Re: [tor-dev] A Proposal for a hidden service revocation system

2015-03-07 Thread Donncha O'Cearbhaill
Hi Adrien, Good job on writing up a draft for this proposal! It looks good! On 07/03/15 21:33, Adrien Johnson wrote: > Filename: xxx-rend-revoke.txt > Title: Hidden Service Revocation > Author: Adrien Johnson > Created: 2015-03-04 > Status: Draft > > Hidden service operators need to be able to r

Re: [tor-dev] bittorrent based pluggable transport

2015-03-07 Thread Dan Cristian Octavian
I agree with Michael's idea of core parts vs replaceable parts (such as the type of cover traffic) since I feel much of the censorship circumvention still relies on how the landscape looks like and that there isn't a clear cut, theory-based solution to the problem (in the way you argue for example

[tor-dev] A Proposal for a hidden service revocation system

2015-03-07 Thread Adrien Johnson
Filename: xxx-rend-revoke.txt Title: Hidden Service Revocation Author: Adrien Johnson Created: 2015-03-04 Status: Draft Hidden service operators need to be able to revoke trust in their hidden service if they know or suspect their hidden service secret key has been compromised. 1. Motivation

Re: [tor-dev] Where can I find info for TunnelDirConns 0|1 ?

2015-03-07 Thread l.m
On 3/7/2015 at 1:49 AM, "HOANG NGUYEN PHONG" wrote:Dear all, I read a discussion about "How can Tor use a one hop circuit to a directory server during initial bootstrap?" here However, why I cannot find "TunnelDirConns 0|1" in torproject.org/docs/tor-manual.html.en? Is the feature already removed

[tor-dev] Patch to improve time-period interval changes in 224-rend-spec-ng.txt

2015-03-07 Thread Adrien Johnson
Hello all, I have a patch for proposal 224-rend-spec-ng.txt that clarifies the definition of time periods and improves the behaviour when the time period duration needs to be changed. -Adrien Johnson From b4dee3bdd7143929d2f3ef0ee1a1c9a4e13d5bad Mon Sep 17 00:00:00 2001 From: Adrien Johnson

Re: [tor-dev] Tor Browser sha256 checksums for old versions?

2015-03-07 Thread Griffin Boyce
David Fifield wrote: I don't know if there's a place where they're all in a single file, but you can get them for historical releases here: https://archive.torproject.org/tor-package-archive/torbrowser/ Thanks! That's perfect :D Satori's new version will detect version based on the hash.

Re: [tor-dev] Tor Browser sha256 checksums for old versions?

2015-03-07 Thread David Fifield
On Sat, Mar 07, 2015 at 06:30:09PM +0100, Griffin Boyce wrote: > Hey all, > > I was just wondering if it's possible to get a gpg-signed list of sha256 > checksums for the Tor Browser. The website only shows the current version's > list of hashes. Which is really useful, but it would be great t

[tor-dev] Tor Browser sha256 checksums for old versions?

2015-03-07 Thread Griffin Boyce
Hey all, I was just wondering if it's possible to get a gpg-signed list of sha256 checksums for the Tor Browser. The website only shows the current version's list of hashes. Which is really useful, but it would be great to have them all if possible. thanks, Griffin -- “Sometimes the que

Re: [tor-dev] bittorrent based pluggable transport

2015-03-07 Thread Michael Rogers
On 03/03/15 16:54, Tariq Elahi wrote: > What I am getting at here is that we ought to figure out properties of > CRSs that all CRSs should have based on some fundamentals/theories > rather than what happens to be the censorship landscape today. The > future holds many challenges and changes and get