> Speaking of connections.py, if you improved it during the port to stem
> to also support Window's netstat then that would greatly help in
> porting arm to windows...
>
> https://trac.torproject.org/projects/tor/wiki/doc/arm#Windows
Oh. Speaking of connection.py improvements, that module presentl
> connections.py looks interesting, doing *nix specific tasks is nice for a
> change,
> since I'm dealing with win32api much more often.
I just finished attending Linux Fest Northwest during which Lee and I
talked quite a bit about iron python for stem. Considering that you
have some windows expe
> In a consensus, the item after nickname is base64 encoded "hash of a
> router's identity key"
> If this item is base64 decoded, is it the same as the "identity
> digest" of the router?
Hi Frank. That field is the relay's fingerprint. Here's the code stem
uses for parsing that line...
https://g
Hey Damian,
(I hope I got replying to digest right this time around).
Thanks for all the feedback and assistance so far, it's an immense help.
> The right way is to add this capability to tor, and the hacky way is
> to construct a normal circuit, truncate the exit, then replace it.
The closest
On Sat, Apr 27, 2013 at 7:16 PM, Ulises Cuñé wrote:
> I want colaborate with Tor project.
>
> I send a document of analys source code about the lasted version
Well, looks like I'm spending my evening combing through this thing
looking for true-positives. If you find any that aren't
false-positiv
Hi Hareesan,
> : Exif.Photo.ImageUniqueID or Exif.Image.DateTime, etc ). If its a fixed
> location and if the man-in-middle know that location,and if he know Bob's
> public key (since its public), he could easily get to the message. If MIAB
Alice will use Bob's public key to encrypt the message,
In a consensus, the item after nickname is base64 encoded "hash of a
router's identity key"
If this item is base64 decoded, is it the same as the "identity
digest" of the router?
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproj
Hey there,
I have been working on the proposal for the browser extension. Here I got
some doubts. The following say how I expect the system could work according
to the MIAB implementation explained in 3.2 part in the research paper [1].
Alice who know Bob's public key. He encrypt the message using