Re: [tor-dev] Building a privacy-preserving "contact tracing" app

2020-04-24 Thread carlo von lynX
On Fri, Apr 24, 2020 at 11:11:12AM +0200, Jeff Burdges wrote: > Ignoring the nasty political realities, there are cute mixnet tricks for > contact tracing apps: Sounds like a neat approach, Jeff. -- E-mail is public! Talk to me in private using encryption: // http://loupsycedyglgamf.onio

[tor-dev] git-commit-private: preserve the privacy of your working times

2017-01-31 Thread carlo von lynX
On Tue, Jan 31, 2017 at 04:53:20AM -0500, grarpamp wrote: > [ ! "$var" ] Thank you. That was one of the constructs why I never took bourne shell seriously.. ;) but this looks a lot more acceptable. In the spirit of sharing, here's one more privacy-oriented git script: #!/bin/sh # # working habi

[tor-dev] git-update: transparently torified git pulls

2017-01-30 Thread carlo von lynX
Hi, here it is. Style may be crude as I usually write perl. #!/bin/sh # # A variant of git pull which operates over Tor and # - figures out when 'torify' needs to be used # - shows the changes that were made to the repository # - before attempting to merge # --lynX & heldensaga, 2017

[tor-dev] Adaptive CircuitStreamTimeout

2016-11-16 Thread carlo von lynX
Hola! Documentation says if I do not set a CircuitStreamTimeout manually, then some internal logic will come to play. I presumed the timeout measurement protocol would influence that value, so performance of circuits would adapt to the radically different network conditions... but then I thought

[tor-dev] remoTor 1.2 - parses tor log to catch exfiltrations

2016-06-24 Thread carlo von lynX
=== remoTor is a whole lot smarter than last time now. === When remoTor is running on the same machine as tor, it can now also monitor the hostnames the tor process is building circuits for. You may want to do this if you have devices in your house that you don't trust, for example. The regular To

[tor-dev] remotor - control console that can also notify into a chatroom

2016-06-12 Thread carlo von lynX
Hi there. Here's a fine new little console-based perl script that lets you control your Tor, monitor circuits as they happen, issue commands like changing your identity etc, and forward critical events to a chatroom using the PSYC protocol. I found vidalia too heavy and arm too confusing and didn'

Re: [tor-dev] TUF Repository for Tor Browser

2016-06-10 Thread carlo von lynX
On Fri, Jun 10, 2016 at 04:22:04PM +0200, ban...@openmailbox.org wrote: > In light of the technical obstacles that prevent packaging Tor > Browser (see below), I propose operating a repository that relies on > The Update Framework (TUF) [0]. TUF is a secure updater system > designed to resist many

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-28 Thread carlo von lynX
Thanks "Angel", appreciate your effort. On Thu, Feb 26, 2015 at 09:29:05AM +0100, Andreas Krey wrote: > On Wed, 25 Feb 2015 13:51:59 +0000, carlo von lynX wrote: > ... > > What is useful here is if I can use existing $app with existing > > tor router and just have

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-25 Thread carlo von lynX
On Wed, Feb 25, 2015 at 07:41:01AM +0100, Andreas Krey wrote: > The AF_TOR listener would go away with closing the listener socket > as well (and thus is bound to the lifetime of the process); so binding > a hidden service to the control connection is the obvious analogy. Yes, but as it stands AF_

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-24 Thread carlo von lynX
> > Concerning the "ephemerality" of it, I can imagine services > > being configured en passant by a cat >> socket from a shell > > script or so, [..] > On Tue, Feb 24, 2015 at 09:05:38PM +0400, meejah wrote: > You still need to authenticate. I do like the simplicity, but it will be > a little mo

Re: [tor-dev] RFC: Ephemeral Hidden Services via the Control Port

2015-02-17 Thread carlo von lynX
Let me chime in on saying that this looks to me like a great development. I even imagine that in a couple of years most end-to-end encrypted services on the Internet may be using this interface, so for the sake of accessibility for future devs, I would suggest something totally superficial: On Sa

Re: [tor-dev] Named pipes with tor

2014-04-16 Thread carlo von lynX
On Tue, Apr 15, 2014 at 02:28:17PM -0400, Nick Mathewson wrote: > On Tue, Apr 15, 2014 at 2:27 PM, Nick Mathewson wrote: > > On Mon, Apr 14, 2014 at 5:32 AM, carlo von lynX > > wrote: > > [...] > >> So the question is, would it be okay to catch ESPIPE in > >

[tor-dev] Named pipes with tor

2014-04-15 Thread carlo von lynX
Hiya. Been around the tor dev community a bit, but today is my first day on the legendary tor-dev mailing list. I am asking if it makes sense to apply a minor patch to Tor source, but first, the use case: tor is very adamant at scrubbing the addresses that are being connected to in the logs, but I