On 11/21/15, Tim Wilson-Brown - teor wrote:
>
>> On 20 Nov 2015, at 10:59, George Kadianakis wrote:
>>
>> David Goulet mailto:dgou...@ev0ke.net>> writes:
>>
>>> On 19 Nov (14:30:47), Jacob Appelbaum wrote:
>>>> Hi George,
>>>
Hi George,
On 11/12/15, George Kadianakis wrote:
> Hello there believers of prop250,
>
> you can find the latest version of the proposal in the upstream torpec
> repo:
>
> https://gitweb.torproject.org/torspec.git/tree/proposals/250-commit-reveal-consensus.txt
I reviewed your fine document and I
Dear Virgil,
On 9/30/15, Virgil Griffith wrote:
> Filename: ExtraRelayDescriptorFields.txt
> Title: Adding x-namespace to relay descriptor for key:value pairs
> Author: Virgil Griffith
> Created: 2015-09-30
> Status: Open
>
>
> 1. Motivation
> We wish to allow developers to build new applications
On 8/26/15, Ben Laurie wrote:
> On Mon, 24 Aug 2015 at 19:25 Paul Syverson
> wrote:
>
>> If another browser it could be a setup config option whether clients
>> can choose to be redirected via tor2web or simply always sent to a
>> route-insecure address. I will assume for simplicity that all requ
On 7/24/15, Yawning Angel wrote:
> On Fri, 24 Jul 2015 16:21:31 +
> Jacob Appelbaum wrote:
> [snip]
>> > At this point with all the resources available, I will guess that if
>> > the user needs something like tor-fw-helper, they probably have no
>&g
On 7/24/15, Yawning Angel wrote:
> On Thu, 23 Jul 2015 23:46:26 +
> Jacob Appelbaum wrote:
>
> [snip]
>> > Do users know that their router's implementation of NAT-PMP/uPnP is
>> > shit?
>>
>> Who knows better than the user? And who better tha
On 7/23/15, David Stainton wrote:
>> Why are we avoiding allowing users to make this choice because of the
>> above reasons? If a user wants to run a relay or a bridge, we should
>> make it easy. We don't answer the above questions when it is hard -
>> are we really off the hook there? It just see
On 7/23/15, Yawning Angel wrote:
> On Thu, 23 Jul 2015 19:18:34 +
> Jacob Appelbaum wrote:
>
>> Why are we avoiding allowing users to make this choice because of the
>> above reasons? If a user wants to run a relay or a bridge, we should
>> make it easy. We don
On 7/23/15, Yawning Angel wrote:
> On Thu, 23 Jul 2015 18:26:33 +
> Jacob Appelbaum wrote:
>
>> >> Also - does this mean that after many many years... that this new
>> >> version of tor-fw-helper be enabled by default at build time?
>> >> Pre
>> Also - does this mean that after many many years... that this new
>> version of tor-fw-helper be enabled by default at build time? Pretty
>> please? :-)
>
> Unlikely, AFAIK the general plan was to have it as a separate package.
>
That is really a major bummer if so - we should be shipping this
On 7/21/15, Nick Mathewson wrote:
> Yawning's mail below reminds me: I am considering removing the C
> implementation of tor-fw-helper from the tor distribution, and recommending
> Yawning's pure-Go implementation instead. But before I do this, I'd like
> to get some sense of whether folks are sh
On 4/17/15, Ian Goldberg wrote:
> On Fri, Apr 17, 2015 at 08:37:23PM +0200, Peter Palfrader wrote:
>> On Fri, 17 Apr 2015, Jacob Appelbaum wrote:
>>
>> > > I think this list would be created at release time and ship with the
>> > > tor binaries/source.
>&
On 4/17/15, Peter Palfrader wrote:
> On Fri, 17 Apr 2015, Jacob Appelbaum wrote:
>
>> On 4/17/15, Peter Palfrader wrote:
>> > so, Tor has included a feature to fetch the initial consensus from
>> > nodes
>> > other than the authorities for a while now.
Hi Peter,
On 4/17/15, Peter Palfrader wrote:
> Hi,
>
> so, Tor has included a feature to fetch the initial consensus from nodes
> other than the authorities for a while now. We just haven't shipped a
> list of alternate locations for clients to go to yet.
>
> Reasons why we might want to ship to
On 11/15/14, Griffin Boyce wrote:
> Fair. What are your thoughts about possible trade-offs with anonymity when
> using a CA-signed cert?
>
I have many. It won't impact client anonymity from where I stand and
it will ease usability for certain use cases.
All in all, I welcome the CA cartels signi
On 11/15/14, Griffin Boyce wrote:
> Lee wrote:
>>> c) Get .onion IANA reserved
>>
>> It doesn't look like that's going to happen.
>
>Yeah. Though the biggest use-case for cert+onion is when trying to
> match a clearnet service to a hidden service -- such as Facebook or
> Erowid.
>
That is fal
On 11/15/14, Lee wrote:
>> c) Get .onion IANA reserved
>
> It doesn't look like that's going to happen.
>
> https://datatracker.ietf.org/doc/draft-grothoff-iesg-special-use-p2p-names/
> is expired & I haven't been able to find anything indicating it's
> still being considered.
It's still somethin
> In the future "Next Generation Hidden Services" specification there
> are again two ways to do authorization:
> https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt#l1446
> One way is with a password and the other is with a public key.
A {shared secret,key} and a u
On 4/21/14, Fabio Pietrosanti (naif) wrote:
> Hi all,
>
> does anyone know of any work to make a Python Only Tor Client, that just
> enable to expose a Tor Hidden Service?
>
> It would be very cool if it would be possible to avoid "Tor binary" as a
> dependency for Globaleaks, making it pure Pytho
On 4/16/14, grarpamp wrote:
>> [1] http://www.netmundial.br/
>> [2]
>> http://content.netmundial.br/contribution/unesco-comprehensive-study-on-internet-related-issues-draft-concept-paper-proposed-by-the-secretariat-for-consultations/155/
>
I'll be there - I land in Brazil on Saturday and I'll be
On 3/27/14, Virgil Griffith wrote:
> I have two proposals to add to the torspec.git. They are:
>
> (1) http://dl.dropbox.com/u/3308162/230-quicken-tor2web-mode.txt
> (2) http://dl.dropbox.com/u/3308162/231-remittance-addresses.txt
>
>
Hi Virgil,
Upon first peek, I'd say that these proposals are
I think that torsocks shouldn't break your use of ssh - it closely
matches many other uses of ssh or similar programs.
All the best,
Jacob
On 3/4/14, Lunar wrote:
> David Goulet:
>> After a big code review from Nick and help from a lot of people
>> contributing and testing, this is the release c
I think this is a fine idea - if no one objects, I'll purge it.
On 2/23/14, Virgil Griffith wrote:
> Sitting with David Goulet, it's problematic that when I search for
> "torsocks" I get the old Google Code page instead of the up-to-date
> page on http://gitweb.torproject.org
>
> This is problema
SiNA Rabbani:
> Hi,
>
> I am trying to update myself on the status of Tor Router. I remember not
> too long ago it was a sexy project, funds were raised and people got paid
> to work on it. Has it been abandoned? How come we still don't have a Tor
> hardware router?
>
Hi SiNA,
There is a hardwa
hellekin:
> On 11/09/2013 03:36 PM, Jacob Appelbaum wrote:
>>
>> I've given it an edit pass - I've included the original, a unified diff
>> and my modified version.
>>
> *** Thank you!
>
> I will fix the formatting and a typo.
Thanks!
>
&
Christian Grothoff:
> Dear all,
>
> Together with Matthias Wachs and Hellekin Wolf, I'm preparing an IESG
> approval request
> for the reservation of special-use domain names for P2P networks
> according to RFC 6761.
> The goal is to reserve .onion, .exit, .i2p, .gnu and .zkey (so that they
> don'
Nick Mathewson:
> On Sat, Aug 3, 2013 at 9:29 PM, Jacob Appelbaum wrote:
>> Hi,
>>
>> Linus and I had an interesting discussion at IETF 87 this past week in
>> Berlin. We're both concerned about long term Directory Authority
>> identity keys as well consen
Hi,
Linus and I had an interesting discussion at IETF 87 this past week in
Berlin. We're both concerned about long term Directory Authority
identity keys as well consensus signing with RSA keys.
We've agreed that we're interested in writing a proposal whereby we add
additional identity keys for a
Cristian-Matei Toader:
> Hello tor-dev,
>
> Here goes the status report for the past 2 weeks
> - I have been preparing the code for the first step of the project to
> be merged in the Tor master branch, which represented a number of
> changes required by nickm; the full process can be seen here [1
Hello,
Cristian-Matei Toader:
> Hello tor-dev,
>
> As a small reminder the purpose of the project is to create
> capabilities based sandboxing for Tor, which may only allow the
> program to execute a number of predefined syscalls.
Is it really capabilities based? It seems that it best described
Cristian-Matei Toader:
> Hello,
>
> My name is Cristian Toader, and I feel very excited about designing and
> implementing a capabilities based sandbox for the central Tor project, as
> part of the GSOC program.
Welcome!
>
>
> About myself:
>
> I have been a Linux enthusiast for almost 6
Marti Raudsepp:
> Hi list,
>
> The attached patch implements support for systemd socket activation.
>
> For people who don't know what that is: systemd is an "init" system
> for Linux. Socket activation means that systemd binds all the sockets
> in advance, and only spawns Tor once somebody attem
Griffin Boyce:
> Hello all,
>
> So I'm part of a team working on wireless mesh, and Torouter has come up
> a few times this week. Is it actively being developed? Given the state of
> the roadmap [1], I'd sort of assumed it was inactive or on hiatus, but
> others had heard differently.
>
Yes,
>
> Maybe OONI ppl can help with that?
>
I have an idea that I think might help. It isn't related to any current
pluggable transport. I think we could pump out a transport that would
not be easy to block.
Contact me off list if you'd like to help me with it.
All the best,
Jacob
Tom Ritter:
> This weekend I tried building several of the tor projects on Windows
> (tor, vidalia, tbb, and vanilla firefox). I kept notes of my
> adventures, some of the quirks I ran into, and the final set of
> instructions that seemed to work for me.
>
Huh - as a funny coincidince last week
Micah Lee:
> On 02/18/2013 12:29 PM, Jacob Appelbaum wrote:
>>> I was assuming that making the launcher depend on a system Tor would be
>>> troublesome. However now that I'm looking at
>>> https://www.torproject.org/docs/debian again, it seems like it could
>
adrelanos:
> Micah Lee:
Well, which should your users be using? From my perspective, I think you
should give them the alpha and help them report bugs! :-)
>> Interesting idea. Anyone else have opinions on this? I think I'd be fine
>> giving people the alpha, but I also don't want to
Micah Lee:
> On 02/18/2013 12:15 AM, Jacob Appelbaum wrote:
>> Do you plan to download TBB over Tor that is provided by the system, say
>> by adding a dependency on a system Tor?
>
> I was assuming that making the launcher depend on a system Tor would be
> troubleso
adrelanos:
> Jacob Appelbaum:
>> Do you plan to download TBB over Tor that is provided by the system, say
>> by adding a dependency on a system Tor?
>
> There has been a bit discussion about this in
> https://trac.torproject.org/projects/tor/ticket/5236 already. (Se
Micah Lee:
> In my spare time I've been working on a way to make the Tor Browser
> Bundle easier to use for GNU/Linux users. I've mostly been talking about
> it with other people on tor-talk and in this bug:
> https://trac.torproject.org/projects/tor/ticket/5236
Thanks for documenting so much on t
Oscar Koeroo:
> Hi,
>
> I've created trac ticket[1] #8063.
>
> The torsocks script has an option "on" which did't work and in the current
> state I'm curious on which shell it did work :-)
>
> The patch is included and only affects the src/torsocks.in file with a
> oneliner. More details are inc
Oscar Koeroo:
> Hi,
>
> I've created trac ticket[1] #8063.
>
> The torsocks script has an option "on" which did't work and in the current
> state I'm curious on which shell it did work :-)
>
> The patch is included and only affects the src/torsocks.in file with a
> oneliner. More details are inc
intrigeri:
> Hi,
>
> Jacob Appelbaum wrote (27 Jan 2013 04:16:30 GMT) :
>> I think this also includes all of the pending Debian fixes
>
> I confirm.
>
Great, I think that means that we're ready to tag a torsocks release
unless someone shouts that we have a re
Ian Goldberg:
> On Sun, Jan 27, 2013 at 04:37:55PM +0000, Jacob Appelbaum wrote:
>> Hi Ian,
>>
>> This version of Torsocks is the initial bug clean up that will lead us
>> into fixing larger issues such as that one. We think this is a good idea
>> as a few of those
Ian Goldberg:
> On Sun, Jan 27, 2013 at 04:16:30AM +0000, Jacob Appelbaum wrote:
>> Hi,
>>
>> Nick and I have been working on a torsocks release. At this point, I
>> think we're at the point where we want to declare a release candidate
>> which if it has no bl
Hi,
Nick and I have been working on a torsocks release. At this point, I
think we're at the point where we want to declare a release candidate
which if it has no blockers, we'll likely call it a release. I think
we'll call it version 1.3 as that seems to have been the intended version.
Here is th
Damian Johnson:
>> Actually, both Tails and the Tor Browser Bundle could benefit from a
>> usability study.
>
> Usability studies only help if there's development resources to make
> the suggestions happen.
Tor Browser has had a study or two. It has been helpful even though we
have not yet had th
vimalathithan:
> Hi, I am new to this community.
>
>
>
> A group consists of 5 members from School of Informatics and
> Computing, working with Professor Jean Camp on a research paper.
>
> Our research is to carry out a case study after making changes in the
> UI of Tor Browser.
>
Hello and w
Matthew Finkel:
> On 11/02/2012 07:36 PM, Jacob Appelbaum wrote:
>> Nick Mathewson:
>>> On Fri, Nov 2, 2012 at 1:34 PM, adrelanos wrote:
>>>>
>>>>
>>>> Could you blog it please?
>>>
>>>
>>> I'd like to see mor
Isis:
> On Sat 13 Oct 2012 at 00:08, thus spake Jacob Appelbaum:
>> Isis:
>>> Hi Karsten!
>>>
>>> Oh sheesh. I did not see it...I will have to figure out why. That is
>>> slightly worrying.
>>>
>>> So, I am rushing to meet the fi
Isis:
> Hi Karsten!
>
> Oh sheesh. I did not see it...I will have to figure out why. That is
> slightly worrying.
>
> So, I am rushing to meet the final deadline, but I still think it is
> doable. I have mostly finished up my OONI work for the month, and I
> planned to spend the remainder of this
Eugen Leitl:
>>> 18:08 <@cjd> I trust them to make the software right, esp. since I could
>>> check if they did.
>>> 18:09 <@cjd> But a little arm twisting can change someone's motives pretty
>>> fast.
>>> 18:09 <+eleitl> Maintaining signing secrets is a problem.
>>> 18:09 <+eleitl> They should hav
fi...@robocracy.org:
>
> Hello tor-dev!
>
> I would like to contribute to the torouter (aka TorRouter, aka
> OnionBox?) project, with the intention of getting a "functional"
> development image for the DreamPlug hardware released in the next few
> weeks.
>
The best bet is to jump in with the tr
Damian Johnson:
>> I think the project will get more interest and attention from more
>> experienced (and busy) Tor developers once the "broken, does not turn on"
>> type problems are fixed; at that point a more formal design/review iteration
>> on specific device configurations and functionality c
adrelanos:
> Damian Johnson:
>>> I fear this thread goes unanswered and someone willing to contribute
>>> gets lost because of unresponsiveness.
>>>
>>> Does torproject have a problem to reach decisions?
>>
>> Agreed that we should be more responsive to potential volunteers.
>> However, be aware th
Roger Dingledine:
> On Sat, Sep 01, 2012 at 12:36:51AM +0200, Linus Nordberg wrote:
>> Just a thought. A few of the directory authorities, I think at least
>> three, as well as the bridge authority run packages/ports only, not
>> builds from source. We'd have to package our -da branch ourselves for
Nick Mathewson:
> Hi, all!
>
> Here's an idea I had for directory authorities and the 0.2.3 release series.
>
> "As you know Bob," Tor 0.2.3 will be stable very soon, and I'm hoping
> not to take any more patches for it except for important security
> issues. I want 0.2.4 to come out very early
Hi,
My latest tech report is now up. I think it would be a nice idea if we
could kick off a discussion about Tor, NAT devices and reachability.
Tor and NAT devices: increasing bridge & relay reachability or, enabling
the use of NAT-PMP and UPnP by default:
https://research.torproject.org/techrepo
??Phoenixing:
> Hi I live in a country which it block the tor net strictly! Only I can do
> is that I get the bridges from the website. I just want to get the bridges
> automaticly by writing a script. But now I must get the bridges hand by hand
> and one by one. It's more uncomfortable! Co
Aaron:
> On Sun, Jul 15, 2012 at 12:56 PM, Arturo Filastò wrote:
>> * No resume support (this can be implemented on top of HTTP, we could
>> even implement the rsyc algorithm
>> on top of HTTP).
>
> Are you sure HTTP doesn't support resume? What does wget -c do?
>
I believe this requires the HT
On 06/18/2012 11:26 PM, Nick Mathewson wrote:
> This list of open Tor proposals is based on one I sent out in May of
> last year. Since I'd like to do this more regularly, I have added to
> each description the date when I wrote it. Most of the summaries from
> older proposals are unchanged since
On 06/13/2012 08:57 AM, Linus Nordberg wrote:
> Hi,
>
> An hour ago I had a beautiful dreamplug laying next to me on my table,
> booting freedombox, making me happy.
>
> Now I have a beautiful dreamplug nicely mounted in a rack in a hall next
> to me, not booting at all, making me sad.
>
> --8<-
On 03/21/2012 06:28 PM, Mike Perry wrote:
> Thus spake Robert Ransom (rransom.8...@gmail.com):
>
>> [ snip ]
>
> I've updated the proposal to address your concerns at mikeperry/bridgefinder2.
When you and Robert finish hashing this out, please let me know and I'll
merge your final commits with t
On 03/20/2012 09:08 PM, Nick Mathewson wrote:
> On Tue, Mar 20, 2012 at 11:57 PM, Jacob Appelbaum wrote:
> [...]
>> Ah ha. That sounds like a nightmare. Is there a bug report we can pile
>> on to request that they don't create a headache for everyone in the future?
>
On 03/20/2012 06:23 PM, Mike Perry wrote:
> The following proposal should complete SponsorF tickets #5010-5012.
>
> I've pushed the proposal to my torspec.git branch
> mikeperry/bridgefinder, since the POSTMESSAGE Proposal ended up with
> some garbling at somewhere along the cut and paste chain. T
On 03/20/2012 08:33 AM, Nick Mathewson wrote:
> Filename: 198-restore-clienthello-semantics.txt
> Title: Restore semantics of TLS ClientHello
> Author: Nick Mathewson
> Created: 19-Mar-2012
> Status: Open
>
[ ... ]
> Currently, OpenSSL 1.0.0 (in its default configuration) supports every
> c
On 03/17/2012 02:52 AM, Fabio Pietrosanti (naif) wrote:
> Hi,
> thinking about Tor Hidden services, they are managed by using Hidden
> Services client keys.
>
> The Tor HS keys are "private keys" that may require to be protected
> because they represent also the "identity" of the Tor HS and if sto
On 02/29/2012 02:58 PM, Sai wrote:
> Reformatted again for your committing pleasure:
I've added this as proposal 194:
https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/194-mnemonic-urls.txt
Thanks!
All the best,
Jake
___
tor-dev mailing li
On 02/08/2012 11:47 PM, Ondrej Mikle wrote:
> On 02/08/2012 02:59 AM, Nick Mathewson wrote:
>> On Tue, Feb 7, 2012 at 7:33 PM, Ondrej Mikle wrote:
>>
>> I think if we want an extra field in the future, we want to put it
>> after the end of the response (that is, after total_len), rather than
>> ha
On 01/31/2012 03:29 PM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 6:20 PM, Jacob Appelbaum wrote:
>> On 01/31/2012 06:42 AM, Nick Mathewson wrote:
>>> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum
>>> wrote:
>>>>
>>>> I think
On 01/31/2012 06:42 AM, Nick Mathewson wrote:
> On Tue, Jan 31, 2012 at 1:08 AM, Jacob Appelbaum wrote:
>>
>> I think that seems OK. I think the first step is a proposal,
>
> Anybody volunteering for this, or should I throw it on my pile?
I think it might make sense for
On 01/30/2012 06:07 PM, Ondrej Mikle wrote:
> On 01/30/2012 11:18 AM, Jacob Appelbaum wrote:
>> On 01/30/2012 01:09 AM, Christian Grothoff wrote:
>>>
>>> In summary, I think begin_dns is a good idea, but I'm not sure you need
>>> to then talk TCP
On 01/30/2012 01:09 AM, Christian Grothoff wrote:
> On 01/30/2012 07:59 AM, Roger Dingledine wrote:
>> On Thu, Jan 19, 2012 at 05:13:19PM -0500, Nick Mathewson wrote:
>>> But I think the right design is probably something like allowing
>>> clients to request more DNS info via exit nodes' nameserver
On 01/09/2012 06:01 PM, Nick Mathewson wrote:
> On Mon, Jan 9, 2012 at 8:49 PM, Jacob Appelbaum wrote:
>>
>> Should I make such a branch and request it for review?
>
> I don't think this is a good idea for 0.2.3.x without data. Specifically:
>
>* What frac
On 01/09/2012 04:33 PM, Nick Mathewson wrote:
> On Thu, Jan 5, 2012 at 5:05 PM, Nick Mathewson wrote:
>> Hi, all!
>>
>> Previously, I had set the deadline for merging small features into
>> 0.2.3.x as Jan 6. Due to work that had piled up or suddenly appeared
>> in the new year, I wasn't able to g
On 12/21/2011 09:31 PM, David Fifield wrote:
> A few months ago, Roger wrote about ideas for getting more bridge
> addresses
> (https://blog.torproject.org/blog/strategies-getting-more-bridge-addresses).
> One of the ideas is to make lightweight bridges that can run in a web
> browser. I and some
t.
Here's the proposal in url form:
https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/ideas/xxx-onion-nyms.txt
Here's the proposal as text:
Filename: xxx-onion-nyms.txt
Title: .onion nym system
Author: Arturo Filastò, Jacob Appelbaum
Created: 17 December 2011
Status:
On 11/27/2011 09:23 PM, Nathan Freitas wrote:
> On 11/23/2011 02:57 AM, Fabio Pietrosanti (naif) wrote:
>> What's about making a "promotional" campaign like for the Tor Cloud to
>> have people running Tor Relay "right on their TV" ?
>
> Great hacking on the WDTV!
>
> I have been looking at gettin
On 11/08/2011 12:29 AM, warms0x wrote:
>> On 11/05/2011 06:26 PM, Arturo Filastò wrote:
>>> I have made a patch to check.torproject.org to expose a JSONP interface
>>> that would allow people to have the user check client side if (s)he is
>>> using Tor.
>>>
>>> This would allow people to embed a ba
On 11/05/2011 06:26 PM, Arturo Filastò wrote:
> I have made a patch to check.torproject.org to expose a JSONP interface
> that would allow people to have the user check client side if (s)he is
> using Tor.
>
> This would allow people to embed a badge on their website
> (privacybadge.html) that con
Hi,
I'll try to sum up Exit Enclaving in no certain terms and hope that Nick
or someone else will chime in to correct my assumptions. This should
probably be formalized and put into the path-spec at some point. I was
surprised to not see it in there to begin with but I probably just
missed it. Any
> On 06/11/2011 07:58 PM, Ian Goldberg wrote:
>> Yes, but the client (say, inside China) is perfectly capable of
>> artificially fragmenting its SYN packet. It shouldn't be too hard to
>> check what actually happens in this case? (At least, for the current
>> GFW configuration.)
>
> No it wouldn'
On Fri, Jun 10, 2011 at 6:27 PM, Robert Ransom wrote:
> On Fri, 10 Jun 2011 16:15:43 +
> Jacob Appelbaum wrote:
>
>> I think that we should probably setup a hidden service on each one and
>> ensure that we can remotely administrate them with the consent of the
>>
>
> I haven't converted my DreamPlug to Debian yet, but will try to do
> this over the weekend. I'll be sure to document the process as well.
>
Ok. This seems like a good starting point:
http://blog.davideaves.com/archives/2011/03/21/installing_debian_gnulinux_6_0_1_squeeze_on_the_dreamplug/
I lov
On Fri, Jun 10, 2011 at 4:14 PM, Runa A. Sandvik wrote:
> On Fri, Jun 10, 2011 at 4:54 PM, Runa A. Sandvik
> wrote:
> > On Fri, Jun 10, 2011 at 12:55 PM, wrote:
> >> On Mon, May 30, 2011 at 01:56:25PM +0100, runa.sand...@gmail.com wrote
> 2.9K bytes in 75 lines about:
> >> : The whole point wit
On Fri, Jun 10, 2011 at 3:54 PM, Runa A. Sandvik wrote:
> On Fri, Jun 10, 2011 at 12:55 PM, wrote:
> > On Mon, May 30, 2011 at 01:56:25PM +0100, runa.sand...@gmail.com wrote
> 2.9K bytes in 75 lines about:
> > : The whole point with the Torouter is to allow more people to run a
> > : bridge or a
On Thu, Jun 9, 2011 at 10:23 PM, Robert Ransom wrote:
> On Thu, 9 Jun 2011 21:34:17 +
> Jacob Appelbaum wrote:
>
> > On Thu, Jun 9, 2011 at 8:40 PM, grarpamp wrote:
> >
> > > Some thoughts from a quasi network operator...
> > >
> &g
On Thu, Jun 9, 2011 at 8:40 PM, grarpamp wrote:
> Some thoughts from a quasi network operator...
>
> Perhaps a tracking reason not to do this...
>
> Normally exit traffic is free to travel the globe across jurisdictions
> on its way to its final destination (ie: webserver). Doing this
> forces th
>
> > I think it's fine to ship one web interface for us now and later find a
> good
> > integration point with the Freedom Box later...
>
> Yep, I agree.
>
>
Great. I'm sure that if the web UI is free software and it works well, we
can see if the FB will be interested in using it.
> > What's the
On Thu, Jun 9, 2011 at 7:57 PM, Ian Goldberg wrote:
> On Thu, Jun 09, 2011 at 07:50:09PM +0000, Jacob Appelbaum wrote:
> > > Sounds like a plan. I prefer bridge by default, but we can discuss that
> > > later.
> > >
> > What's the rational there? While
On Thu, Jun 9, 2011 at 7:34 PM, Runa A. Sandvik wrote:
> On Thu, Jun 9, 2011 at 4:55 PM, Jacob Appelbaum
> wrote:
> > On Thu, Jun 9, 2011 at 2:57 PM, Runa A. Sandvik
> > wrote:
> >>
> >> On Wed, Jun 8, 2011 at 4:02 PM, Andrew Lewman
> >> wr
On Thu, Jun 9, 2011 at 2:57 PM, Runa A. Sandvik wrote:
> On Wed, Jun 8, 2011 at 4:02 PM, Andrew Lewman
> wrote:
> > On Tue, 7 Jun 2011 15:36:45 -0700
> > Jacob Appelbaum wrote:
> >
> >> > We would also need a way for users to easily change the hashed
> >
Hello from Iceland,
Linus invited me to Reykjavik to talk about Tor at the NORDUnet conference
and this idea is the result of a bit of feedback from some network operators
here.
Tor needs a way to be friendly to large network operators who wish to enable
exiting to anonymous communication for the
On Wed, Jun 8, 2011 at 8:02 AM, Andrew Lewman wrote:
> On Tue, 7 Jun 2011 15:36:45 -0700
> Jacob Appelbaum wrote:
>
> > > We would also need a way for users to easily change the hashed
> > > password. I can't remember if this is a feature that is already
> >
On Tue, Jun 7, 2011 at 2:55 PM, Runa Sandvik wrote:
> On 7 Jun 2011, at 22:00, Jacob Appelbaum wrote:
>
> > On 06/07/2011 01:28 PM, Andrew Lewman wrote:
> >> On Tue, 7 Jun 2011 21:08:48 +0100
> >> "Runa A. Sandvik" wrote:
> >>>> Vidali
On 06/07/2011 01:28 PM, Andrew Lewman wrote:
> On Tue, 7 Jun 2011 21:08:48 +0100
> "Runa A. Sandvik" wrote:
>>> Vidalia is not designed to control or configure a Tor process that
>>> it did not start.
>>
>> I have tested this, and it works just fine. The question is; are we
>> happy with something
On Mon, May 30, 2011 at 1:35 AM, Runa A. Sandvik wrote:
> On Mon, May 30, 2011 at 12:21 AM, Jacob Appelbaum
> wrote:
> > On Sat, May 28, 2011 at 11:52 PM, Runa A. Sandvik <
> runa.sand...@gmail.com>
> > wrote:
> >>
> >> Hi everyone,
> >>
On Sat, May 28, 2011 at 11:52 PM, Runa A. Sandvik wrote:
> Hi everyone,
>
> DreamPlug is a new plug computer from GlobalScale Technologies:
> http://www.globalscaletechnologies.com/c-5-dreamplugs.aspx. The spec
> looks good, it runs Ubuntu by default and it doesn't cost too much. I
> thought that
Hi Marsh,
Thanks for writing to or-dev, welcome to the list!
On 05/06/2011 04:13 PM, Marsh Ray wrote:
>
> Greetings all,
>
> I happened to download the tor-0.2.2.25-alpha.tar.gz source yesterday
> and I noticed something. Apologies in advance if this has already been
> discussed and resolved, I
On 04/24/2011 01:14 AM, Runa A. Sandvik wrote:
> On Sun, Apr 24, 2011 at 3:55 AM, Jacob Appelbaum wrote:
>> On 04/23/2011 04:32 PM, Erinn Clark wrote:
>>> * Jacob Appelbaum [2011:04:21 11:54 -0700]:
>>>> It's a question for what we as a project can handle
1 - 100 of 105 matches
Mail list logo