This is a summary of some discussion among developers of pluggable
transports about steganographic channels and deriving them from protocol
grammars. Two things prompted the discussion:
* A program called appid, http://code.google.com/p/appid/ , which
compiles simple protocol specifications into
??Phoenixing:
> Hi I live in a country which it block the tor net strictly! Only I can do
> is that I get the bridges from the website. I just want to get the bridges
> automaticly by writing a script. But now I must get the bridges hand by hand
> and one by one. It's more uncomfortable! Co
Hi I live in a country which it block the tor net strictly! Only I can do
is that I get the bridges from the website. I just want to get the bridges
automaticly by writing a script. But now I must get the bridges hand by hand
and one by one. It's more uncomfortable! Could you change it back
Hi Zack,
On 7/21/12 2:13 AM, Zack Weinberg wrote:
> On Wed, Jul 18, 2012 at 10:05 AM, Karsten Loesing
> wrote:
>> On 7/18/12 5:12 PM, Zack Weinberg wrote:
>>> On Thu, Jul 12, 2012 at 6:12 AM, Karsten Loesing
>>> wrote:
here are the first five metrics tech reports that I'd like to turn into
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Dear Tor,
Faravahar is back online. Please see
https://trac.torproject.org/projects/tor/ticket/5749 and let me know
what my next steps should be.
All the best,
SiNA
- --
?If I had eight hours to chop down a tree, I?d spend the first six of
them sh