Some hidden services have been signing various things
with their HS keys. Even benefit may exists from moving
from 1024 to 4k+ and add passphrased startup option while
keeping 80bit for now. There may already be ticket on this area.
___
tor-dev mailing li
Fabio Pietrosanti - lists writes:
> On 10/20/14 3:37 PM, George Kadianakis wrote:
>> Hello,
>>
>> this is an attempt to collect tasks that should be done for
>> SponsorR. You can find the SponsorR page here:
>> https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
> [snip]
>>
>> ==
Jeremy Rand writes:
> On 11/25/2014 06:19 AM, George Kadianakis wrote:
>> George Kadianakis writes:
>>
>>> Hello,
>>>
>>> this is an attempt to collect tasks that should be done for
>>> SponsorR. You can find the SponsorR page here:
>>> https://trac.torproject.org/projects/tor/wiki/org/spons
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 11/25/2014 06:19 AM, George Kadianakis wrote:
> George Kadianakis writes:
>
>> Hello,
>>
>> this is an attempt to collect tasks that should be done for
>> SponsorR. You can find the SponsorR page here:
>> https://trac.torproject.org/projects/to
Hi George,
> I posted an initial draft of the proposal here:
> https://lists.torproject.org/pipermail/tor-dev/2014-November/007863.html
> Any feedback would be awesome.
OK, I’ll have a chance to look at this in the next few days.
> Specifically, I would be interested in undertanding the concept
"A. Johnson" writes:
> Hello all,
>
>
>
>> We put in some simple obfuscations in order to not reveal too
>> sensitive data: we multiplied actual values with a random number in
>> [0.9, 1.1] before including those obfuscated values in extra-info
>> descriptors. Maybe there's something smarter we
Hello there,
I inline a copy of a proposal we've been working on lately. Discussion
can be found in the "Feedback on obfuscating hidden-service statistics"
thread.
The proposal suggests that Tor relays add some stats about hidden
service usage. We believe that these stats are not dangerous and ca
On 10/20/14 3:37 PM, George Kadianakis wrote:
> Hello,
>
> this is an attempt to collect tasks that should be done for
> SponsorR. You can find the SponsorR page here:
> https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
[snip]
>
> == Performance Improvements ==
>
> This is the mo
Karsten Loesing:
>> 1. "Statistics include subsets of relays or bridges by...country code
>> (only relays and only until February 2013)..."
>>
>> Do you mean here "from the beginning of time until Feb '13" or "from
>> present day back as far as Feb '13"? I guess it would be clear from
>> context, b
On 24/11/14 18:58, Harmony wrote:
> Karsten Loesing:
>> Dear list,
>
> Dear Karsten!
Dear Harmony!
>> writing documentation is hard work. I'm sure you already knew that, but
>> let me re-assure you that I now believe it, too. At least until I
>> forget it again and carelessly start documenting
Michael Rogers writes:
> On 09/11/14 18:33, Mansour Moufid wrote:
>> Has there been research on integrating high-latency message
>> delivery protocols with the hidden service model of location
>> hiding? The SecureDrop or Pynchon Gate protocols sound like good
>> starting points. I would love to
George Kadianakis writes:
> Hello,
>
> this is an attempt to collect tasks that should be done for
> SponsorR. You can find the SponsorR page here:
> https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR
>
FWIW, I skimmed the thread and collected all the tasks that were proposed:
h
"A. Johnson" writes:
>> Roger's branch was a PoC that wrote stats on the log file. I don't
>> think we have newer data than what is in #13192. It's unclear whether
>> the relays stopped collecting statistics, or they just haven't updated
>> the trac ticket.
>
> If we could check on that and get t
13 matches
Mail list logo