Hey again, just to be clear:
I am not an official developer, but decided to give my thoughts anyway.
If you require advanced security, look into the Vanguards project and it's
detections for "abnormal" traffic / cells - it is mostly designed for hidden
service operators, however clients can use
Hey,
Thanks for sharing your idea.
That said, there are a few big issues with your proposal:
1.) Centralization of trust: Giving a fixed group of “original volunteers”
special relay status adds centralized points of trust and failure. Tor has
always aimed to avoid that — no single group should
Hi,
I noticed the following when checking journalctl logs from Tor:
> Nov 13 19:51:10 matrix tor[615]: Nov 13 19:51:10.000 [warn]
> tor_bug_occurred_(): Bug: src/core/or/relay.c:2354:
> connection_edge_package_raw_inbuf: Non-fatal assertion
> !(conn->base_.marked_for_close) failed. (on Tor 0.
t, but that's not for c-tor/arti to do (and ECH needs proper DNS
> support over Tor, which could be considered a child item of UDP over Tor, or
> something we can already do with DNS over tcp/tls/https, or something
> orthogonal where a client could query directly the DNS of an ex
- What are people's thoughts on this?
To be honest, I don't really care about UDP support.
Adding UDP support also would presumably add a lot of torrent load to the
network, and yes I know that torrent clients can fall back to TCP and this is
already an issue.
Regarding TLS, it's still some
We want people to be knowledgeable, and these "do it one time and forget about
it" websites are not helping.
I personally believe, that if you want to host a Tor node:
1. You MUST have read the manual, at least the entries explaining the settings
in your Tor configuration file. Please take a
Cancel what exactly?
You can unsubscribe from the list by logging in to the account that you have
created.
Sincerely,
George
On Wednesday, August 21st, 2024 at 2:38 PM, tj wrote:
> Sent from my iPhone
> ___
> tor-dev mailing list
> tor-dev@lists.tor