mechanism that lets you sign a
self-signed tls certificate with your Onion Service's hs_ed25519_secret_key and
Tor Browser trusting the tls certificate based on this signature. Would this
approach work? Would it be worth the effort? Look forward to hearing your
thoughts :)
Cordially,
Nathaniel
Firefox Nightly let’s you manually enable it. I’d wait until at least
Firefox and Chromium add support to avoid setting off red flags for a
censor. Having collateral damage is important with pluggable transports 😑
Cordially,
Nathaniel
On Mon, Oct 29, 2018 at 10:25 AM Nicolas Vigier
wrote:
> On
ch relay a
unique subdomain and rotate these every few weeks. This may be expensive to
implement but could make blocking Tor traffic with this method harder.
Thoughts?
Cordially,
Nathaniel Suchy
___
tor-dev mailing list
tor-dev@lists.torproject.org
https:
Hi everyone,
Cloudflare has added support to TLS 1.3 for encrypted server name
indication (SNI). This mailing list post is a high level overview of how
meek could take advantage of this in relation to Cloudflare who until just
now wasn’t an option for domain fronting.
What this means:
Effectively
I get a 404 when clicking your GitHub link.
On Tue, Sep 4, 2018 at 10:52 AM John Helmsen
wrote:
> These are the PDF versions of the Marionette Documents for easier
> reading. The markdown versions of them can be found on the github
> distribution at https://github.com/redjack/marionette/doc
>
>
,
Nathaniel Suchy
On Wed, Aug 29, 2018 at 4:32 AM Georg Koppen wrote:
> teor:
> > Hi,
> >
> > Is anyone still using these trac components?
>
> [snip]
>
> > Obfuscation/FTE
>
> Let's leave that one right now. We still ship FTE on some platforms in
> T
Perhaps the developers could make something like Tor Tails but stripped
down bare bones to converse system resources with just Tor Browser
afterwards packaging it all into a nice Virtual Machine program that’s
invisible to the user.
On Thu, Jul 26, 2018 at 2:24 AM u wrote:
> Hi!
>
> Yawning Angel
I'm going to state my support for it here. I'm not a developer however I
agree all exits should provide DNS from a local resolver (Unbound or
similar) to get the exit flag.
On Wed, Jul 11, 2018 at 12:38 PM nusenu wrote:
> I'd like to see 'working DNS' as a requirement for the exit flag.
>
> If t