On Sat, Oct 20, 2012 at 07:34:48PM +, Lee Whitney wrote:
Eugen do you have children? Not attacking you based on this but I'm
curious how it affects perspective.
Yes, I have a kid. Doesn't change a single thing in that attitude.
In my mind it's pretty easy to drawn the line, things that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Binary is available via web download, and shortly available in Google
Play:
https://guardianproject.info/releases/Orbot-release-0.2.4.4-alpha-1.0.11-RC4.apk
(.asc)
The best thing about this release is that we finally merged in
Sathya's work on
Hi!
You have probably heard of it already, but just in case you have missed it:
the Dutch government proposed to search and destroy foreign computers. For some
background, I'll quote the blogpost from my colleague:
The proposal would grant powers to the Dutch police to break into computers,
the paper
*Tor: The Second*-*Generation Onion
Router*http://www.usenix.org/event/sec04/tech/dingledine.html
talked about flow control and congestion control of Tor, but it may have
been out-dated.
are there any articles or papers detailing the current flow control and
congestion control
2012/10/20 SiNA Rabbani s...@redteam.io:
I am not sure why you would want to do that, but if I understand the
question... you can add your .onion hostname with your local IP to
/etc/hosts. That way the .onion would resolve to your local IP.
No. If this worked then there would be a serious flaw
This would only work inside the same machine that is running the hidden
service. He is trying to develop for an .onion website without actually
having to work over Tor.
On 10/22/2012 09:46 AM, Bernd wrote:
2012/10/20 SiNA Rabbani s...@redteam.io:
I am not sure why you would want to do that, but
On 22-10-12 18:34, Rejo Zenger wrote:
The proposal can be found here (dutch only):
http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2012/10/15/wetgeving-bestrijding-cybercrime/wetgeving-bestrijding-cybercrime-1.pdf.
English translation of the full 8 page letter:
On 22-10-12 18:34, Rejo Zenger wrote:
The proposal can be found here (dutch only):
http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/2012/10/15/wetgeving-bestrijding-cybercrime/wetgeving-bestrijding-cybercrime-1.pdf.
English translation, now w/correct link (I
On Mon, Oct 22, 2012 at 06:40:02PM +0200, esolve esolve wrote:
the paper
*Tor: The Second*-*Generation Onion
Router*http://www.usenix.org/event/sec04/tech/dingledine.html
talked about flow control and congestion control of Tor, but it may have
been out-dated.
are there any articles or
On Mon, 22 Oct 2012 18:40:02 +, esolve esolve wrote:
...
besides, do anybody has any idea on how is Tor's flow control mechanism
interact with Firefox's application flow control ?
What application flow control? I don't think there is any place (in the
protocols above layer 3) where
10 matches
Mail list logo