I understand that the original Tor model is to set low-latency and
low-jitter as a constraint as to permit things like interactive
web-browsing etc. And yes, I presume Tor will always have this as a
constraint.
I am asking if:
(1) There currently exists some way I can specify in my torrc to
sacri
On Tue, Jan 19, 2016 at 3:03 AM, Virgil Griffith wrote:
> I.e., if I want the extra resistance to traffic analysis that higher latency
> connections provide, is there a way to specify that in my Tor config?
Higher latency, in and of itself, does not provide any resistance to
traffic analysis.
ht
> On 20 Jan 2016, at 07:41, George Kadianakis wrote:
>
> - prop259: The original guardset should also include 80/443 bridges (shouldn't
> have disjoint utopic/dystopic guard sets). We should specify a behavior on
> how the fascist firewall heuristic should work.
I wish I was there, but it was
On Tue, Jan 19, 2016, at 03:33 PM, David Fifield wrote:
> On Tue, Jan 19, 2016 at 03:29:38PM -0500, Nathan Freitas wrote:
> >
> > On Tue, Jan 19, 2016, at 02:52 PM, David Fifield wrote:
> > > Does Orbot have a list of default built-in obfs4 bridges? Or do users
> > > fetch them dynamically? I lo
Paul and others: Here is the meetbot log from the meeting:
http://meetbot.debian.net/tor-dev/2016/tor-dev.2016-01-19-16.03.log.html
George and I also discussed RP and IP usage after the meeting as well. I
will be updating Prop#247 with that discussion. I'll send a link when
I'm done. I may also w
Thanks, registered this patch in #17984.
2016-01-18 19:43, Gisle Vanem wrote:
Seems these two OpenSSL functions:
ENGINE_get_default_ECDSA()
ENGINE_get_default_ECDH()
have been dropped; in util/libeay32.num:
...
ENGINE_get_default_ECDH 33871_1_0 NOEXIST::FUNCTION:
ENGINE_
Hi George,
Crap. I missed this buried at the bottom of Nick's general
announcement last Thursday about reviewing Tor Proposals (which was
in my big backlog of threads to get to, and I did not notice its specific
relevance to guards and onion services till I saw here).
When is the next one of thes
Today was the first Tor proposal reading group [0] and we discussed the
following guard proposals:
Prop#241: Resisting guard-turnover attacks [DRAFT]
Prop#259: New Guard Selection Behaviour [DRAFT]
Prop#247: Defending Against Guard Discovery Attacks using Vanguards
[DRAFT]
I
On Tue, Jan 19, 2016 at 03:29:38PM -0500, Nathan Freitas wrote:
>
> On Tue, Jan 19, 2016, at 02:52 PM, David Fifield wrote:
> > Does Orbot have a list of default built-in obfs4 bridges? Or do users
> > fetch them dynamically? I looked in the source code and found default
> > meek bridges but not d
On Tue, Jan 19, 2016, at 02:52 PM, David Fifield wrote:
> Does Orbot have a list of default built-in obfs4 bridges? Or do users
> fetch them dynamically? I looked in the source code and found default
> meek bridges but not default obfs4.
No we have no default Obfs4 bridges built-in. It has been o
David Fifield transcribed 0.5K bytes:
> Does Orbot have a list of default built-in obfs4 bridges? Or do users
> fetch them dynamically? I looked in the source code and found default
> meek bridges but not default obfs4.
>
> I'm asking because we recently added a few new high-capacity default
> obf
Does Orbot have a list of default built-in obfs4 bridges? Or do users
fetch them dynamically? I looked in the source code and found default
meek bridges but not default obfs4.
I'm asking because we recently added a few new high-capacity default
obfs4 bridges.
https://bugs.torproject.org/18
On 18 Jan (10:23:08), David Goulet wrote:
> On 16 Jan (16:21:30), John Brooks wrote:
> >
> > > On Jan 16, 2016, at 4:52 AM, George Kadianakis
> > > wrote:
> > >
> > > Yes, I think I agree with this evaluation for now. Seems prop246 is more
> > > complicated than we can handle, and we should pro
On Sun, Jan 17, 2016 at 8:39 PM, isis wrote:
> Nick Mathewson transcribed 2.8K bytes:
>> Here's the schedule I have in mind for the first meeting, based on
>> proposals already nominated at the IRC dev meeting.
>
> This idea and the schedule sound great to me. (Minus that the HS devs should
> be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 15/01/16 23:00, Rob Jansen wrote:
> Hello,
Hi Rob,
I'm moving this discussion from metrics-team@ to tor-dev@, because I
think it's relevant for little-t-tor devs who are not subscribed to
metrics-team@. Hope you don't mind.
> I was recently revi
I.e., if I want the extra resistance to traffic analysis that higher
latency connections provide, is there a way to specify that in my Tor
config?
-V
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/list
16 matches
Mail list logo