[tor-dev] Damian's Status Report - February 2015

2015-03-02 Thread Damian Johnson
Why can't it always be winter? With murderous weather keeping you indoors life is so much more productive. Hidden Service Descriptor Support

Re: [tor-dev] bittorrent based pluggable transport

2015-03-02 Thread Dan Cristian Octavian
Hi Leeroy, If I understand correctly, you are arguing that my assumption that bittorrent is unlikely to be blocked is faulty. I don't have a strong argument against this, other than that it would be a very drastic move since for that part of the world bittorrent is the main way to get access to me

Re: [tor-dev] bittorrent based pluggable transport

2015-03-02 Thread Dan Cristian Octavian
Good point about joining the swarm. This is a part of the design that i'm not confident about, it's definitely questionable. Suppose a non-bitsmuggler peer joins the swarm. If he starts torrenting the file, he will get a correct copy (no checksum fails on the pieces) of it because all bitsmuggler

Re: [tor-dev] bittorrent based pluggable transport

2015-03-02 Thread l.m
Hi, I'm wondering about a particular case--let me explain. From your threat model you assume that the adversary has suspicions about encrypted traffic and may block them without strong justification. You also take as given that the adversary may be state-level. From the adversary objective this is

Re: [tor-dev] bittorrent based pluggable transport

2015-03-02 Thread David Fifield
Also interesting is that BitTorrent has its own family of obfuscation transports. I think they are designed to evade throttling by ISPs, which is a threat model similar to the censorship one. https://en.wikipedia.org/wiki/BitTorrent_protocol_encryption MSE (Message Stream Encryption) is a little

Re: [tor-dev] bittorrent based pluggable transport

2015-03-02 Thread David Fifield
On Sat, Feb 28, 2015 at 10:46:03AM -0800, Dan Cristian Octavian wrote: > My name is Dan, I've been working on a pluggable transport for Tor based on > bittorrent as cover traffic and wanted to let you know about it. > > https://github.com/danoctavian/bit-smuggler > > In a nutshell, I'm tunnelling

Re: [tor-dev] Proposal 242: Better performance and usability for the MyFamily option

2015-03-02 Thread l.m
Hi, If I understand the factors, as things stand currently, regarding family use with respect to the *security* of Tor. Pros 1 - Prevents information disclosure in case of using related relay too much (relay configuration or seizure of hardware). Cons 2 - It's not used by operators with maliciou

Re: [tor-dev] Porting Tor Browser to the BSDs

2015-03-02 Thread Dave Huseby
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I'm a Bitrig [0] user and have been slowly patching up gitian-builder so that it knows how to create build VM's other than ubuntu [1]. I haven't pushed all of my patches yet, but I have a version of gitian-builder where make-base-vm understands "--o

[tor-dev] Relays that change their fingerprints a lot

2015-03-02 Thread Philipp Winter
Inspired by Gareth's 31C3 talk [0], I taught sybilhunter [1] to calculate the amount of unique fingerprints a Tor relay used over time. Armed with that feature, I extracted the top 10 relay IP addresses that had the most fingerprints for every month since 2007 [2]. While most IP addresses show up

[tor-dev] Suggestions for Hidden Services Statistics Project

2015-03-02 Thread Gautham Nekkanti
Hi, I have already shared my project idea on a Simple analytics tool for Hidden service providers. I am looking for suggestions and input from users who have had experience in hosting hidden services. Obviously, there would all useful traffic related statistics. I'm looking for suggestions

[tor-dev] Tor Project proposal for GSoC 2015

2015-03-02 Thread Juro P. Doi
Hello, I would like to participate to the GSoC 2015 (my first one) and contribute to the Tor project. I am registered as timide on the OFTC IRC network. I am currently student in master of computer science, and working with LibFTE for a school project. Actually, fteproxy can be used as a Tor br