Hi Megan, thanks for the patch! What is an example of a standard
library function with a builtin type? I'd like to exercise the use
case that has been causing you trouble.
This change has a couple issues, for instance it treats anything with
the same name as a builtin like a builtin. It also calls
> > I would be pleased to use my *dsl/cable home-router with fixed-IP
> > address to do a port-mapping to a known and stable tor-relay.
> >
> > Being able to "setup a bridge" by simply:
> > - opening a port-forward on my router
> > - submitting it to a web-interface
> >
> > would be a very cool w
On Tue, Jun 12, 2012 at 12:55:24PM +0200, Fabio Pietrosanti (naif) wrote:
> And it would be very useful if we would allow an easy way to setup
> hundreds of "dumb briges", simple TCP forwarding proxy that goes in a
> random order across all public relays.
No need to go in a random order across all
On 6/12/12 12:32 PM, Roger Dingledine wrote:
>> Any attacker who can extend circuits through a bridge can enumerate
>> the set of guard nodes which it routes its clients' circuits through.
>> A malicious middle relay can easily determine the set of entry guards
>> used by a hidden service, and over
On Sun, Nov 06, 2011 at 01:45:43AM +0100, George Kadianakis wrote:
> 3.1. AUTHORIZE cell
>
>The AUTHORIZE cell is a variable-sized cell.
>
>The generic AUTHORIZE cell format is:
>
> AuthMethod [1 octet]
> MethodFields [...]
>
On Thu, Oct 20, 2011 at 06:00:20PM +, Robert Ransom wrote:
> On 2011-10-20, Nick Mathewson wrote:
>
> > 4.3. Separate bridge-guards and client-guards
> >
> >In the design above, I specify that bridges should use the same
> >guard nodes for extending client circuits as they use for the