-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello list,
This is an announcement/reminder that there will be *NO* IRC meeting
of the Measurement Team tomorrow, but on
Thursday, October 22, 2015, 14:00 UTC in #tor-dev
https://www.timeanddate.com/worldclock/fixedtime.html?iso=20151022T14
The
On 07 Oct (11:56:32), David Goulet wrote:
> Hello tor-dev!
>
> While 028 bug triaging, we realized that we *really* need priorities to
> not be a banana field deprive of useful meaning. If you are unaware or
> don't remember, the priority field in a trac ticket can be:
>
> blocker critical ma
Hello,
I am not sure if this has been discussed before or how hard it would be to
implement, but I'm looking for a way to integrate a smartcard with Tor -
essentially, I want to be able to host hidden service keys on the card. I'm
trying to bind the hidden service to a hardware component (the smar
On Tue, Oct 13, 2015 at 8:05 AM, Mike Perry wrote:
> Nick Mathewson:
[...]
>> (How fast is it?
>>
>> To encrypt a 509-byte relay cell with a 16 byte nonce and 32 bytes
>> of additional data, AEZ only uses 360 aes rounds. This is the same
>> number of aes rounds as we'd need t
Nick Mathewson:
> [This is a draft proposal; I'm not giving it a number yet. I'm hoping
> it'll receive some good advice.]
>
> Filename: xxx-aez-relay.txt
> Title: AEZ for relay cryptography
> Author: Nick Mathewson
> Created: 13 Oct 2015
> Status: Draft
>
> 1. Summary and preliminaries
>
>
[This is a draft proposal; I'm not giving it a number yet. I'm hoping
it'll receive some good advice.]
Filename: xxx-aez-relay.txt
Title: AEZ for relay cryptography
Author: Nick Mathewson
Created: 13 Oct 2015
Status: Draft
1. Summary and preliminaries
This proposal describes an improved algo