Re: [tor-dev] Building a privacy-preserving "contact tracing" app

2020-04-24 Thread carlo von lynX
On Fri, Apr 24, 2020 at 11:11:12AM +0200, Jeff Burdges wrote: > Ignoring the nasty political realities, there are cute mixnet tricks for > contact tracing apps: Sounds like a neat approach, Jeff. -- E-mail is public! Talk to me in private using encryption: //

[tor-dev] git-commit-private: preserve the privacy of your working times

2017-01-31 Thread carlo von lynX
On Tue, Jan 31, 2017 at 04:53:20AM -0500, grarpamp wrote: > [ ! "$var" ] Thank you. That was one of the constructs why I never took bourne shell seriously.. ;) but this looks a lot more acceptable. In the spirit of sharing, here's one more privacy-oriented git script: #!/bin/sh # # working

[tor-dev] git-update: transparently torified git pulls

2017-01-30 Thread carlo von lynX
Hi, here it is. Style may be crude as I usually write perl. #!/bin/sh # # A variant of git pull which operates over Tor and # - figures out when 'torify' needs to be used # - shows the changes that were made to the repository # - before attempting to merge # --lynX & heldensaga, 2017

[tor-dev] Adaptive CircuitStreamTimeout

2016-11-16 Thread carlo von lynX
Hola! Documentation says if I do not set a CircuitStreamTimeout manually, then some internal logic will come to play. I presumed the timeout measurement protocol would influence that value, so performance of circuits would adapt to the radically different network conditions... but then I

[tor-dev] remotor - control console that can also notify into a chatroom

2016-06-12 Thread carlo von lynX
Hi there. Here's a fine new little console-based perl script that lets you control your Tor, monitor circuits as they happen, issue commands like changing your identity etc, and forward critical events to a chatroom using the PSYC protocol. I found vidalia too heavy and arm too confusing and

Re: [tor-dev] TUF Repository for Tor Browser

2016-06-10 Thread carlo von lynX
On Fri, Jun 10, 2016 at 04:22:04PM +0200, ban...@openmailbox.org wrote: > In light of the technical obstacles that prevent packaging Tor > Browser (see below), I propose operating a repository that relies on > The Update Framework (TUF) [0]. TUF is a secure updater system > designed to resist many

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-25 Thread carlo von lynX
On Wed, Feb 25, 2015 at 07:41:01AM +0100, Andreas Krey wrote: The AF_TOR listener would go away with closing the listener socket as well (and thus is bound to the lifetime of the process); so binding a hidden service to the control connection is the obvious analogy. Yes, but as it stands

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-24 Thread carlo von lynX
Concerning the ephemerality of it, I can imagine services being configured en passant by a cat socket from a shell script or so, [..] On Tue, Feb 24, 2015 at 09:05:38PM +0400, meejah wrote: You still need to authenticate. I do like the simplicity, but it will be a little more complex

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread carlo von lynX
Let me chime in on saying that this looks to me like a great development. I even imagine that in a couple of years most end-to-end encrypted services on the Internet may be using this interface, so for the sake of accessibility for future devs, I would suggest something totally superficial: On

[tor-dev] Named pipes with tor

2014-04-15 Thread carlo von lynX
Hiya. Been around the tor dev community a bit, but today is my first day on the legendary tor-dev mailing list. I am asking if it makes sense to apply a minor patch to Tor source, but first, the use case: tor is very adamant at scrubbing the addresses that are being connected to in the logs, but