[tor-dev] Some Tor Devs could get higher pay as PR than as programmers

2017-08-24 Thread Ryan Carboni
Whenever I read something, with an open mind, but say, in a sandboxed environment (don't run your memes on root), I get impressed by arguments which convince me of things which are not true. Take for instance the following article: https://blog.torproject.org/blog/tor-security-advisory-relay-early

Re: [tor-dev] Doesn't hidden services break RFC 3986?

2017-08-14 Thread Ryan Carboni
Also: just because it's HTTP/S running over a different network stack, doesn't make it a new scheme. Just because your dinner arrives on a different plate doesn't mean the recipe has changed. :-) --- https://bugzilla.mozilla.org/show_bug.cgi?id=1228457 Tor is a strange sort of sacred cow highl

[tor-dev] Doesn't hidden services break RFC 3986?

2017-08-13 Thread Ryan Carboni
https://tools.ietf.org/html/rfc3986#section-3 By placing the scheme within the authority as a tld while using the same authority as the HTTP specification, this probably breaks RFC 3986 and maybe others. I might be a bit late in saying this. ___ tor-dev

Re: [tor-dev] Is it possible to leak huge load of data over onions?

2016-04-03 Thread Ryan Carboni
I've never seen anything download faster than ten megabits per second on Tor. Presumably the inverse is true if you have upload. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Advice regarding Cloudflare

2016-04-03 Thread Ryan Carboni
> > (as opposed to the people that seem to think that Exits > should actively combat abuse by having the capability for censorship). > > Well, a large number of exit nodes already have the capability for a man-in-the-middle attack. This capability could very well be a default option. b) In your m

[tor-dev] Advice regarding Cloudflare

2016-04-02 Thread Ryan Carboni
I could see why cloudflare is annoyed with you, you are annoying activists from their perspective, although you folks aren't chaining yourselves to coal power plants . But I also use Tor from time to time, so I'll offer some advice. On the Tor side, a way to minimize abuse is for exit nodes not to

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-04-02 Thread Ryan Carboni
I just want to note you only need an algorithm that protects against 2^80 quantum operations for short-term keys. Regardless, I doubt anyone is going to be spending a billion dollars to crack data sent over a single Tor connection. ___ tor-dev mailing li

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-03 Thread Ryan Carboni
Wasn't there a transition period in migrating from RSA to ECC? Maybe I'm just confused. Or you are confused. But I think it is best plan for a five or ten year transition period. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproj

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-03 Thread Ryan Carboni
> > We had a GSOC project to produce "consensus diffs", so that clients could > download the differences between each consensus each hour, rather than > downloading a full consensus (~1.5MB). > > It showed some great results, but still needs a little work before we merge > it.https://trac.torpro

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-02 Thread Ryan Carboni
And yet the NSA is moving to prime numbers. A large public key isn't a very good reason to not adopt quantum-safe crypto, it just means that it requires having the Tor project to be able to scale to a larger degree. I suggest hash tables, a percentage of which are pseudorandomly downloaded. Otherw

Re: [tor-dev] Quantum-safe Hybrid handshake for Tor

2016-01-01 Thread Ryan Carboni
The first step should be replacing the long-term keys with quantum-safe crypto. ___ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Re: [tor-dev] Scaling tor for a global population

2014-09-29 Thread Ryan Carboni
On Mon, Sep 29, 2014 at 4:36 PM, isis wrote: > Ryan Carboni transcribed 1.1K bytes: > > There's one issue if you remove all the small relays, only relays run by > > the NSA will be around. Not many people have access to multi-megabit > upload > > speeds. And thos

Re: [tor-dev] Scaling tor for a global population

2014-09-28 Thread Ryan Carboni
There's one issue if you remove all the small relays, only relays run by the NSA will be around. Not many people have access to multi-megabit upload speeds. And those that do might also be using bittorrent. ___ tor-dev mailing list tor-dev@lists.torprojec

Re: [tor-dev] Scaling tor for a global population

2014-09-27 Thread Ryan Carboni
> > But, because this is fraction rises with both D and U, these research > papers rightly point out that you can't keep adding relays *and* users > and expect Tor to scale. Broadcast a fraction of all available directories? Use md5 as a random number generator, hash the ECC/RSA keys using md5. A