-- Forwarded message --
From: gwen hastings
Date: Fri, Jan 10, 2014 at 9:54 AM
Subject: ECC curves that are safe safecurves.cr.yp.to
To: "cypherpu...@cpunks.org"
DJ Bernstein and Tanja Lange did a study on which ECC curves are safe to
implement and use, found at http://safecurve
On Thu, Dec 12, 2013 at 11:11 PM, Nicholas Hopper wrote:
> Your analysis looks correct to me. But what's wrong with using
> threshold crypto or secret sharing? Since you're already assuming
> some sort of bounded delay synchronization, I think we can eliminate
> any advantage in influencing the
I'm forwarding a private email by Florian Dold which is related to
this discussion. I talked with Florian during CCC and we talked some
more over email. Reposting with his permission.
Thanks!
From: Florian Dold
Date: Sat, 4 Jan 2014 20:45:15 +0100
To: George Kadianakis
>
> Hi!
>
> I'm afraid t
On 01/10/14 13:52, Karsten Loesing wrote:
> On 1/9/14 8:02 PM, Nufuk wrote:
>> Hi Karsten,
>>
>> this projects seems cool and I would like to participate in this
>> project. But I am new to the TOR environment (this was my new years
>> resolution after I heared the Applebaum Keynote from the 29C3,
On 01/09/14 22:07, Damian Johnson wrote:
>> Hello Karsten,
>>
>> It looks like a nice little project to work on. I reguarly check my
>> relay-status via Atlas, at the moment using the Onionoo service makes sense
>> to me too.
>>
>> For now the onionoo-glue-code, seems like a good place to start. D
On Thu, Jan 9, 2014 at 10:07 PM, Damian Johnson wrote:
> > Hello Karsten,
> >
> > It looks like a nice little project to work on. I reguarly check my
> > relay-status via Atlas, at the moment using the Onionoo service makes
> sense
> > to me too.
> >
> > For now the onionoo-glue-code, seems like a
Hello,
You can find at this URL a proposal to refactor the tor browser bundle
build process, using an other tool to replace gitian:
https://people.torproject.org/~boklm/automation/tor-automation-proposals.html#build-tool
(also added as attached file to this email)
I made a prototype to show how i
On 1/9/14 8:02 PM, Nufuk wrote:
> Hi Karsten,
>
> this projects seems cool and I would like to participate in this
> project. But I am new to the TOR environment (this was my new years
> resolution after I heared the Applebaum Keynote from the 29C3, so I am
> only 1 year late).
>
> Kind Regards
>
On Fri, 10 Jan 2014 00:19:32 +, Jim Rucker wrote:
> This is an attempt at security though obscurity,
I think you mean 'nondiscoverability through obscurity';
transport security would be in a different layer. What is
tunneled in an obscure way is still the regular tor
protocol which provide enc