Happy to help! I'm a big fan of gitlab-ci since it is a collection of
standard tools like Docker, YAML, bash, etc. It takes a bit more to
learn than Travis-CI, but it pays off by being more flexible and a
simpler setup. E.g. it is easy to start with a plain, base Debian
image, only install the r
I know gitlab.com has been working on IPv6 support everywhere, I'm not
sure if they are at 100% yet. Have you tried there? That would give CI
runs on GNU/Linux.
Also, https://eclips.is supports IPv6 in Amsterdam, so if Tor has
credits there, then running a gitlab-runner there would be relativel
I was at the 5th Reproducible Builds Summit this past week, representing
mostly Android topics. I attended the first two, so it was nice to see
that there has been some real progress in the past few years of work.
My main focus was working with an Apache/Maven developer on implementing
the "build
teor:
> Hi,
>
>> On 12 Sep 2019, at 20:50, Hans-Christoph Steiner
>> wrote:
>>
>> Then that work
>> will hopefully be extended into sharing tor between apps, e.g. letting
>> Briar, Tor Browser, etc share the tor SOCKS proxy to other apps that
>&g
Georg Koppen:
> Hans-Christoph Steiner:
>>
>> Hey all,
>>
>> I'm currently working on tor for Android as part of a Guardian Project
>> project. One key goal is making a shareable, reproducible build process
>> for the tor daemon for Android. Then this
Hey all,
I'm currently working on tor for Android as part of a Guardian Project
project. One key goal is making a shareable, reproducible build process
for the tor daemon for Android. Then this would be published to
MavenCentral as an Android AAR package to be used in all the apps that
include
I was an early proponent of crypto currencies, but now it is clear to me
that they do more harm than good by a long shot.
And this is really off topic for this list.
.hc
grarpamp:
> (from tor-dev: PoW DoS defenses Prop 305: INTRO Cell)
>
> On 6/16/19, Chelsea Holland Komlo wrote:
>> Given the
David Fifield:
> On Wed, Jan 23, 2019 at 11:41:42AM +, Yawning Angel wrote:
>>> For example, could the obfs4 server side provide a generic SOCKS proxy?
>>
>> There is no functionality for doing such a thing in mainline obfs4proxy.
>>
>> What currently will work is any one of:
>>
>> * Stick a p
Hey all,
Hopefully this is a valid place to ask about PTs technical details. So
n8fr8, uniqx (Michael Pöhn), and I are working to make an easily
reproducible obfs4 client and server setup with ansible scripts
uniqx got the setup working with obfs4 connecting to a port on the
server side, like a
The Guardian Project "PLUTO" project is our name for the work we're
doing around Pluggable Transports. If you want to follow this work more
closely, you can ask n8fr8 to add you to our semi-private PLUTO mailing
list.
n8fr8 is currently working on integrating PTs into Android apps in a
reusable
Nathan of Guardian:
> On Mon, Sep 24, 2018 at 08:23:58PM -0600, David Fifield wrote:
>> What we would need in order for meek to used encrypted SNI would be
>> either:
>> 1) support for encrypted SNI in Go's crypto/tls package; or
>> 2) support for encrypted SNI in the Firefox that ships with Tor
Nick Mathewson:
> On Mon, Nov 5, 2018 at 12:38 PM Michael Rogers
> wrote:
>>
>> Hi all,
>>
>> It's great to see that some children of #25500 have already been
>> released in the 0.3.4 series. Can I ask about the longer-term plan for
>> this work, and whether #23289 (or something similar) is part
Hans-Christoph Steiner:
>
>
> Nick Mathewson:
>> On Wed, Aug 10, 2016 at 5:01 AM, Hans-Christoph Steiner
>> wrote:
>>>
>>> FYI I registered https://gitlab.com/torproject to claim the name in the
>>> gitlab namespace. I'm happy to hand it o
Georg Koppen:
> Tom Ritter:
>> The info I gave you was for Tor Browser, the the latter (about session
>> ID) is actually wrong. TBB disables both.
>>
>> https://trac.torproject.org/projects/tor/ticket/20447#ticket
>> https://gitweb.torproject.org/tor-browser.git/tree/security/manager/ssl/nsNSSComp
Hey all,
Since tor devs have thought about how to handle TLS Session Tickets and
Identifiers, I want to capture that approach and stick it into our
NetCipher library, which is also used in Orfox. As I understand it, the
approach is:
* disable TLS Session Tickets entirely
* reset TLS Session Ide
FYI I registered https://gitlab.com/torproject to claim the name in the
gitlab namespace. I'm happy to hand it over to a more official Tor
person if anyone wants. Or just let me know if anyone ever wants to
actually use it.
I've been using gitlab for a while now with F-Droid, and its quite nice
meejah:
> carlo von lynX writes:
>
>> The README sounds good, but it being implemented in python adds quite
>> a heavy additional dependency.
>
> My understanding is that TUF is two things: a spec, and a reference
> implementation (in Python). I'm sure other implementations would be
> welcome
17 matches
Mail list logo