Hi Tom,
Thank you for the response!
I’ve started to dive in process, collecting information about BreakPad
and Socorro.
Also I created the blog for project - https://torcrashreporter.wordpress.com.
In few days I'll try to send draft of proposal.
Regards
Nur-Magomed
2017-03-20 18:18 GMT+03:00
I'm trying to gauge interest on the IRTF's CFRG mailing list regarding
collaborating on a draft for a standard Ed25519 hierarchical derivation /
key blinding scheme:
https://mailarchive.ietf.org/arch/msg/cfrg/lM1ix9R-0tVzhZorQhQlKvi4wpA
The post makes several mentions of Tor's work in the space i
Hi,
So here's the updated part of the proposal.
§ Threat model & Security Considerations
Consider the adversary with the following powers:
- Has sufficient computational and storage power to brute force any
method that can be brute forced.
- Can get the recurrent control of
On 17/03/17 20:18, Tom Ritter wrote:
> Anyway, the topic on the website is a bit ambiguous, so I've attempted
> to flesh out the project more here:
>
> https://storm.torproject.org/shared/URdVCz8eCbBfQzYwG3gaR-KuCvMTIS3zU7emq3AF7A3
>
> I'd welcome input from the rest of the tor community on this
Hi,
I am Ivan Tham. Currently studying in Computer Science in APIIT Malaysia. I am
interested particapate in Google Summer of Code 2017 under tor organization. I
am interested to see Proposal 224 coming along but I would really like to see
[Proposal 272][0] and hope that tor hidden services can be
On Tue, 21 Mar 2017 16:06:59 +, Jaskaran Singh wrote:
...
> > On the other hand side you can indeed keep the filter rather small
> > because one bridge doesn't get that many collisions, and you don't
> > need to make it anywhere as big as to avoid collision with 2^32 entries.
> > Could also be
teor writes:
> Hi Jaskaran,
>
>> On 17 Mar 2017, at 23:42, Jaskaran Singh wrote:
>>
>> §2. Research
>>
>> There are three ways to solve this problem. All the three ways are
>> actually Big Data
>> Algorithms. A few problems arises for each of these algorithms since
>> they are made for
>> big
Hi Andreas,
On Saturday 18 March 2017 10:06 AM, Andreas Krey wrote:
> As an adversary, I wouldn't take down the bridge but either monitor
> the traffic to it ($country can also do this on its border gateways),
> or modify it to tell me the connecting IP addresses.
Absolutely correct. In fact I m