>> in Prio, servers use a generic secure multi-party computation (MPC) protocol
>> to compute the circuits. If Tor is going to do that, why not just run a
>> generic MPC protocol over all of the inputs? Doing so would allow Tor
>> statistics aggregations to be robust to inputs that are likely “i
Hi Aaron,
> On 15 Dec 2017, at 01:54, Aaron Johnson wrote:
>
> in Prio, servers use a generic secure multi-party computation (MPC) protocol
> to compute the circuits. If Tor is going to do that, why not just run a
> generic MPC protocol over all of the inputs? Doing so would allow Tor
> stati
On 15 Dec (04:31:45), teor wrote:
> On 15 Dec 2017, at 04:04, David Goulet wrote:
>
> >> On 15 Dec (03:47:25), teor wrote:
> >>
> On 15 Dec 2017, at 03:29, David Goulet wrote:
> >>>
> >>> The place I'm thinking of is the EXTEND in IPv6 and relay self-testing in
> >>> IPv6. This seems a mo
On 15 Dec 2017, at 04:04, David Goulet wrote:
>> On 15 Dec (03:47:25), teor wrote:
>>
On 15 Dec 2017, at 03:29, David Goulet wrote:
>>>
>>> The place I'm thinking of is the EXTEND in IPv6 and relay self-testing in
>>> IPv6. This seems a more critical point to build into the network before
Hi isis,
> On 14 Dec 2017, at 12:46, isis agora lovecruft wrote:
>
> 6.1. New Subprotocols and Subprotocol Versions
>
> This proposal introduces, following prop#264, the following new
> subprotocol numbers and their uses.
>
> 6.1.1. Relay Subprotocol
>
> "Relay 3" -- The OP supports a
On 15 Dec (03:47:25), teor wrote:
>
> > On 15 Dec 2017, at 03:29, David Goulet wrote:
> >
> > The place I'm thinking of is the EXTEND in IPv6 and relay self-testing in
> > IPv6. This seems a more critical point to build into the network before we
> > can
> > start building HS support on top (si
> On 15 Dec 2017, at 03:29, David Goulet wrote:
>
> The place I'm thinking of is the EXTEND in IPv6 and relay self-testing in
> IPv6. This seems a more critical point to build into the network before we can
> start building HS support on top (single onion is different but will have to
> do with
On 12 Dec (09:54:43), teor wrote:
> Hi David (and others interested in IPv6),
>
> We want to add better IPv6 support to Tor relays, clients, and v3 onion
> services.
>
> But if we do IPv6 v3 onion services first, the hop before intro and rend
> points
> will know that the circuit is a v3 onion
Hi Tim,
Prio allows a client to prove an arbitrary statement about a secret-shared
input (expressed as as a circuit on that input) to a set of servers. This could
provide some robustness against malicious inputs. However, it is not as much
protection as we might really need because the circuit
George Kadianakis:
> As discussed in this mailing list and in IRC, I'm posting a subsequent
> version of this proposal. Basic improvements:
> - Uses a new custom HTTP header, instead of Alt-Svc or Location.
> - Does not do auto-redirect; it instead suggests the onion based on
> antonella's mockup
10 matches
Mail list logo