Tom Ritter:
> It seems reasonable but my first question is the UI. Do you have a
> proposal? The password field UI works, in my opinion, because it
> shows up when the password field is focused on. Assuming one uses the
> mouse to click on it (and doesn't tab to it from the username) - they
> see
Hi all,
The Tor bad-relay team regularly detects malicious exit relays which are
actively manipulating Tor traffic. These attackers appear financial
motivated and have primarily been observed modifying Bitcoin and onion
address which are displayed on non-HTTPS web pages.
Increasingly these attack
Yawning Angel:
> On Mon, 14 Sep 2015 16:12:23 +
> Donncha O'Cearbhaill wrote:
>> I have been thinking about ideas to make Tor hidden services more
>> available and secure for non-Tor users. Inline I've included a draft
>> proposal which describes an end-to
Hello all,
I have been thinking about ideas to make Tor hidden services more available and
secure for non-Tor users. Inline I've included a draft proposal which describes
an end-to-end
encrypted Tor2Web-like system.
I'm really interested in hearing any suggestions, comments or criticism about
Hello all,
This is my seventh, and final biweekly status report for my hidden
service scaling / load-balancing SoP project.
Since my last status report:
* I have been revising my patch for #14846 with the aim of getting it
merged before the 0.2.7 feature freeze.
* I've been working with Ivan Ma
Hi all,
On 12/05/15 15:55, Nick Mathewson wrote:
>
> 1. Getting the introduction points to the management service
>
> * Synchonization, and push vs pull.
>
> I think we've started to get statistics on the average longevity of
> a busy introduction point. If the answer is "they change fairly
Hi Adrien,
Good job on writing up a draft for this proposal! It looks good!
On 07/03/15 21:33, Adrien Johnson wrote:
> Filename: xxx-rend-revoke.txt
> Title: Hidden Service Revocation
> Author: Adrien Johnson
> Created: 2015-03-04
> Status: Draft
>
> Hidden service operators need to be able to r