Alex M (Coyo) c...@darkdna.net wrote:
I must have somehow missed it.
I would really appreciate a link. I cannot seem to find it on my own.
Thank you in advance.
Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run
Thus spake Seth David Schoen (sch...@eff.org):
Alex M (Coyo) writes:
It concerns me that you [Mike Perry] refer to we as though you
contribute anything to the tor project.
https://gitweb.torproject.org/
https://www.torproject.org/torbutton/en/design/index.html.en
On 04/13/2013 01:29 AM, Mike Perry wrote:
Thus spake Alex M (Coyo) (c...@darkdna.net):
On 04/13/2013 12:13 AM, Mike Perry wrote:
If you have a specific list of design flaws that aren't couched in
long rants, we can perhaps help instruct you on how you might
solve them in your redesign with Mr
On 04/13/2013 01:54 AM, Griffin Boyce wrote:
Alex M (Coyo)c...@darkdna.net wrote:
I must have somehow missed it.
I would really appreciate a link. I cannot seem to find it on my own.
Thank you in advance.
Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have
On 13.04.2013 04:30, Alex M (Coyo) wrote:
Is Tor ever going to include support for isolated, independent bridge
relay communities that can host their own bridge directory authorities
I'm working on setting up (yet) another non-profit organization with
limited liability in Germany (gGmbH). Over
Alex M (Coyo):
I have still not gotten a straight answer about whether or not the
bridge community featureset has been released in the stable tor client.
It's all in there.
https://www.torproject.org/docs/tor-manual.html.en
AlternateBridgeAuthority [nickname] [flags] address:port fingerprint
Alex M (Coyo):
On 04/13/2013 12:13 AM, Mike Perry wrote:
Otherwise, thanks for your concern/veiled threats/trolling.
Because obviously criticism and actual concern for the well-being of a
foss project is always trolling and threats.
I hope you aren't a contributor.
See
Alex M (Coyo) c...@darkdna.net wrote:
On 04/13/2013 01:54 AM, Griffin Boyce wrote:
Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a garden-variety VPN/proxy before entering the
Alex M (Coyo):
On 04/12/2013 10:37 PM, adrelanos wrote:
Hi Alex,
these are interesting thoughts. I wrote something related a while ago.
Tor: lobbies vs lobbies - Who will prevail?:
https://lists.torproject.org/pipermail/tor-talk/2012-August/025109.html
Alex M (Coyo):
Is Tor ever going to
I think you're right.
On 04/13/2013 04:32 AM, Gregory Disney wrote:
OnionCat? Anything more extreme than that is going to have be built from
the ground up.
On Sat, Apr 13, 2013 at 5:20 AM, Alex M (Coyo) c...@darkdna.net wrote:
On 04/13/2013 01:54 AM, Griffin Boyce wrote:
Alex M
On 04/13/2013 10:27 AM, adrelanos wrote:
Alex M (Coyo):
I have still not gotten a straight answer about whether or not the
bridge community featureset has been released in the stable tor client.
It's all in there.
https://www.torproject.org/docs/tor-manual.html.en
AlternateBridgeAuthority
On 04/13/2013 10:29 AM, adrelanos wrote:
Alex M (Coyo):
On 04/13/2013 12:13 AM, Mike Perry wrote:
Otherwise, thanks for your concern/veiled threats/trolling.
Because obviously criticism and actual concern for the well-being of a
foss project is always trolling and threats.
I hope you aren't
On 04/13/2013 10:35 AM, Griffin Boyce wrote:
Alex M (Coyo) c...@darkdna.net wrote:
On 04/13/2013 01:54 AM, Griffin Boyce wrote:
Here are the common ways: roll a bunch of bridges using Amazon's cloud
[1], have friends/allies/interesting frenemies run bridges using Vidalia
[2], or just use a
On Sat, Apr 13, 2013 at 01:14:16PM -0400, grarpamp wrote:
Sure, i2P exists, but who wants to spin up a huge honking java virtual
machine just to participate in that relay pool?
It's actually pretty easy and can run on modest hardware as a node.
I disagree about modest hardware. Anything
Hi,
Quote from the path-specification (2.2)
https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/path-spec.txt
We do not choose any router in the same family as another in the same
path.
Made me think that if one declares family for the entire network except
his/her own nodes he would see
#5903 and #6523. There seems to have been some fiddling with both but no
comments to speak of. Thanks for clearing up the reasoning behind your
decision.
Also a web search for ExcludeEntryNodes brought up a preparatory
commit you seem to have made earlier this year
Nick Mathewson:
I think that's actually a false dichotomy, and an interesting one. In
order to help users get security, an option needs to work in a way
that they they expect. Otherwise, when they try to avoid using nodes
in one way, and they wind up telling Tor to do something else
Thus spake grarpamp (grarp...@gmail.com):
It concerns me that you [Mike Perry] refer to we as though you
contribute anything to the tor project.
Mike does a good deal of fine work for the Tor project.
And I'm happy to see the torbrowser project come in place
with as part goal of working
Let's not dread on things out of our control; IMO we should use these
concerns to develop solutions then turn them into soultions that we can
implement. Obviously we can't develop around assassinations nor state
funded terrorism, but we can develop a solution for backdoors
and information leaks.
Hi Gregory!
Gregory Disney:
Let's not dread on things out of our control; IMO we should use these
concerns to develop solutions then turn them into soultions that we can
implement. Obviously we can't develop around assassinations nor state
funded terrorism, but we can develop a solution for
On Sat, Apr 13, 2013 at 8:44 PM, adrelanos adrela...@riseup.net wrote:
I assume you're the Gregory Disney who is also one builder of those
Bitcoin deterministic builds? Since you're involved in Tor as well, I
seems to me you could be a great help by providing some information
about the Bitcoin
21 matches
Mail list logo