On 28/11/14 06:06, Virgil Griffith wrote:
At the top of the page,
*And if you come across something that is missing here, please let us know.
For let us know, put an href to an email address/contact-info for
submitting ideas.
Indeed, good catch. I'm currently talking to other Tor devs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 16/10/14 11:56, isis wrote:
Karsten Loesing transcribed 4.5K bytes:
On 16/10/14 10:57, isis wrote:
Having private bridges in public bundles is actually harmful,
because it makes it look like bridges are not much used. If we
want to suggest
Comments on proposal 238:
1. I’m not convinced that the proposed amount of obfuscation is sufficient for
the HS descriptor count. Adding noise to cover the contribution in a single
period of any single HS doesn’t cover its vector of contributions. Thus, if
over time the number of HSes stays the
The next problem is how to find the proper parameters for the Laplace
distribution. I guess the mean μ needs to be 0, but the hard part is
'b'. In a few papers I read, they set 'b' to (Δf/ε).
In the above, Δf is the largest change a single participant could
have on the output of the query.
On Tue, Dec 02, 2014 at 08:57:09PM +, George Kadianakis wrote:
This is worth researching and even implementing a PoC of. There are
various places in the Tor protocols that PIR could be applied.
However I don't know how feasible it is for an MSc thesis. I remember
that Ian Goldberg had
Hello!
just wanted to remind you that the regular biweekly pluggable
transports meeting is going to occur tomorrow at 16:00 UTC. Place is
the #tor-dev IRC channel in the OFTC network.
Thanks for your attention!
--
Yawning Angel
pgpgttQ9aqVoM.pgp
Description: OpenPGP digital signature