Re: [tor-dev] Future Onion Addresses and Human Factors

2015-08-10 Thread Alec Muffett
> On Aug 10, 2015, at 2:00 PM, Philipp Winter wrote: > > Vanity addresses encourage people to only verify the human-readable part > of an address before clicking on it. That creates a false sense of > security, which is already exploited by spoofed onion service addresses > whose prefix and suf

Re: [tor-dev] Future Onion Addresses and Human Factors

2015-08-10 Thread Philipp Winter
On Mon, Aug 10, 2015 at 08:47:05AM +0100, bernard wrote: > > On 9 Aug 2015, at 23:43, Philipp Winter wrote: > > > > Vanity onion addresses, for example, might have done more harm than good > > Why do you say that? What harm would human readable .onion addresses > do? And to who? Vanity addresse

[tor-dev] [important] sponsors deliverables discussion point for Wed's meeting

2015-08-10 Thread Isabela
Hello Core Tor folks! Note: if you are not a contractor or full time you can ignore this email, it is about paid deliverables. Me and Nick have been working on documenting the current status of our deliverables for the year to Sponsor S [project year ends on October] and Sponsor U [project year e

Re: [tor-dev] tor's definition of 'median'

2015-08-10 Thread Nick Mathewson
On Mon, Aug 10, 2015 at 1:11 PM, nusenu wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Hi, > > https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n2028 > >> If 3 or more authorities provide a Measured= keyword for a router, >> the authorities produce a consensus containing

[tor-dev] tor's definition of 'median'

2015-08-10 Thread nusenu
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt#n2028 > If 3 or more authorities provide a Measured= keyword for a router, > the authorities produce a consensus containing a "w" Bandwidth= > keyword equal to the median of the Measur

Re: [tor-dev] First release of OnioNS for beta testing

2015-08-10 Thread Jesse V
Thanks Dr. Fu, I look forward to your comments. From the server log, apparently so far no one has tested the client, though someone has set up a server. I just want to highlight that I have servers up and running so the client and the HS functionality should work out of the box. For the client,

Re: [tor-dev] Tor's default behavior for ed25519 identities

2015-08-10 Thread Nick Mathewson
On Thu, Aug 6, 2015 at 6:26 PM, s7r wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > I am also sending the steps I imagine Tor should take when started as > a relay. Apologies if I am missing something obvious. > > They are expressed as simple as possible, Tor's interpretation is way

Re: [tor-dev] Draft Proposal: Random Number Generation During Tor Voting

2015-08-10 Thread George Kadianakis
teor writes: >> On 4 Aug 2015, at 22:00 , George Kadianakis wrote: >> >> Hello, >> >> >> 3.7. Shared Randomness Disaster Recovery [SRDISASTER] If the consensus at 12:00UTC fails to be created, then there will be no new shared random value for the day. Directory

Re: [tor-dev] Future Onion Addresses and Human Factors

2015-08-10 Thread bernard
> On 9 Aug 2015, at 23:43, Philipp Winter wrote: > > Vanity onion addresses, for example, might have done more harm than good Why do you say that? What harm would human readable .onion addresses do? And to who? > As a result, maybe we should make it intentionally > *harder* to manage raw oni