Hey David, thank you for the link to the Ansible project; I'll be reading up on
how they suggest setting up relays and perhaps add in an option for using their
code instead if dependences are found to be met on the host system. I may not
know the language that they're using but the syntax isn't
On Thu, Jan 21, 2016 at 5:45 PM, Virgil Griffith wrote:
> Fun fact. https://certsimple.com now supports doing Extended
> Validation TLS certificates for .onion. You can even get wildcard
> certs, ooo! so fancy!
>
> For some hidden service operators struggling with people
Firstly, I don't think my questions "deserved" such a long reply and
it is not my preference to have such a broad spattering of
conversation topics... but you started it and so I have tried to reply
to your various points.
The take-away i get from all of that is that you really like bash and
Apologies David, I often am to long wended but will endeavor to be a bit more
to the point in the future but I may fail as words are an not always the most
efficient form of communication.
Indeed Bash is what I use because it's what I know. While I've studied a bit of
Python (enough to read
On 01/20/2016 03:29 PM, Oskar Wendel wrote:
> What do you all think?
I agree that HSDirs are the places to handle this. The network already
trusts them not to MitM connections, and send users to malicious HS,
right? And I presume that there is testing for dishonest HSDirs. If not,
there should
Rejo Zenger:
>> The user can call the admin and ask the admin to read aloud the key
>> fingerprint.
>
> Yes, I like the idea. Still, I think this is not scalable, do you
> think?
In this case you will have to trust somebody who has already done that.
Maybe. Or probably the one you know trusts