On Tue, Oct 19, 2021 at 9:43 AM wrote:
>
> See the following testing in IPython shell:
>
> In [6]: import numpy as np
>
> In [7]: a = np.array([1], dtype=(bool))
>
> In [8]: b = np.array([1], dtype=bool)
>
> In [9]: a
> Out[9]: array([ True])
>
> In [10]: b
> Out[10]: array([ True])
>
> It seems t
On Fri, Jul 30, 2021 at 7:00 AM Andrew 👽 Yourtchenko
wrote:
>
> However, when I run it, the "done: " label, etc. gets inserted twice:
Every return statement is the end of a function. ;)
I don't know of a way to match only the "last" return statement in a
function, maybe with scripting...
___
On Sun, Apr 4, 2021 at 7:14 PM Havard Eidnes wrote:
> Well. That depends on what you mean by "entropy".
Hit the nail on the head.
Although there is only one definition of entropy in information theory
/ cryptography, it has different colloquial meanings, especially on
the web. It makes communi
On Thu, Apr 1, 2021 at 4:13 AM Michael Walle wrote:
>
> Hi,
>
> so first I need to say I've never used coccinelle before,
> so please bear with me ;)
>
> To make of_get_mac_address() work with DSA ports (and a nvmem
> provider) I'd need to change the semantics of of_get_mac_address().
> Right now
On Sun, Mar 14, 2021, 20:43 Thomas Adam wrote:
> Hello,
>
> I can see I was as clear as mud with my explanation -- apologies for
> that, so let me try again.
>
> In my original example:
>
> struct monitor {
> struct {
> int width;
> int height
> } virtual;
> };
>
> ... the
On Tue, Mar 2, 2021 at 4:22 PM Joe Perches wrote:
>
> Here is a possible opportunity to reduce data usage in the kernel.
>
> $ git grep -P -n '^static\s+(?!const|struct)(?:\w+\s+){1,3}\w+\s*\[\s*\]'
> drivers/ | \
> grep -v __initdata | \
> wc -l
> 3250
>
> Meaning there are ~3000 declaration
On Mon, Feb 15, 2021 at 7:35 PM Mansour Moufid wrote:
>
> On Tue, Jan 26, 2021 at 3:50 AM Friedrich Romstedt
> wrote:
> >
> > Hi,
> >
> > This is with Python 3.8.2 64-bit and numpy 1.19.2 on Windows 10. I'd
> > like to be able to convert some C++
On Tue, Jan 26, 2021 at 3:50 AM Friedrich Romstedt
wrote:
>
> Hi,
>
> This is with Python 3.8.2 64-bit and numpy 1.19.2 on Windows 10. I'd
> like to be able to convert some C++ extension type to a numpy array by
> using ``numpy.asarray``. The extension type implements the Python
> buffer interfa
Very cool!
But the Mac disk image (mathinspector_0.9.1.dmg) isn't opening ("corrupt
image").
It's 145279488 bytes and the shasum ends with f1ed9231.
___
NumPy-Discussion mailing list
NumPy-Discussion@python.org
https://mail.python.org/mailman/listinfo/n
On Wed, Jan 27, 2021 at 3:23 PM James K. Lowden
wrote:
>
> I don't understand how, if it's possible, to qualify a function in a
> rule. I want the class of all functions having a parameter of a
> particular type.
>
> The code I'm working with has hundreds of unnecessary casts. Many
> functions t
On Fri, Oct 23, 2020 at 11:00 AM Markus Elfring wrote:
>
> > I'd like to add a statement after another within a preprocessor expression,
>
> How do you think about to refer to a “#define directive”?
I mean, not specifically in the #define, but anywhere.
(I don't try to patch preprocessor directi
Hi,
I'd like to add a statement after another within a preprocessor
expression, but spatch adds the line without an escape (backslash).
x.c:
#define X(a) x(a);
(I know the above is not technically correct but it's super common.)
x.cocci:
@@
expression e;
@@
x(e);
+
On Wed, Sep 26, 2018 at 7:29 AM wrote:
>
> I recently found out about Python 3's round-to-even change (via
> https://github.com/cosmologicon/pywat!) and am having trouble finding
> where that change was discussed.
That GitHub project is hilarious especially the NaN stuff...
Rounding is from engi
On Sat, Jul 15, 2017 at 2:59 AM, Julia Lawall wrote:
>
> What version of Coccinelle do you have? It seems that in the github
> version this problem is already fixed.
>
> julia
I was using version 1.0.6. With --disable-worth-trying-opt it works.
I updated to the latest version and that works per
Hi everyone,
I'm trying to add the const qualifier to variables of a certain type,
except for a few.
For example, I'd like to modify this program:
void foo(void) {
int a = 1;
int b = 2;
int c = 3;
int d = 4;
}
to:
void foo(void) {
const int a
On Thu, Jun 23, 2016 at 11:56 AM, Paul Syverson
wrote:
> Vitriol aside, the problem is that you don't get to just apply your
> own intuitive decisions about the meaning of technical terms and then
> complain based on that.
The audience of the Tor project, ever since it's provided a convenient
br
I just heard very unfortunate news about some intellectual property
dispute between Open Whisper Systems and another company.
I won't link to it here, I don't think it would do any good.
It's a strange story. The double ratchet protocol specification is
dedicated to the public domain, the refere
New submission from Mansour Moufid:
Hi,
The last parameter of the function PyFile_FromFile is named 'close', but is a
pointer to a function with the prototype of the 'fclose' function in libc. The
mismatch causes confusion for some static analysis tools.
This patch rena
Voted. Best of luck, I hope you win!
___
Cocci mailing list
Cocci@systeme.lip6.fr
https://systeme.lip6.fr/mailman/listinfo/cocci
Hello,
I'm trying to build tar version 1.28 on OS X. (1.27 builds fine.)
It fails with a few errors like this:
CC xattr-at.o
In file included from xattr-at.c:40:
../gnu/at-func.c:77:12: error: too few arguments to function call,
expected 6, have 5
return CA
On Fri, Aug 14, 2015 at 6:07 AM, Simon Josefsson wrote:
> Mansour Moufid writes:
>
> Have you looked at JSON Web Encryption?
>
> https://tools.ietf.org/html/rfc7516
Wow, JWE is almost exactly what I need. I'm going to start with this
Oops, I didn't "reply to all":
-- Forwarded message ------
From: Mansour Moufid
Date: Thu, Aug 13, 2015 at 5:35 PM
Subject: Re: [messaging] alternative to OpenPGP?
To: Daniel Kahn Gillmor
On Thu, Aug 13, 2015 at 2:13 PM, Daniel Kahn Gillmor
wrote:
>> [
Hi everyone,
Is there an alternative to the OpenPGP message format?
There are three problems with OpenPGP, that I understand: metadata; [1]
format oracles; [2] and difficulty of implementation. [3]
There are many more problems[4] but I care about these three.
So I'm looking for an alternative m
Hi everyone,
This is just to let you know that Tor compiles without modification
using the CompCert C compiler.
This week I'll run it in the "C interpreter" to see what happens.
http://compcert.inria.fr/man/manual004.html#cinterp
Mansour
___
tor-dev
On Wed, Jul 29, 2015 at 9:55 AM, Alexandre Guillioud
wrote:
> I had heard that the original use case were to protect their (US navy)
> ships against command center localisation through RF harvesting. The onion
> routing of the admiral commands through a few boats means enemmies can't
> detect whi
On Wed, Jul 29, 2015 at 9:50 AM, Paul Syverson
wrote:
> We came up ourselves with potential application suggestions such as
> open source intelligence gathering or "phoning home" as you put it.
> We also came up with other ideas (some good, some bad) and also talked
> to people about how it might
On Fri, Jul 10, 2015 at 10:35 PM, Magnus Hedemark
wrote:
> Hello,
>
> I have set up a Jenkins CI server and have it tracking the Tor project's git
> repository. I'm going to be building packages for the OmniOS platform, which
> is not yet supported. I tried searching the site for advice for packa
On Fri, Jul 10, 2015 at 3:35 PM, Drew Fustini wrote:
> Greetings - I am a Tor Browser user and also an operator of a couple
> Tor relays. I believe the Tor Project has a noble mission.
>
> An online friend recently claimed to me that "amoral content is a huge
> portion of the exit node traffic".
On Tue, Jun 23, 2015 at 2:38 PM, Joe Btfsplk wrote:
> OK, but how is that a "business" for an exit relay? Business implies profit
> or gaining some benefit.
> You're saying that some exit relay operator would form business partnerships
> with sites, to provide captcha services?
> Wouldn't that b
On Mon, Jun 22, 2015 at 8:15 PM, Joe Btfsplk wrote:
> mansour moufid wrote:
>
> "Sometimes I wonder if it's really Cloudflare, or some bad exit node
> running a CAPTCHA solving business."
>
> Mansour, to what end would they run a captcha solving business?
>
Sometimes I wonder if it's really Cloudflare, or some bad exit node
running a CAPTCHA solving business.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
I just realized that NumPy uses the time domain algorithm for correlation.
So it would be much easier to modify the correlation functions in SciPy
than in NumPy.
___
NumPy-Discussion mailing list
NumPy-Discussion@scipy.org
http://mail.scipy.org/mailman/li
Hello,
There is a simple solution.
The cross-correlation of two arrays of lengths m and n is of length
m + n - 1, where m is usually much larger than n.
If you need to compute the cross-correlation with a bound on the lag
of k, then truncate the longer array to length k - n + 1.
That is,
def _
"gpg ciphertexts with RSA 1024 were returned as fails"
http://cr.yp.to/factorization/batchnfs-20141109.pdf
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
In case you missed it:
"On Effectiveness of Hopping-Based Spread Spectrum Techniques for
Network Forensic Traceback"
http://dx.doi.org/10.2991/ijndc.2013.1.3.3
They implemented new traffic confirmation attacks that cannot be
detected by the end points, based on some radar techniques. They
don't
Hi everyone,
I'd like to share some advice to operators of hidden services in order
to mitigate the attack family known as "traffic confirmation" attacks.
(I say mitigate because the early implementation of these attacks
are likely trivial enough to be defended against, for now, but will
get much
Hi everyone,
Operation Onymous, the anecdotes about it (I don't think the DoS was a
DoS), the wording of the related legal documents, and the previous CMU
research... make me think that traffic confirmation attacks are now
widely used in practice. Other, cat-and-mouse implemetation
vulnerabilitie
On Sat, 08 Nov 2014 22:10:23 +
Fears No One wrote:
> BEGIN TINFOIL
>
> Upon scrolling through the .xz files (I personally use xzless), you'll
> find a bunch of stuff like:
>
> 1
> /%5C%22http://www.hackforums.net/code/fail/code/code/code/code/code/
> ...
>
> All of the requests were
On Wed, 20 Aug 2014 06:09:24 +0200
Arne Renkema-Padmos wrote:
> As an alternative to audible communication you could also try
> ultrasound, but I'm not sure how well that works quality wise.
> Regarding end-user agency in determining when their device broadcasts
> their signal: if you don't want
On Sun, 17 Aug 2014 10:28:34 -
Brennan Novak wrote:
> That's an interesting idea from a UX standpoint. How do you see the
> generation of the audio fingerprint happening? How would an audio
> fingerprint be generated? Would a user "record" it or would it be
> algorithmically derived from the
Hi everyone,
With regards to the question of more usable public key fingerprint
verification, I propose that a device (especially mobile) emit an
audible encoding of the fingerprint, which the second device decodes
and checks.
Almost everything has a microphone and speakers, so verifying a
finger
On Tue, 05 Aug 2014 18:00:32 +0200
Karsten Loesing wrote:
> On 05/08/14 17:24, Philipp Winter wrote:
> > On Tue, Aug 05, 2014 at 11:37:45AM +0200, Karsten Loesing wrote:
> >> Started looking into better algorithms to detect Sybil attacks on the
> >> Tor network. Current thinking is that we shoul
On Sat, 19 Jul 2014 02:45:05 +0300 (EEST)
Sampo Syreeni wrote:
> So what *is* it with you people? Can't you see that steganography really
> starts and ends with information and coding theory, unlike cryptography?
> Its bounds really necessarily and from the start have to do with noise
> and un
On Fri, 2014-04-25 at 09:28 -0700, Tony Arcieri wrote:
> There's an entire class of memory safety bugs which are possible in C but
> not possible in Rust. These also happen to be the class of bugs that lead
> to Heartbleed-like secret leakage or remote code execution vulnerabilities.
It seems we'
Hello,
Like most of you I imagine, I follow the LibreSSL port with interest.
I noticed a couple changes that could be automated with Coccinelle [1]
so I wrote some semantic patches here:
https://bitbucket.org/eliteraspberries/openssl-bis
in the branch named 'cocci'.
To apply a semantic patch,
On Tue, 2014-01-14 at 23:57 -0500, grarpamp wrote:
> I believe there is sufficient demand to merit deployment of a
> good mix network. As well as perhaps web/other intake frontends
> due to the now prevalent a) dwindling free email b) demand by
> mail providers for phone authentication. As for ope
On Sun, 2013-11-03 at 04:17 +, Roth Paxton wrote:
> Cryptographyuniversal.com is my website.@Niko. I accept your criticism
> and you are correct that I was angry at the IACR when the site was
> published. However I am only an amatuer cryptographer. Some of the
> math is wrong. The site is mere
On Fri, 2013-10-18 at 10:18 +0100, Ben Laurie wrote:
> On 14 October 2013 14:36, Eugen Leitl wrote:
> >
> > Guys, in order to minimize Tor Project's dependance on
> > federal funding
>
> Why?
Because a diversity of funding is better than a single source of funding
-- especially when that single
On Wed, 2013-09-25 at 10:11 -0400, John Young wrote:
> [Answer to the question:] "Does there exist an unbreakable cipher"
> would be this, "Every cipher is breakable, given enough traffic, and
> every cipher is unbreakable, if the traffic volume is restricted
> enough."
>
> [End quote]
>
> Is
On 2013-09-04, at 8:09 PM, josef.win...@email.de wrote:
> Can a developer please explain to me why something like the
> following obfuscation of 'torified traffic' is exploitable?
>
> Suppose a scenario where a collective of authorities is able
> to observe large parts of the www. Then observing
On 2013-08-20, at 3:31 PM, Fabio Pietrosanti (naif) wrote:
> Hi all,
>
> at GlobaLeaks we are going to implement a feature that want to
> mitigate time correlation attacks between a Whistleblower submitting
> something and a Receiver, receiving a notification that there's a new
> leak outstanding
On 2013-08-17, at 1:50 PM, Jon Callas wrote:
> On Aug 17, 2013, at 12:49 AM, Bryan Bishop wrote:
>
>> Would providing (signed) build vm images solve the problem of
>> distributing your toolchain?
>
> Maybe. The obvious counterexample is a compiler that doesn't
> deterministically generate code,
On 2012-12-04, at 3:00 AM, Mansour Moufid wrote:
> Hello,
>
> Is it possible to use CIL to transform expressions like "z = x*2+y;"
> into a series of simple three-operand statements:
>
>z = x * 2;
>z = z + y;
>
> If so, I assume I would have to wr
Hello,
Is it possible to use CIL to transform expressions like "z = x*2+y;"
into a series of simple three-operand statements:
z = x * 2;
z = z + y;
If so, I assume I would have to write a CIL module?
I'd appreciate any pointers. Thank you for your time.
Mansour
--
On 2012-11-08, at 6:57 AM, Kees Cook via RT wrote:
> http://www.viva64.com/en/b/0178/
>
> OPENSSL_cleanse is being called with pointer size instead of the buffer
> size in some places.
> For example crypto/des/des.c:
>
> void doencryption(void)
> ...
>static unsigned char *buf=NULL,*obuf
On 2012-10-04, at 9:45 AM, Tom Ritter wrote:
> Of course those are the huge, monolithic cases. Take simpler apps
> like gpg, ssh, putty, pidgin (god help us), git, svn. While tracking
> upstream would certainly be a problem, having a statically linked tor
> and a modified binary that sent everyt
On 2012-09-30, at 8:47 AM, Paul wrote:
> When using DNSPort to resolve googlemail.com, I get the 'wrong' address:
>
> $ host googlemail.com
> googlemail.com has address 173.194.41.150
> Host googlemail.com not found: 4(NOTIMP)
> Host googlemail.com not found: 4(NOTIMP)
>
> It should be something
On 2012-09-30, at 5:53 AM, grarpamp wrote:
> Anyone else notice that Google's 'Recaptcha' service
> serves up really hard images when you're coming via Tor?
> They're not even words, just random obscured letters. You
> can still solve it, but not anywhere near as easily. Expect
> to hit new image
On 2012-09-24, at 2:10 AM, Runa A. Sandvik wrote:
> On Sun, Sep 23, 2012 at 11:36 PM, SiNA Rabbani wrote:
>> Next phase is to do the same with the entire population of Iran. It is
>> hard for me to imagine the Internet getting completely shutdown. I
>> suspect they will make SSL traffic very slow
Hello,
After running ntpd for the first time on a machine with a bad clock, I
got the following in syslog:
ntpd[24277]: adjusting local clock by 369307689.625505s
ntpd[24277]: adjtime failed: Invalid argument
I think adjtime limits its argument to a maximum value. Apparently on
Unix this
On 2012-09-14, at 6:58 PM, grarpamp wrote:
>> (can hardly be the first, can it?)
>
> We've all had conversations over the past five plus
> years about how Tor would be useful for botnets.
> I'm amazed it hasn't really shown up at all. Maybe
> the lack of speed and larger footprint hurts more
> th
On 2012-09-10, at 8:56 AM, adrelanos wrote:
> antispa...@sent.at:
>> On Mon, Sep 10, 2012, at 00:21, Fabio Pietrosanti (naif) wrote:
>>> It would facilitate the inclusion of Tor in third party applications
>>> that include/bundle/redistribute Tor, regardless of the Linux
>>> Distribution.
>>
>> S
On 2012-09-05, at 11:48 PM, grarpamp wrote:
>
>> I think cryptography will depend more and more on steganography [...]
>> and the message is encoded in the inter-packet timing noise. ;)
>
> Moot when you suck up and process everything to extract the
> crypto. Steg is nothing more than crypto with
On 2012-09-05, at 6:16 AM, Eugen Leitl wrote:
> http://nplusonemag.com/leave-your-cellphone-at-home
>
> Sarah Resnick
>
> Leave Your Cellphone at Home
>
> Interview with Jacob Appelbaum
>
> From OCCUPY Gazette 4, out May 1.
Very interesting read.
I'm not sure I buy the theories for the new d
Hi "Randolph",
Do you know these developers?:
http://sourceforge.net/users/mikepery
http://sourceforge.net/users/perrymikey
What funny coincidences...
I'll just leave this here:
http://sourceforge.net/projects/sourceforge/report_inappropriate
___
to
On 2012-08-26, at 5:35 PM, julian wrote:
> 12 Aug 22:56 Mansour Moufid:
>> Even with webrsync you still have to trust the mirror(s), and then
>> the Gentoo release infrastructure...
>
> Forgive me my bluntness, but how is that different from trusting you?
I have nothing t
On 2012-08-12, at 3:36 PM, Alessandro Di Federico wrote:
> On Sun, 2012-08-12 at 15:11 -0400, Mansour Moufid wrote:
>> Portage offers no authentication and no confidentiality.
>
> Each file has a SHA-256, SHA-512 and Whirlpool hash associated. This
> hashes are in Portag
On 2012-08-12, at 1:21 PM, Alessandro Di Federico wrote:
> Hi, I'm trying to put up an ebuild for the Tor Browser Bundle for
> Gentoo. As you may know an ebuild is a script which automates the build
> of a certain application. We already have something in Portage [2] (the
> official ebuild reposit
Looks like this a duplicate of #623708.
See also:
http://askubuntu.com/questions/62581/identical-folders-in-home-
directory-after-decryption-of-home-directory-failed
This bug has existed for nearly a year (clearly not a priority). I'm not
going to waste any more time with this, sorry.
--
You r
Public bug reported:
So I upgraded to 12.04 yesterday.
Now my home directory is mangled, with data apparently having been
overwritten.
I use the "Private" home encryption feature with ecryptfs. Something
must have overwritten the standard folders in my home directory during
the upgrade, because
On 12-04-24 8:01 AM, Kenneth R Westerback wrote:
On Tue, Apr 24, 2012 at 01:05:52AM -0400, Mansour Moufid wrote:
In getenv.c, the __findenv function is changed to use size_t for its
length parameter, and ptrdiff_t for its offset parameter.
The getenv function is modified accordingly.
In
On 2012-04-24, at 12:30 AM, Philip Guenther wrote:
> On Mon, 23 Apr 2012, Mansour Moufid wrote:
>> The attached patch makes a few small type changes in the files getenv.c
>> and setenv.c. The assumption is that unsigned types (specifically
>> size_t) better represent obj
In getenv.c, the __findenv function is changed to use size_t for its
length parameter, and ptrdiff_t for its offset parameter.
The getenv function is modified accordingly.
In setenv.c, the setenv function is also modified to match the changes
to __findenv, as well as to use size_t for all variable
Hello,
The attached patch makes a few small type changes in the files getenv.c and
setenv.c. The assumption is that unsigned types (specifically size_t) better
represent object sizes than signed types, and that ptrdiff_t is best for
pointer arithmetic.
In getenv.c, the __findenv function is chang
On 2012-04-23, at 12:37 PM, Nick Mathewson wrote:
> On Mon, Apr 23, 2012 at 9:04 AM, Mansour Moufid
> wrote:
>> Hi,
>>
>> Here's a patch to adhere to a few of the integer-related recommendations in
>> the CERT C Secure Coding Standard. I tried not to bre
On 2012-04-23, at 12:33 PM, Mark Ellzey wrote:
> On Mon, Apr 23, 2012 at 09:04:59AM -0400, Mansour Moufid wrote:
>> Hi,
>>
>> Here's a patch to adhere to a few of the integer-related recommendations in
>> the CERT C Secure Coding Standard. I tried not to break
Hi,
Here's a patch to adhere to a few of the integer-related recommendations in the
CERT C Secure Coding Standard. I tried not to break anything but you may want
to double-check.
Mansour
libevent-2.0.18-stable.INT--.patch
Description: Binary data
Hello,
If I try to use the size_t type for array indices in a cocci script, I get an
error. For example:
foo.cocci:
@@
type T;
identifier x, y;
@@
- T y;
+ size_t y;
...
x[y]
foo.c:
int main(void) {
int i = 2;
int x[] = {1,2,3};
x[i] = 4;
return 0;
}
$ spatch --sp-file foo.
On 2012-04-12, at 3:21 AM, Arie Middelkoop wrote:
> On 12-04-12 04:20, Mansour Moufid wrote:
>> Hello,
>>
>> Even with --enable-python, rc12 doesn't install coccilib (on Debian). rc11
>> works fine. Am I forgetting something?
>
> That is probably a ty
Hello,
Even with --enable-python, rc12 doesn't install coccilib (on Debian). rc11
works fine. Am I forgetting something?
On 2012-04-08, at 12:48 PM, Julia Lawall wrote:
> Version 1.0.0-rc12 has been released. There have been significant changes to
> the makefile and to the management of exter
On Tue, Apr 3, 2012 at 1:28 PM, ron minnich wrote:
> You not only fixed my problem you anticipated my next question :-)
>
> struct a {
> int b;
> int c;
> };
>
> struct a A {
> .b = 5,
> .c = 10,
> };
>
> I'm failing on the rule for the second case ... I think you answe
On Tue, Apr 3, 2012 at 1:08 PM, ron minnich wrote:
> struct a {
> int b;
> int c;
> };
>
>
> /* spatch --sp-file t.cocci t.c */
>
> @@
> @@
> struct a {
> -int b;
> };
>
> I want to delete the 'int b' ... what am I missing here?
@@
@@
struct a {
...
- int b;
...
};
_
Hello,
Building rc11 from source on OS X produces the error at the end of this
message. I'm not familiar with the code, but I think it's a typo:
--- pycaml/pycaml_ml.c.orig 2012-04-02 06:31:31.0 -0400
+++ pycaml/pycaml_ml.c 2012-04-02 06:31:45.0 -0400
@@ -1468,7 +1468,7 @@
Hello,
Is it possible to access the local indentation character(s), i.e. tab
or whatever number of spaces, from coccilib in Python?
I'd like to print lines of code underlined with carets, a la clang,
from within a @script:python@.
Thanks for your time.
Mansour
___
On Wed, Mar 14, 2012 at 9:42 AM, Öyvind Saether wrote:
> Google seems to only give me some broken captcha these days. Scroogle is no
> more.
>
> Are there any working Google scraper alternatives or some alterantive actually
> usable Tor-friendly search engine out there?
Others have mentioned them
On Wed, Mar 14, 2012 at 5:03 PM, Mr Dash Four
wrote:
> All of them are fucking shit [1] - if you value your own privacy, that is!
With Tor your privacy is disjoint from which search engine you use.
___
tor-talk mailing list
tor-talk@lists.torproject.org
On Tue, Mar 6, 2012 at 11:55 PM, The23rd Raccoon
wrote:
> Now bear in mind that I'm just a Raccoon, but some time ago I scrawled
> a proof out that showed that the correlation accuracy of a "dragnet
> GPA" goes down in proportion to the square of the number of concurrent
> users using an anonymiza
On Tue, Mar 6, 2012 at 7:27 PM, Ted Smith wrote:
> On Tue, 2012-03-06 at 16:20 -0800, Seth David Schoen wrote:
>> I was concerned that the graphic should not make people think that
>> _no one_ can ever associate them with their browsing when they use
>> Tor. I've been taught to think of the GPA t
On Tue, Mar 6, 2012 at 4:04 PM, Paul Syverson wrote:
> I'm a mere four years behind in putting my work up on the web, and
> this one wasn't co-authored so nobody else did either. I'll try to do
> something about that in my copious free time this week and send a
> link.
Please do, this attack you
On Sat, Mar 3, 2012 at 8:10 AM, Fabian Keil
wrote:
> Robert Ransom wrote:
>
>> On 2012-03-02, Andrew Lewman wrote:
>>
>> > The trick is, I like to think I know what I'm doing and that I'll
>> > notice if apt-get or my VM image fails to transfer untouched. Whether
>> > I'll actually notice a soph
On Sat, Mar 3, 2012 at 10:06 AM, wrote:
> We have also a sub page TorBOX/LeakTests and all went negative. Additionally,
> Skype, which is known for it's ability to punch through firewalls was not
> able to non-torified connections. What I don't like to advertise is, that
> also Bittorrent does
Brandon,
Use the --prefix option of the configure script:
$ ./configure --prefix=/some/local/path
$ make
$ make install
Then make sure /some/local/path is in your PATH:
$ echo 'PATH=/some/local/path:$PATH' >> ~/.profile
$ echo 'export PATH' >> ~/.profile
$ source ~/.prof
On Thu, Feb 2, 2012 at 9:03 AM, Julia Lawall wrote:
> Not at the moment. I can try to add it.
It's no big deal, I can work around it.
Thanks for the work on Coccinelle, btw, seems like a great tool.
Mansour
___
Cocci mailing list
Cocci@diku.dk
http:/
Hello,
I'm trying to use the comma operator in a patch. For example:
@@
identifier x;
@@
- x = 5;
+ x = (3, 5);
to patch:
int main(void) {
int x;
x = 5;
return 0;
}
I get a parse error... Is it possible to use the comma operator in a
patch at
Hello again,
Attached is a patch that continues with the idea of declaring
constants using their corresponding type.
Great work on Cython, by the way. It's very useful.
Mansour
From 4f537f477d845468f36ac7b9370185124250520a Mon Sep 17 00:00:00 2001
From: Mansour Moufid
Date: Fri, 20 Jan 20
On Mon, Jan 2, 2012 at 8:48 PM, Lisandro Dalcin wrote:
> On 2 January 2012 22:37, Mansour Moufid wrote:
>> Now my issue is as follows.
>>
>> (I CCed the cython-users list if this question is more appropriate there.)
>>
>> I have a simple file, int.pyx:
>>
Now my issue is as follows.
(I CCed the cython-users list if this question is more appropriate there.)
I have a simple file, int.pyx:
from libc.stdint cimport *
print long(UINT8_MAX)
print long(UINT16_MAX)
print long(UINT32_MAX)
print long(UINT64_MAX)
with the usual setup.py stuff. Compiling an
Hello,
Attached is a quick fix for some typos in stdint.pxd.
Tested with Cython version 0.15.1.
Mansour
From a9b3caf05b98c07b779d0ecd7d0e3498de4f4f84 Mon Sep 17 00:00:00 2001
From: Mansour Moufid
Date: Mon, 2 Jan 2012 19:01:42 -0500
Subject: [PATCH] Fix integer width constant names in
On Tue, Oct 25, 2011 at 11:04 AM, Andrew Lewman wrote:
> One-third of the machines on those IP addresses are vulnerable to
> operating system or other system level attacks, meaning he can break
> in. That's quite a few! We wonder if that's true with the real Tor
> network, or just their simulated
diff --git a/whatsnew-2.0.txt b/whatsnew-2.0.txt
index 5ad6b97..be0c71b 100644
--- a/whatsnew-2.0.txt
+++ b/whatsnew-2.0.txt
@@ -24,7 +24,7 @@ What's New In Libevent 2.0 so far:
COMPATIBILITY:
- Nearly all existing code that worked with should Libevent 1.4 should still
+ Nearly all existing
1 - 100 of 151 matches
Mail list logo