Also, (shameless plug) you get all of this basically for free if you just do
generalised EdDSA with Ristretto, [1] since the cofactor is elliminated.
I've been working with Trevor on this, it's called D.A.V.R.O.S. and it'll
be done… (as) soon (
oject.org/projects/tor/ticket/25479
[1]:
https://msdn.microsoft.com/en-us/library/windows/desktop/ms683472(v=vs.85).aspx)
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E20
teor transcribed 0.7K bytes:
> I'm sorry, I didn't get Isis' original email, I think my spam folder ate it.
>
> Can you please re-send?
Of course! I actually didn't get a copy either; not sure what happened there.
- Forwarded message from isis agora lovecruf
tbot.debian.net/tor-meeting/2018/tor-meeting.2018-02-20-23.11.html
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.
EFF)
2. Directory document keywords MUST be printable ASCII.
3. This change may break some descriptor/consensus/document parsers.
If you are the maintainer of a parser, you may want to start
thinking about this now.
[0]:
http://meetbot.debian.net/tor-meeting/2018/tor-meeting.2018-02-12
gitweb.torproject.org/torspec.git/tree/proposals/282-remove-named-from-consensus.txt
¹ Please note that even if your name is not {isis,teor,nickm} that you are
warmly welcome to attend and participate.
Best regards,
--
♥Ⓐ isis agora lovecruft
pec.git/tree/proposals/267-tor-consensus-transparency.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
roject.org/torspec.git/tree/proposals/239-consensus-hash-chaining.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
D
This one is in #tor-meeting, next Monday, 12 February from 21:00-22:00 UTC.
In local times:
* Monday, 12 February 13:00-14:00 PST
* Monday, 12 February 16:00-17:00 EST
* Monday, 12 February 22:00-23:00 CET
* Tuesday, 13 February 08:00-09:00 AEST
isis agora lovecruft transcribed 2.3K bytes
Reminder to please vote for a time for this if you'd still like to attend!
isis agora lovecruft transcribed 2.2K bytes:
> Hello,
>
> Let's schedule a proposal discussion for prop#285 "Directory documents
> should be standardized as UTF-8" [0] sometime between 12 -
This is happening in #tor-meeting on Thursday, 8 February, 21:00-22:00 UTC.
In various local times:
* Thursday, 8 February, 13:00-14:00 PST
* Thursday, 8 February, 16:00-17:00 EST
* Thursday, 8 February, 22:00-23:00 CET
* Friday, 9 February, 08:00-09:00 AEST
isis agora lovecruft transcribed
ests or concerns, or if I
forgot to take your timezone into account, please let me know.
https://doodle.com/poll/cnc6scybbfpky5f8
[0]: https://gitweb.torproject.org/torspec.git/tree/proposals/285-utf-8.txt
Best regards,
--
♥Ⓐ isis agora lovecruft
___
if I forgot to take your timezone
into account, please let me know.
https://doodle.com/poll/iahmzu95hpvxciex
[0]:
https://gitweb.torproject.org/torspec.git/tree/proposals/239-consensus-hash-chaining.txt
--
♥Ⓐ isis agora lovecruft
___
isis agora lovecruft transcribed 2.9K bytes:
> Hello all,
>
> Is there an existing Tor proposal you'd like to discuss? Please use
> the following pad to nominate and vote for proposals for discussion.
>
> https://pad.riseup.net/p/Pxo2fQiiaSWo
>
> We'll b
o share! Thanks!
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
___
ting.2017-12-13-22.03.html
[3]: https://pad.riseup.net/p/r.1c4c37baa9251fdfca5a1e1bd5c01f45
[4]:
https://gitweb.torproject.org/torspec.git/tree/proposals/249-large-create-cells.txt?id=5fe54569
Best regards,
--
♥Ⓐ isis agora lovecruft
_
isis agora lovecruft transcribed 5.3K bytes:
> Hello all,
>
> What: A proposal discussion meeting for prop#249 "Allow CREATE cells with
> >505 bytes of handshake data". [0]
Hey,
Meetbot notes are available. [0] Nick and Tim took summary notes of
discussion items
- Wednesday, 13 December 00:00-01:00 CET
- Thursday, 14 December 09:00-10:00 AUST
teor transcribed 6.8K bytes:
>
> > On 9 Dec 2017, at 11:29, isis agora lovecruft wrote:
> >
> > Hello all,
> >
> > What: A proposal discussion meeting for prop#249 "All
er errors if a new (unexpected) field is
> added, or assumptions are made about the text encoding or formatting
> of the document.
A specification for the documents that BWAuths produce would be an extremely
welcome contribution! but probably shouldn't be prerequis
for the meeting preparation.
Thanks!
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Di
462+(7*492)=3906 bytes.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital signature
___
(I would worry that removing `u` on platforms which don't have `D`
enabled by default could break our reproducible builds.)
Please feel free to open a ticket if you're so inclined.
Best regards,
--
♥Ⓐ isis agora lovecruft
_
list on-topic and productive.
> How did Freud invent psychoanalysis? What are you doing during the idle
> cycles of your brain? One does not need a fancy degree to be an amateur at
> anything, or do you folks not call yourselves hackers?
I'd say &q
since he's writing a Rust
parser for bridge descriptors as part of the Bridge Bandwidth Scanner
project) if I got anything wrong. :)
- Forwarded message from isis agora lovecruft -
> From: isis agora lovecruft
> Subject: Re: Bridge Bandwidth Scanner Internship
> Date: Thu,
ve25519-dalek/blob/f2883028d/src/curve.rs#L235
[6]:
https://github.com/isislovecruft/curve25519-dalek/blob/f2883028d/src/curve.rs#L270
[7]:
https://gitweb.torproject.org/tor.git/tree/src/ext/ed25519/donna/ed25519_tor.c?id=2032b9b1#n324
[8]:
https://gitweb.torproject.org/tor.git/tree/src/ext/ed25519/ref10/ke
Damian Johnson transcribed 2.0K bytes:
> On Thu, Jun 15, 2017 at 2:07 PM, teor wrote:
> >
> >> On 16 Jun 2017, at 03:49, isis agora lovecruft wrote:
> >>
> >> Hello all!
> >>
> >> I have made a brief post on our blog to announce an
Hello all!
I have made a brief post on our blog to announce an exciting intership
opportunity we have available!
https://blog.torproject.org/blog/summer-2017-internship-create-bridge-bandwidth-scanner
Best,
--
♥Ⓐ isis agora lovecruft
w method is not subject to
the same patent claims as NewHope theoretically is.
¹ I am not a lawyer. (Fortunately.)
Best,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.pattern
some things to change in minor ways during further refinement and
implementation. That said, we welcome all feedback and appreciate review.
[0]: https://patternsinthevoid.net/hyphae/hyphae.pdf
Best regards,
--
♥Ⓐ isis agora lovecruft
_
Op
Nick Mathewson transcribed 2.9K bytes:
> On Fri, Mar 31, 2017 at 10:20 PM, isis agora lovecruft
> wrote:
> > Hey hey,
> >
> > In summary of the breakaway group we had last Saturday on post-quantum
> > cryptography in Tor, there were a few potentially good ideas I wro
oup, and I apologise, but I
don't actually remember all the attendants off the top of my head. If either
of these were your idea, please message me off-list and I'll ensure you're
credited in the eventual proposal(s)/documentation.
Be
last summer until there was funding
for it) work on integrating standard NewHope is here:
https://gitweb.torproject.org/user/isis/tor.git/log/?h=feature/rebelalliance
Best,
--
♥Ⓐ isis agora lovecruft
_
OpenPG
ns for other
> distributions.
>
> Feedback requested if this will negatively affect you!
For whatever it's worth, all of Tor's infrastructure runs on Debian stable,
and I'm not sure if weasel would make exceptions to enable backports.
Best,
--
♥Ⓐ isis agora lovecruft
_
ority, and BridgeDB
chucks out the bridges without the Running flag (i.e. they don't get added to
the hashring). [0]
[0]:
https://gitweb.torproject.org/user/isis/bridgedb.git/tree/bridgedb/Bridges.py?id=78e352ec18bc55bbb519747a1b1d9e909e3640d7#n453
Best regards,
--
♥Ⓐ isis agora lovec
> <http://blog.atagar.com/stem-release-1-5/>!
Awesome! Now I don't need to tell pip to build from git. :)
Thanks, Damian!
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: ht
"ServerTransportPlugin snowflake" on Whonix Gateways
by default? And then "ClientTransportPluging snowflake" on workstations
behind the gateway?
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5
rotect against potential
pineapple slicers by putting your data through a pineapple slicer twice.)
Best regards,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patterns
ors are uploaded, etc.
Again, improving the control port notification interface is much welcome, and
patches are straightforward to review for timely inclusion.
Best regards,
--
♥Ⓐ isis agora lovecruft
__
isis agora lovecruft transcribed 8.6K bytes:
> For the repeated suggestion of SIDH, [3] I expect we'll soon see concrete
> details and improvements to the attacks mentioned in (and which they establish
> "direct validation" measures to defend against in §9 of) &qu
point. I've made a ticket for the issue in
BridgeDB. https://trac.torproject.org/projects/tor/ticket/19997
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthev
ues (and some of which are not bugs).
Thanks for pointing this out!
[0]: https://gitweb.torproject.org/tordnsel.git/
[1]: https://gitweb.torproject.org/check.git/
[2]: https://trac.torproject.org/projects/tor/ticket/19843
Best regards,
--
♥Ⓐ isis agora lovecruft
call to the DH-KEM key
> exchange) should be specified in #269.
Thanks for pointing this out! The SHAKE-256() call should actually be added
to #269, since it's acting as a replacement for the HKDF at the end of the
original ntor handshake, and it should be p
aper, and a lot to digest and verify. It should
> be noted that the authors have a strong track record of cryptanalysis of
> lattice crypto.
[0]:
https://gitweb.torproject.org/torspec.git/tree/proposals/proposal-status.txt
[1]: https://eprint.iacr.org/2015/287
[2]: https://lists.torproject
ch DirAuth would have their own
tree, thus the consensus document in the end would have somewhere between
5 and 9 CoSi signatures.
4. There's a typo in §5.2: s/witnesse's/witnesses'/
Thanks, everyone, for the great discussion!
Best regards,
--
♥Ⓐ is
g/projects/tor/attachment/ticket/19468/prop259-redux-v3.txt#L414
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signature.asc
Description: Digital
attend, but not before,
since I will be on a flight. If it works out better for everyone else to have
it at 14:00 instead, then that's also fine with me and please just let me know
afterwards what I can do to help.
Best regards,
--
♥Ⓐ isi
bably find somewhere to put that documentation
that is not some random python org site.)
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://fyb.patternsinthevoid.net/isis.txt
signa
since it's an alliance between
X25519 and NewHope. The proposal has been updated to reflect this.
[0]: https://boringssl-review.googlesource.com/#/c/7962/
Best,
--
♥Ⓐ isis agora lovecruft
_
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3A
tein, D.J., Buchmann, J., Dahmen, E. (Eds.),
Post-Quantum Cryptography (pp. 134-136). Berlin: Springer Verlag.
https://www.springer.com/us/book/9783540887010
[4]: http://link.springer.com/content/pdf/10.1007%2FBFb0052237.pdf
Best Regards,
--
♥Ⓐ isis agora lovecruft
_
s/BoSRL0uHIjM
[4]:
https://collector.torproject.org/recent/relay-descriptors/microdescs/micro/2016-05-16-14-05-37-micro
[5]:
https://metrics.torproject.org/dirbytes.html?start=2016-02-16&end=2016-05-16
[6]: As an aside, I'd be super happy to kick the crap relays out of the network:
Nicolas Vigier transcribed 6.8K bytes:
> Hi Matthew and Isis,
>
> On Sun, 22 Dec 2013, isis agora lovecruft wrote:
>
> > > > > If proper packaging is helpful for Jenkins, however, I can easily do
> > > > > so.
> > > >
> > > >
Matthew Finkel transcribed 8.6K bytes:
> On Thu, Dec 19, 2013 at 02:52:03AM +0100, Nicolas Vigier wrote:
> > On Tue, 17 Dec 2013, isis agora lovecruft wrote:
> >
> > > Nicolas Vigier transcribed 1.4K bytes:
>
> Hi Nicolas!
>
> Thanks again for following up o
ac.torproject.org/projects/tor/ticket/9872
[3]:
https://gitweb.torproject.org/user/isis/bridgedb.git/tree/refs/heads/develop:/lib/bridgedb/test
[4]: https://trac.torproject.org/projects/tor/ticket/9873
[5]: http://tox.readthedocs.org/en/latest/
[6]: http://alexgaynor.net/2010/dec/17/gett
r suggestions?
Any weekday, either around 1900 UTC or around 0400 UTC. (Just not in the
middle of my workday.)
I can do mumble, or OTR/IRC, or OTR/XMPP. You should have my OTR keys already.
Do we get updates on how other people are faring, and/or what they're up to?
- --
♥Ⓐ isis agora l
-dist-design:/doc/proposals/XXX-bridgedb-database-improvements.txt
and
https://gitweb.torproject.org/bridgedb.git/blob/refs/heads/feature/7520-social-dist-design:/doc/proposals/XXX-bridgedb-social-distribution.txt
--
♥Ⓐ isis agora lovecruft
gt; >More importantly, how will they be able to ensure that it's
> >not a tampered version?
>
>
> I've thought about that and few things came to mind:
> - Include the executable inside TBB.
> - Host it somewhere and also provide a SHA-256 hash on a website or in
56 matches
Mail list logo