On 10/17/2015 12:27 PM, Ivan Markin wrote:
> Ken Keys:
>> If the tor process is going to use the key, at some point the
>> unencrypted key has to be visible to the machine running it. You would
>> in any case have to trust the machine hosting the tor node. A more
>> s
>
> Razvan
>
> --
> Razvan Dragomirescu
> Chief Technology Officer
> Cayenne Graphics SRL
>
>
> On Sat, Oct 17, 2015 at 9:36 PM, Ken Keys <mailto:kenk...@comcast.net>> wrote:
>
> What is the advantage of a smart card over a standard encrypted
>
What is the advantage of a smart card over a standard encrypted thumb drive?
On 10/17/2015 11:19 AM, Razvan Dragomirescu wrote:
> Thank you Ivan, I've taken a look but as far as I understand your
> project only signs the HiddenService descriptors from an OpenPGP card.
> It still requires each back
On 3/26/2015 9:01 PM, Mike Perry wrote:
> In Tor Browser 4.5a5, we decided to increase MaxCircuitDirtiness to 2
> hours (https://trac.torproject.org/projects/tor/ticket/13766).
>
> Because we also use Tor's SOCKS username isolation using the URL bar
> domain as the SOCKS username in Tor Browser 4.5
On 3/10/2015 9:20 PM, iratemonkey wrote:
> I only have time to reply back to your reply on part 3 tonight, but it
> is not a 'bug', this seems to be done on purpose.
>
>
>
> > 3) Why is the little orion icon missing in TOR 4.0.4 bundle for
> Windows? Now
> > Tor bundle looks exactly the same as reg
On 7/26/2014 1:54 AM, Matthew Finkel wrote:
> We also do try to discard fake requests, isis actually added another
> yesterday!
Could you elaborate on this? I don't understand what you mean my fake
requests but the incident sounds interesting.
___
tor-dev
On 7/23/2014 10:57 AM, Matt Pagan wrote:
>
>>> COMMANDs: (combine COMMANDs to specify multiple options simultaneously)
>>> get bridgesRequest vanilla bridges.
>>> get transport [TYPE] Request a Pluggable Transport by TYPE.
>>> get help Displays this message.
>>>
On 7/20/2014 7:34 AM, Tomas Bortoli wrote:
> Hi all, I want to develop a program that connects to a hidden server
> through tor. This is my problem: how can i establish a connection to
> the server from the client? I read the hidden service protocol, but i
> need a usable implementation of it. So i
On 5/15/2014 2:10 PM, mich...@schloh.com wrote:
> Hello Ken,
>
> On Thurs., May 15, 2014, Ken Keys wrote:
>> >On 5/15/2014 9:38 AM, mich...@schloh.com wrote:
>>> >> If anybody's feeling particularly friendly, then it would be nice of
>>> >> yo
process is bad form. It tends to leave the source code
cluttered with a great deal of non-functioning code. While it is
worthwhile to preserve the history, that is what source code control
systems are for.
Regards
Ken Keys
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
10 matches
Mail list logo