Re: [tor-dev] Censorship Simulator Virtual Machine GSoC

2013-06-07 Thread Johannes Fürmann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi *, hi Arturo, Thank you for the introduction. My name is Johannes and I will be working on a vagrant-based solution for internet censorship simulation. With vagrant being a powerful but easy-to-use tool, I expect to make some progress really soon.

[tor-dev] Creating a p2p identity authentication protocol

2013-06-07 Thread DataPacRat
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 As suggested by Tor Project's helpdesk, I'm forwarding this message to tor-dev, in hopes that I might be able to evoke any useful references, suggestions or commentary. - -- Forwarded message -- From: Matt Pagan via RT Date: Fri, Jun

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-07 Thread grarpamp
>> >> This has the side effect of promoting good onion upkeep. >> >> Which people might be loathe to do given the recent paper >> about deanon hidden services seeming to be relatively doable. >> At least until those issues are solved... >> >> > of the system. After 6 months (or so) the naming will

Re: [tor-dev] [tor-talk] Client simulation

2013-06-07 Thread Norman Danner
On 6/7/13 2:37 AM, Karsten Loesing wrote: (Sorry for cross-posting, but I think this is a topic for tor-dev@, not tor-talk@. If you agree, please reply on tor-dev@ only. tor-talk@ people can follow the thread here: OK, following up on tor-dev. I thought tor-dev might be the more appropria

[tor-dev] Reduce RTT for preemptively built circuits (GSoC)

2013-06-07 Thread ra
Hello everyone! During this year's Google Summer of Code I[0] will be working on reducing the Round-Trip-Time (RTT) for preemptively built circuits.[1] My mentors are Mike and Aaron. A brief summary of the project: RTTs of circuits can be measured by violating the exit policy of the exit node

Re: [tor-dev] Memorable onion addresses (was Discussion on the crypto migration plan of the identity keys of Hidden Services)

2013-06-07 Thread Matthew Finkel
On Fri, Jun 07, 2013 at 02:23:55AM -0400, grarpamp wrote: > >> This has the side effect of promoting good onion upkeep. > > Which people might be loathe to do given the recent paper > about deanon hidden services seeming to be relatively doable. > At least until those issues are solved... > > > o

Re: [tor-dev] Discussion on the crypto migration plan of the identity keys of Hidden Services

2013-06-07 Thread Tom Ritter
On Jun 6, 2013 9:56 AM, "Matthew Finkel" wrote: > I suppose the followup question to this is "is there really a need for > backwards compatability n years in the future?" I completely understand > the usefulness of this feature but I'm unsure if maintaining this > ability is really necessary. The