Re: [tor-dev] [GSOC 16] Ahmia status update #6

2016-08-12 Thread Nurmi, Juha
Thanks Ismael! Great work. You are very productive. -Juha On Sat, Aug 13, 2016 at 1:02 AM, Ismael R wrote: > Hi everyone, > > I'm working on ahmia.fi, the hidden service search engine and you're > reading > status update #6. > > During the last two weeks, I finished porting the django app to t

[tor-dev] [GSOC 16] Ahmia status update #6

2016-08-12 Thread Ismael R
Hi everyone, I'm working on ahmia.fi, the hidden service search engine and you're reading status update #6. During the last two weeks, I finished porting the django app to the new structure. I'm also working on last minute things before shipping the new site online. I will continue updating d

Re: [tor-dev] txtorcon 0.15.1

2016-08-12 Thread meejah
"Iain R. Learmonth" writes: > Will get this packaged over the weekend. (: Sweet :) > For those interested, I am also packaging txtorcon for jessie-backports and > for Ubuntu suites on deb.tpo, as this is a dependency of ooniprobe. FWIW, I have seen a few warnings recently about txtorcon being

Re: [tor-dev] txtorcon 0.15.1

2016-08-12 Thread Iain R. Learmonth
Hi, On Fri, Aug 12, 2016 at 02:40:10AM +0400, meejah wrote: > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > There was a small issue in 0.15.0 noticed by the Debian reproducible > builds (thanks irl@debian for your packaging work!) Will get this packaged over the weekend. (: For those i

[tor-dev] [GSOC16] Fingerprint Central - Status report n°6

2016-08-12 Thread Pierre Laperdrix
Hi everyone, Here is my sixth status report for my GSOC project. Repository: https://github.com/plaperdr/fp-central Beta: https://fpcentral.irisa.fr 1- Development of the "Acceptable" feature When a user sends his fingerprint to the server, he can now see for each attribute if the collected value

Re: [tor-dev] FWD: Serious TCP Bug in Linux Systems Allows Traffic Hijacking

2016-08-12 Thread dawuud
Dear Liste, concerned Tor relay operators, TCP abolitionists and so called network forensics experts, We already have several tools that can detect various types of TCP injection attacks; for instance: https://github.com/david415/HoneyBadger For fun I'll write some TCP inference exploits as

[tor-dev] FWD: Serious TCP Bug in Linux Systems Allows Traffic Hijacking

2016-08-12 Thread Liste
https://threatpost.com/serious-tcp-bug-in-linux-systems-allows-traffic-hijacking/119804/ … The vulnerable TCP implementation (CVE-2016-5696) could affect an untold number of devices running Linux, including embedded computers, mobile phones and more. … … Attacks can disrupt or degrade supposedly