> Please do it in your bananaphone branch if that's more convenient to
> you.
>
> (If you want to be more adventurous, you can even make a new branch on
> top of the current upstream master with your setup() function and the
> obfs2 changes. I will merge that faster than the bananaphone changes.)
David Stainton writes:
>> Looks fine!
>>
>> BTW, does it work for you? Did you try the server-side using the
>> ServerTransportOptions torrc option (tor >= 0.2.5.1-alpha)?
>
> I have only tested it using the external mode.
>
> I've gotten obfsproxy + bananaphone to run with tor in managed mode;
>
Kang writes:
>> AFAIK, this should also be possible with the current state of HS
>> descriptor publishing.
>>
>
> It should be possible, yes, but it's not a serious problem due to the
> decentralised nature of hidden service descriptor publishing.
> On the other hand I'm under the impression that
> AFAIK, this should also be possible with the current state of HS
> descriptor publishing.
>
It should be possible, yes, but it's not a serious problem due to the
decentralised nature of hidden service descriptor publishing.
On the other hand I'm under the impression that there's only a few
direc
I thought this might be of interest to the Tor community.
--Wendy
- Forwarded message from Stephane Bortzmeyer -
Date: Mon, 11 Nov 2013 13:10:27 +0100
From: Stephane Bortzmeyer
To: Stephen Farrell
Cc: perpass , Andy Wilson
Subject: Re: [perpass] DNS confidentiality
User-Agent: Mutt/
> Looks fine!
>
> BTW, does it work for you? Did you try the server-side using the
> ServerTransportOptions torrc option (tor >= 0.2.5.1-alpha)?
I have only tested it using the external mode.
I've gotten obfsproxy + bananaphone to run with tor in managed mode;
using the ServerTransportOptions...
On 11/09/2013 06:20 PM, and...@torproject.is wrote:
They weren't copied from an EFF presentation, they were
made by the EFF for us. You can find the originals inside
https://media.torproject.org/image/official-images/tor_design_archive.zip
I've added them to the site image directory for now.
A
On Mon, Nov 11, 2013 at 02:42:24PM +, Ximin Luo wrote:
> Whilst we're on that topic, labelling the final link from the exit node
>to the destination as "unencrypted" is unnecessarily scary as well Perhaps
>we could reword it to "encrypted if destination service is encrypted"
>and the other link
On 11/11/2013 05:36 AM, Greg Troxel wrote:
It seems Apple's terms are incompatible with copyleft, and that isn't
likely to change. Is there any copylefted code in TBB? I would
expect so, but I haven't enumerated it. People who choose copyleft
for their code do so for a reason, and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/11/13 14:10, Lunar wrote:
> Justin Findlay:
>> Item h under
>>
>> https://www.torproject.org/getinvolved/volunteer.html.en#OtherCoding
>>
>> discusses (at least) the images at this page,
>>
>> https://www.torproject.org/about/overview.html.en
>
Justin Findlay:
> Item h under
>
> https://www.torproject.org/getinvolved/volunteer.html.en#OtherCoding
>
> discusses (at least) the images at this page,
>
> https://www.torproject.org/about/overview.html.en
>
> which look as if they're copied from some EFF presentation. I've
> recreated them
Kang writes:
> Here are my thoughts regarding why merging the Hidden Service
> directory system and regular directory system is a bad idea.
>
Thanks for your thoughts.
I'm also unsure on whether ditching the hash ring system is a good
idea, but here are some comments on your thoughts:
> It wou
Griffin Boyce writes:
> Here are the issues as I see them:
> - Apple has traditionally been at odds with GPL-licensed stuff [3],
> though of late it seems to have relaxed a bit with dual-licensed
> material [2].
> - If the TBB is added to the app store by Tor, it requires review of
> and agre
13 matches
Mail list logo