Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-11-26 Thread A. Johnson
I agree as well and have discussed this use case with NRL colleagues for a while now. Some thoughts that we have had: 1. “Encrypted service” is a terrible name because it sounds like its only providing encryption and also is too generic. The idea needs a name that communicates that it is diffe

Re: [tor-dev] [tor-assistants] Researching Tor for Master's Thesis

2014-11-26 Thread Tom Ritter
On 26 November 2014 at 06:58, Florian Rüchel wrote: > Certificates for HS: I find this topic particularly interesting and have > followed the discussion. The general concept seems like a great thing to > achieve and it could actually outperform the regular SSL/CA infrastructure > stuff as it could

Re: [tor-dev] Malicious relays and honeypots

2014-11-26 Thread Philipp Winter
On Wed, Nov 26, 2014 at 10:30:42AM +, Gareth Owen wrote: > I wonder if it might be worth having a discussion on how to detect > malicious and/or suspicious relays. To my knowledge, the project currently > only scans for MITM and tries to detect larger Sybil attacks (but doesn't > always act wh

Re: [tor-dev] [tor-assistants] Researching Tor for Master's Thesis

2014-11-26 Thread Florian Rüchel
Hi everyone, I am attaching the conversation from the assistants list over. Here is the TL;DR: I want to write my master's thesis on Tor, preferrably on a topic that has to do with Hidden Services and/or Cryptography in Tor. I have followed George's recommendations and read through some of the s

Re: [tor-dev] Feedback on obfuscating hidden-service statistics

2014-11-26 Thread George Kadianakis
"A. Johnson" writes: > Hi George, > >> I posted an initial draft of the proposal here: >> https://lists.torproject.org/pipermail/tor-dev/2014-November/007863.html >> Any feedback would be awesome. > > OK, I’ll have a chance to look at this in the next few days. > >> Specifically, I would be inter

[tor-dev] Malicious relays and honeypots

2014-11-26 Thread Gareth Owen
Hi all I wonder if it might be worth having a discussion on how to detect malicious and/or suspicious relays. To my knowledge, the project currently only scans for MITM and tries to detect larger Sybil attacks (but doesn't always act when detected). We have a lot of knowledge now about types of