface=127.0.0.1:7789 On Sat, Sep 13, 2014 at 9:22 PM, Roland Haeder wrote: > Hello together, > > I run Tahoe-LAFS on my local network on all my compute

Re: Tahoe for P2P networks

2014-09-15 Thread David Stainton
Greetings! You. Must. Read!!! http://www.laser.dist.unige.it/Repository/IPI-1011/FileSystems/TahoeDFS.pdf What does "simulating a Peer-to-Peer network?" mean? I have a feeling if you read the above paper it would help you understand Tahoe-LAFS. I2P AND Tor (as in Tor hidden services) can pene

Re: How to let these ports listen only on one device?

2014-09-16 Thread David Stainton
e not discouraged from using Tahoe-LAFS! Please continue to ask your questions and I will help you... however I think for the time being your problem is solved! Enjoy! Cheers, David On Sun, Sep 14, 2014 at 11:28 AM, Roland Haeder wrote: > On 09/13/2014 11:36 PM, David Stainton wrote: >>

Re: How to let these ports listen only on one device?

2014-09-16 Thread David Stainton
oopsy... sorry for my hasty reply. I'm glad it worked out or you! yay! Cheers! David On Tue, Sep 16, 2014 at 8:35 PM, Roland Haeder wrote: > On 09/13/2014 11:36 PM, David Stainton wrote: >> https://tahoe-lafs.org/trac/tahoe-lafs/browser/docs/configuration.rst#overall-node

Re: IMAP back end

2014-11-01 Thread David Stainton
Dear Lukas, I dare say this does not belong in the Tahoe-LAFS trac ticket system. You can write all sorts of applications that use Tahoe-LAFS... good luck with your software project! David On Sat, Nov 1, 2014 at 12:12 PM, Lukas Pirl wrote: > Hi everyone! > > I just tried to create a ticket tha

Re: Tahoe on AWS

2014-12-18 Thread David Stainton
sebridge! https://www.cryptoparty.in/sanfrancisco Cheers, David Stainton On Fri, Dec 19, 2014 at 3:21 AM, Sameer Verma wrote: > Hi, > > I'm trying to set up a system of 1 introducer and 10 storage nodes on > AWS, plus one client on my laptop. The introducer sets up, but when

Re: CommunityCube + Tor-TahoeLAFS

2014-12-19 Thread David Stainton
ities. I think we should also create a development roadmap for "censorship resistance" or also referred to as "denial of service attack resistance". Would you be interested in collaborating with me? What kind of things do you want to use Tahoe-LAFS for? Cheers, David Stainton

Re: NAT traversal

2014-12-21 Thread David Stainton
Tor hidden services get you NAT whole punching for free... so just use Tor hidden services!!! =-| On Sun, Dec 21, 2014 at 11:13 AM, Lukas Pirl wrote: > On 12/20/2014 08:15 PM, Shu Lin wrote: >> if Tahoe team has any intention to put effort in this area > > Well, I am not the team but I'd apprecia

Re: GSoC 2015 to overcome NAT limitations?

2015-02-25 Thread David Stainton
Hi Lukas, I'm very interested to see what the tahoe-devs say to this idea of participating in GSoC. With regards to NAT... it seems that they decided a while back that this problem was outside the scope of what Tahoe-LAFS should solve... but maybe they are interested? I can tell you that there ar

Re: GSoC 2015 to overcome NAT limitations?

2015-02-25 Thread David Stainton
ey want to review and merge my foolscap Twisted endpoints branch which would allow the use arbitrary network transports (transports that have Twisted client and server endpoints). On Wed, Feb 25, 2015 at 4:52 PM, Lukas Pirl wrote: > On 02/25/2015 04:51 PM, David Stainton wrote: >> With r

Re: GSoC 2015 to overcome NAT limitations?

2015-02-25 Thread David Stainton
Yes... me too. Unfortunately large patches like mine probably seem like a daunting code review task that nobody has had time for. On Wed, Feb 25, 2015 at 5:13 PM, Lukas Pirl wrote: > On 02/25/2015 05:28 PM, David Stainton wrote: >> I don't know much about IPv6 but the core Tahoe

Re: GSoC 2015 to overcome NAT limitations?

2015-03-10 Thread David Stainton
per-helper-nodes" would also help, albeit with increased > bandwidth costs. > > > > On Wednesday 25 Feb 2015 15:51:14 David Stainton wrote: > >> Hi Lukas, > >> > >> I'm very interested to see what the tahoe-devs say to this idea of > >> parti

Re: GSoC 2015 to overcome NAT limitations?

2015-03-10 Thread David Stainton
> Perhaps I did not express myself very well. I want to store several TB on > Tahoe-LAFS nodes behind NATs. This is not a super-expensive high-tech exascale > project; just a few Raspberry Pis with external hard drives, distributed > around my friends' houses, total cost well under US$1000. > Your

Re: Tahoe-LAFS featured in “Why the command-line is not usable”

2015-04-08 Thread David Stainton
I think this just means that for the people who do not know or like command line tools, they will use the easier to use interface for Tahoe-LAFS (which doesn't exist yet). On Wed, Apr 8, 2015 at 5:14 PM, John wrote: > Long time lurker on this project and I'm hoping it succeeds. > > Hmm, sorry, ho

Re: removing IP-address autodetection, Tor integration

2015-06-18 Thread David Stainton
What would happen if the foolscap transport plugin state directory was removed but the tahoe.cfg config file remained intact? In that error case when the Tor-Foolscap plugin is used, the correct behavior would be to exit with an error telling the user that the Tahoe-LAFS configuration file express

Re: Fwd: removing IP-address autodetection, Tor integration

2015-06-18 Thread David Stainton
yay! i'm excited for this native Tor integration project. The default Tahoe-LAFS+Txtorcon behavior will persist hidden service key material to a private client config directory... however I'm sure that ephemeral storage nodes would easily be possible as well; I envision ephemeral Tahoe-LAFS onion

Re: removing IP-address autodetection, Tor integration

2015-06-29 Thread David Stainton
Yes the "direct onion services" are a very good feature for the Tahoe + Tor combo... especially with regards to how most people would like to use tools like Tahoe-LAFS to transfer largish amounts of data. Furthermore if/when we release Tahoe+Tor integration I'd like to write a short little release

Re: Fwd: removing IP-address autodetection, Tor integration

2015-06-29 Thread David Stainton
Dear Meejah, I appreciate all the work you've put into the txtorcon project. I am very excited about this Tahoe-LAFS integration. > Cool, tahoe via Tor :) free NAT penetration via Tor onions means Tahoe-LAFS will be *much* more useable... and we can possibly change our thinking of all Tahoe-LAFS

Re: removing IP-address autodetection, Tor integration

2015-06-29 Thread David Stainton
>> * It could be desirable to connect to a grid (possibly of non-onion >>storage servers) using Tor to reach all of the servers *except* the >>user's own servers, which are reachable via their LAN or VPN. > > How would a client know which ones are "mine" vs someone else's? How would we pr

Re: removing IP-address autodetection, Tor integration

2015-06-29 Thread David Stainton
> I think per-server connection preferences should be exposed via the > introducerless mode which you (Brian) mostly implemented long ago but left > commented out and which David made work in the truckee branch[1]. Speaking of > which, I really need to bring that up to date with the last 6 months o

Re: removing IP-address autodetection, Tor integration

2015-07-08 Thread David Stainton
working... then it might be interesting to discuss making Tahoe-LAFS more denial-of-service resistant. On Mon, Jun 29, 2015 at 5:43 PM, David Stainton wrote: >> I think per-server connection preferences should be exposed via the >> introducerless mode which you (Brian) mostly implemente

Re: Need to restore zeroed file

2015-07-09 Thread David Stainton
Dear Roland, I'm sorry to hear about your data loss. It is my understanding that if you do not possess a cryptographic capability for either ReadOnly or ReadWrite access to a file, you will NOT be able to recover it. That is... not with some sort of cryptographic attack. You might check if any of

Re: Need to restore zeroed file

2015-07-09 Thread David Stainton
NO. You cannot try all possibilities. It would defeat the point of using cryptographic capabilities. Your data is lost forever unless you possess the cryptographic capability. I'm sorry for your loss but if you continue to insist you can recover it then that's like saying you don't believe in crypt

Re: Need to restore zeroed file

2015-07-10 Thread David Stainton
Dear Roland, Don't have the caps? Sorry for your lose. Continue to insist it's possible to recover? Trolling. Furthermore... you really must have a low opinion of our security model if you think you can so easily recover a file without it's capability. ;-p Cheers, David On Fri, Jul 10, 2015

Re: Rsync with sftp account

2015-07-27 Thread David Stainton
Why is a question about rsync sent to a list about Tahoe-LAFS? Seriously, I fail to see the connection between Tahoe-LAFS and rsync... except for the file paradigm... they both deal with file like objects... and that's cool and all but what exactly do you want? Do you want to use Tahoe-LAFS with r

Re: Rsync with sftp account

2015-07-30 Thread David Stainton
the end is very slow > > > maybe there is another way to achieve what you want to do > > 2015-07-27 21:46 GMT+02:00 David Stainton : >> >> Why is a question about rsync sent to a list about Tahoe-LAFS? >> Seriously, I fail to see the connection between Tahoe-LAFS a

Re: removing IP-address autodetection, Tor integration

2015-08-26 Thread David Stainton
Hi Brian Warner and everyone else too, There's some really good examples of how to use the txtorcon's Tor hidden service endpoints... that also demonstrate how to properly determine the generated .onion address from the fired IListeningPort: https://github.com/meejah/txtorcon/blob/master/examples/

Re: update on Tahoe/Tor/Foolscap integration

2015-09-01 Thread David Stainton
First of all, we had several meetings, they take a long time, we talk about a lot of stuff... it's work. Therefore it seems really unfair to hear more quasi design discussion/complaining talk from people who didn't attend the meeting; it disregards our efforts. Perhaps come to the meetings? Offer s

Re: update on Tahoe/Tor/Foolscap integration

2015-09-07 Thread David Stainton
Dear Paul Rabahy, Thanks for running the public grid so users can test out Tahoe-LAFS... Btw both you and Zooko misunderstood Brian Warner's e-mail; he doesn't want to take away the autodetect feature... he just wants it to not be the default if no listening address is specified... keyword AUTO w

Re: why Magic Folders doesn't work for more than 2 clients

2015-11-08 Thread David Stainton
Agreed; If possible we'd like to first hear Daira's solution before we send Leif's. I'm also curious to hear Zooko's solution. I've written a proposal document explaining Leif's solution. Hopefully later today Leif will apply more corrections to this document which is almost ready to be reviewed.

Re: why Magic Folders doesn't work for more than 2 clients

2015-11-12 Thread David Stainton
; 2 clients on same file is fair enough > > we shall grab the last github to build to test this. > or we shall take any other build/repo ? > > > thanks > > xavier > > > Le dimanche 8 novembre 2015, David Stainton a écrit > : >> >> Agreed; If possi

Re: why Magic Folders doesn't work for more than 2 clients

2015-11-15 Thread David Stainton
yes we can make a git-like design... although we only have to preserve the history of a single file... not the history of the whole directory hierarchy. the other property i think a new design might *need* is to preserve the identity of the client that created the "snapshot object". the only notio

Re: Topics for Tahoe Hack Fest in Berlin?

2016-01-02 Thread David Stainton
feeling sick today with a cold and so i'm hoping to rest up and recover tomorrow hopefully. On Sat, Jan 2, 2016 at 9:06 AM, Daira Hopwood wrote: > Frederik Braun wrote: > >> > Gottschedstraße 4, [Aufgang] 4 >> > 13357 Berlin >> >> When, though? :-) > > Today and the next few days. The morning sta

magic-folder development roadmap?

2016-01-21 Thread David Stainton
Dear Brian Warner, Would you have time to help us figure out the most suitable development roadmap for the Tahoe-LAFS Magic-Folder project? I believe that at this time we need your senior developer experience to help us make some decisions. Without this kind of leadership we will continue to be s