Hi Nick,
On 25 Feb 2014, at 17:18, Nick Mathewson wrote:
> To mirror the way that authority identity keys work, we'll fully
> support keeping Ed25519 identity keys offline; they'll be used to
> sign long-ish term signing keys, which in turn will do all of the
> heavy lifting. A signing k
Hello everyone,
This is the sixth and last status report of my Google Summer of Code
project, which is to implement consensus diffs for Tor.
Two weeks ago I had two main tasks left for the project to get to a
minimal functioning state. The first was to figure out a clean way to
cache old consensu
Yawning
Thanks very much - you've saved me another few days down the wrong path!
It seems I was taking the onion-key not the signing key. Would never have
caught that this far down the rabbit hole without your response!
Now to work out why Tor is detecting a different identity to the SSL cert
I
On Sun, 17 Aug 2014 16:19:56 +0100
Gareth Owen wrote:
> I'm trying to generate the fingerprint given just the pubilc key in
> Java and after almost a whole day I'm about to give up. Does anyone
> have a sample PKCS#1 encoded public key that is used immediately
> before SHA-1 to generate the fing
ter...@safe-mail.net:
> I said decentralized VOIP because no central servers would be managing
> the communications. Any Tor node could possibly be a VOIP server.
Tor is a transport network. Relays only transport data, they do not
offer services other than what's needed for Tor clients to work.
-
Hi all
I wonder if someone might be able to help me with the above. I understand,
that to generate the digest, the PK must be encoded in PKCS#1 format. And
further to this, the public keys in the router descriptors are NOT in
PKCS#1 format, but plain ASN.1.
I'm trying to generate the fingerprin
Matthew Finkel writes:
> On Tue, Aug 12, 2014 at 02:05:49PM +0300, George Kadianakis wrote:
>> One missing piece of rend-spec-ng.txt [0] is a section on how HSes
>> should pick their Introduction Points (IPs). There are three main
>> questions here:
>> - How many IPs should an HS have?
>> - Which
Working on the build server again tonight, so fingers crossed! Thanks, Amogh.
On August 17, 2014 9:23:59 AM EDT, Amogh Pradeep wrote:
>-BEGIN PGP SIGNED MESSAGE-
>Hash: SHA1
>
>Status Report 6
>August 17th, 2014.
>
>So the past couple of weeks have been a little more hectic than usual,
>b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Status Report 6
August 17th, 2014.
So the past couple of weeks have been a little more hectic than usual,
but these are the things that I got to work on:
1) Continuing work on fixing leak:
On the Mozilla side, I had a long discussion with snorp and r
I looked at Ostel. Can Ostel be routed over Tor or is there another way to get
anonymity using Ostel?
I said decentralized VOIP because no central servers would be managing the
communications. Any Tor node could possibly be a VOIP server. The network data
would have to be continually distribute
The following tickets were largely achieved (last is in process of
debugging)
- adding config file (see branch
https://github.com/TheTorProject/stegotorus/tree/f--modus-operandi)
- adding elligator handshake (
https://github.com/TheTorProject/stegotorus/tree/f--circuit-handshake) [0]
- moving rema
11 matches
Mail list logo