I agree as well and have discussed this use case with NRL colleagues for a
while now. Some thoughts that we have had:
1. “Encrypted service” is a terrible name because it sounds like its only
providing encryption and also is too generic. The idea needs a name that
communicates that it is diffe
On 26 November 2014 at 06:58, Florian Rüchel
wrote:
> Certificates for HS: I find this topic particularly interesting and have
> followed the discussion. The general concept seems like a great thing to
> achieve and it could actually outperform the regular SSL/CA infrastructure
> stuff as it could
On Wed, Nov 26, 2014 at 10:30:42AM +, Gareth Owen wrote:
> I wonder if it might be worth having a discussion on how to detect
> malicious and/or suspicious relays. To my knowledge, the project currently
> only scans for MITM and tries to detect larger Sybil attacks (but doesn't
> always act wh
Hi everyone,
I am attaching the conversation from the assistants list over.
Here is the TL;DR: I want to write my master's thesis on Tor,
preferrably on a topic that has to do with Hidden Services and/or
Cryptography in Tor.
I have followed George's recommendations and read through some of the
s
"A. Johnson" writes:
> Hi George,
>
>> I posted an initial draft of the proposal here:
>> https://lists.torproject.org/pipermail/tor-dev/2014-November/007863.html
>> Any feedback would be awesome.
>
> OK, I’ll have a chance to look at this in the next few days.
>
>> Specifically, I would be inter
Hi all
I wonder if it might be worth having a discussion on how to detect
malicious and/or suspicious relays. To my knowledge, the project currently
only scans for MITM and tries to detect larger Sybil attacks (but doesn't
always act when detected).
We have a lot of knowledge now about types of