teor teor2...@gmail.com writes:
On 4 Aug 2015, at 00:03 , George Kadianakis desnac...@riseup.net wrote:
…
3.1.2. Shared Random Document During Commitment Phase [SRDOCCOMMIT]
…
Hello,
and thanks for the comments.
I uploaded a new version of the proposal that addresses some of your
On Mon, Aug 3, 2015 at 6:55 PM, s7r s...@sky-ip.org wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
Tor 0.2.7.x will support Ed25519 router identities along with the
traditional 1024-bit RSA ones which will be used simultaneously for
some time, until we will completely deprecate
On 4 Aug 2015, at 22:00 , George Kadianakis desnac...@riseup.net wrote:
XXX The number of active participants is dynamic as authorities leave and
join the protocol. Since the number of active participants is dynamic ,
an attacker could trick some authorities believing there are N
On Tue, 4 Aug 2015 17:55:51 -0400 (EDT)
Steve Snyder swsny...@snydernet.net wrote:
Given a contemporary release of Tor with a contemporary version of
OpenSSL, under what circumstances is the intrinsic curve25519_donna()
preferred over the libsodium/NaCl crypto_scalarmult_curve25519(), or
vice
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 8/4/2015 5:42 PM, Nick Mathewson wrote:
Hi, s7r!
This is an impressive writeup; thanks!
One thing that makes it hard for me to follow this document is
that I'm not sure which parts are describing how things work _now_,
and which parts
On Fri, Jul 31, 2015 at 04:22:19PM -0400, l.m wrote:
I know I've already mentioned some thoughts on this subject. I would
be interested in your thoughts on the types of challenging questions
such a hypothetical DSL might answer. I've already put some effort
into this (forking metrics-lib), but