Re: [tor-dev] Next-Gen Hidden Services

2014-12-13 Thread Nick Mathewson
On Sat, Dec 13, 2014 at 5:47 PM, Thomas White wrote: > Do we currently have any ETAs/timelines/estimates when the next > generation of hidden services would be released? There isn't much > information that I could find in my search so I can only imagine it will > be at least a year? I really, tru

[tor-dev] Next-Gen Hidden Services

2014-12-13 Thread Thomas White
Do we currently have any ETAs/timelines/estimates when the next generation of hidden services would be released? There isn't much information that I could find in my search so I can only imagine it will be at least a year? -T -- Activist, anarchist and a bit of a dreamer. Current Fingerprint: E

Re: [tor-dev] Internet-wide scanning for bridges

2014-12-13 Thread A. Johnson
There are even better solutions than this: 1. Port knocking: 2. Single-packet authorization: ScrambleSuit has implemented something like #2, and its paper (http://www.cs.kau.se/phil

Re: [tor-dev] Internet-wide scanning for bridges

2014-12-13 Thread Fabio Pietrosanti (naif) - lists
On 12/13/14 1:33 AM, Vlad Tsyrklevich wrote: > > > I've attached a patch to warn bridge operators running with ORPort set > to 443 or 9001 as a stop-gap measure. IMHO the real point is that Tor, is not employing the techniques that used since decades by the COMSEC solutions in the radio-frequency