On Fri, Apr 08, 2016 at 05:28:45PM -0700, George Tankersley wrote:
> > I'm looking for ideas of good ways to handle TLS certificates and their
> > renewal for meek bridges. I want to use Let's Encrypt for this process,
> > and I hope that someone who knows Let's Encrypt well can contribute some
> >
> On 9 Apr 2016, at 04:21, Nicholas R. Parker (RIT Student)
> wrote:
>
> Hi all,
>
> I've got an issue that I'm seeking help with. I'm with a small group out of
> RIT that's trying to construct a private TOR network for research purposes,
> but we've hit a bit of a snag.
>
> I've worked wit
> I'm looking for ideas of good ways to handle TLS certificates and their
> renewal for meek bridges. I want to use Let's Encrypt for this process,
> and I hope that someone who knows Let's Encrypt well can contribute some
> ideas.
> ideally not requiring new complicated code in meek-server itself
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 08/04/16 12:57, iwakeh wrote:
> Hi there!
Hi iwakeh,
> With the first nice spring days in some parts of the Northern
> Hemisphere the CollecTor Improvement Project started.
>
> You probably know that CollecTor [0] is the friendly
> data-collectin
Hi all,
I've got an issue that I'm seeking help with. I'm with a small group out of
RIT that's trying to construct a private TOR network for research purposes,
but we've hit a bit of a snag.
I've worked with both liu fengyun's (
http://liufengyun.chaos-lab.com/prog/2015/01/09/private-tor-network.
For whatever it's worth I never found the compile-time option for tor2web
mode to be offensive.
I remember Roger's original rebuttal against tor2web mode was, "Virgil, I'm
not going to make a 'Make Tor Go Faster Button' to be pressed by people who
don't know what they are doing."
I always thought
Tim Wilson-Brown - teor writes:
> [ text/plain ]
> Hi All,
>
> I'm working on proposal 260's Rendezvous Single Onion Services in #17178.
>
> They are faster, because they have one hop between the service and the
> introduction and rendezvous points.
> But this means that their location is easy t
While I don't understand why researchers are doing free labor for Google
its still an interesting read on the innards of reCAPTCHAs and its
weaknesses. Some tests were done with Tor:
http://www.cs.columbia.edu/~polakis/papers/sivakorn_eurosp16.pdf
___
>
> - Directory guards are 85% of total current guard bandwidth.
> - Guards with ORPorts on 80/443 are 42% of total current guard bandwidth.
> - Guards on IPv6 are 20% of total current guard bandwidth.
> - Guards both on 80/443 and on IPv6 are 8% of total current guard
> bandwidth
Ola Bini writes:
> [ text/plain ]
> Hey,
>
>> > - OrPort vs DirPort
>> > ORPort is used for regular circuits, while DirPort is used when getting
>> > directory information. We need to interpret reachable stuff
>> > differently depending on the purpose.
>> >
>>
>> I'm not actually sure what the c
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi there!
With the first nice spring days in some parts of the Northern Hemisphere
the CollecTor Improvement Project started.
You probably know that CollecTor [0] is the friendly data-collecting
service in the Tor network. It fetches data from var
11 matches
Mail list logo