Re: [tor-dev] Stem GSoC 2013

2013-04-27 Thread Damian Johnson
> Speaking of connections.py, if you improved it during the port to stem > to also support Window's netstat then that would greatly help in > porting arm to windows... > > https://trac.torproject.org/projects/tor/wiki/doc/arm#Windows Oh. Speaking of connection.py improvements, that module presentl

Re: [tor-dev] Stem GSoC 2013

2013-04-27 Thread Damian Johnson
> connections.py looks interesting, doing *nix specific tasks is nice for a > change, > since I'm dealing with win32api much more often. I just finished attending Linux Fest Northwest during which Lee and I talked quite a bit about iron python for stem. Considering that you have some windows expe

Re: [tor-dev] "identity digest" and "hash of a router's identity key"

2013-04-27 Thread Damian Johnson
> In a consensus, the item after nickname is base64 encoded "hash of a > router's identity key" > If this item is base64 decoded, is it the same as the "identity > digest" of the router? Hi Frank. That field is the relay's fingerprint. Here's the code stem uses for parsing that line... https://g

Re: [tor-dev] Stem GSoC 2013

2013-04-27 Thread tomasz . kunikowski
Hey Damian, (I hope I got replying to digest right this time around). Thanks for all the feedback and assistance so far, it's an immense help. > The right way is to add this capability to tor, and the hacky way is > to construct a normal circuit, truncate the exit, then replace it. The closest

Re: [tor-dev] Source Code Static Analisys

2013-04-27 Thread Nick Mathewson
On Sat, Apr 27, 2013 at 7:16 PM, Ulises Cuñé wrote: > I want colaborate with Tor project. > > I send a document of analys source code about the lasted version Well, looks like I'm spending my evening combing through this thing looking for true-positives. If you find any that aren't false-positiv

Re: [tor-dev] About GSOC 2013 Steganography Browser Addon project idea

2013-04-27 Thread Sukhbir Singh
Hi Hareesan, > : Exif.Photo.ImageUniqueID or Exif.Image.DateTime, etc ). If its a fixed > location and if the man-in-middle know that location,and if he know Bob's > public key (since its public), he could easily get to the message. If MIAB Alice will use Bob's public key to encrypt the message,

[tor-dev] "identity digest" and "hash of a router's identity key"

2013-04-27 Thread Frank Young
In a consensus, the item after nickname is base64 encoded "hash of a router's identity key" If this item is base64 decoded, is it the same as the "identity digest" of the router? ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproj

Re: [tor-dev] About GSOC 2013 Steganography Browser Addon project idea

2013-04-27 Thread Hareesan
Hey there, I have been working on the proposal for the browser extension. Here I got some doubts. The following say how I expect the system could work according to the MIAB implementation explained in 3.2 part in the research paper [1]. Alice who know Bob's public key. He encrypt the message using