Re: [tor-dev] Comments on proposal 279 (Name API)

2017-04-07 Thread str4d
on", "special-use", "sutld", or "alt-tld" on their ML viewer [0] and reading the (extensive) back-history of these discussions. See below for a link to my earlier comments on this tor-dev thread [1], as well as several IETF drafts you may wish to read and comment on

Re: [tor-dev] Comments on proposal 279 (Name API)

2017-04-04 Thread str4d
.alt first, and didn't have FOOnet installed, should they try *.foo in the DNS? The browser either needs to know the full contents of *.alt (which is not possibly because by design it will have no official registration), or every registered TLD in DNS (which won't ever be added

Re: [tor-dev] Onioncat and Prop224

2016-08-08 Thread str4d
reatly increasing the number of bridging nodes. This is more of a concern for I2P than Tor, as I2P-only peers can only reach the bridging nodes, whereas Tor-only peers can connect to clearnet Namecoin nodes too (although as with Bitcoin there is the issue of exit node traffic manipulation). str4d [

Re: [tor-dev] Onioncat and Prop224

2016-05-21 Thread str4d
On 20/05/16 18:23, grarpamp wrote: > On 4/30/16, str4d wrote: >> On 27/04/16 22:31, grarpamp wrote: >>> I think there are a nontrivial number of users interested in, and >>> using, non-strictly-TCP transport over an IPv6 tunnel interface. >>> For example, l

Re: [tor-dev] Onioncat and Prop224

2016-05-01 Thread str4d
o that over > anonymous overlay network Tor / I2P. > There is already some work on doing this in I2P: https://github.com/majestrate/i2p-tools/tree/master/i2tun https://github.com/majestrate/i2p-tools/tree/master/pyi2tun I2P also natively supports non-TCP protocols if that helps (only da

Re: [tor-dev] Crux: Privacy-preserving statistics for Tor

2015-10-17 Thread str4d
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 str4d wrote: > Vasilios Mavroudis wrote: >> Hello, > >> I would like to introduce our project "Crux", which enables the >> computation of privacy preserving statistics on sensitive data. >> The project wa

Re: [tor-dev] Crux: Privacy-preserving statistics for Tor

2015-10-07 Thread str4d
an I2P plugin in Java that performs the relay role, but I wouldn't want to be duplicating a lot of logic that subsequently needs to be kept in-sync with upstream :) str4d > > Vasilis > > > > ___ tor-dev mailing > list

[tor-dev] Blocking-resistance in I2P (Was Re: Hello, I am a Tor Browser user in China. Currently, many obfs4 bridges are blocked by China's firewall.)

2015-10-01 Thread str4d
g over PTs would be much easier to implement and would provide noticeable benefits (making blanket bans much harder). str4d [0] http://zzz.i2p/topics/1577-ntcp2 [1] https://moderncrypto.org/mail-archive/curves/2014/000151.html [2] https://moderncrypto.org/mail-archive/curves/2014/000163.html [3] ht

Re: [tor-dev] Special-use-TLD support

2015-09-28 Thread str4d
ing the same RPC protocol, as > this creates unknown risks. As such forwarding can be done most > safely by Tor itself, the Tor Project reserves the right to > forward CNAME records between NameService lines in the future. > Applications should therefore not depend upon the above

Re: [tor-dev] Draft of proposal "Direct Onion Services: Fast-but-not-hidden services"

2015-04-10 Thread str4d
network, and it doesn't use separate rendezvous points for individual connections between Destinations. For high-traffic services that don't require anonymity, we generally recommend using one-hop tunnels instead of zero-hop. This is primarily to avoid connection limits being exceeded on t

Re: [tor-dev] A proposal to change hidden service terminology

2015-02-11 Thread str4d
gt; Tor, "I2PSpace/EEPSpace" for I2P etc. I am certainly in favor of this kind of collaborative approach. It's hard enough already trying to make this stuff understandable to end users (usability and UX of the tools themselves aside), without having multiple kinda-similar-but-not tools

Re: [tor-dev] N reasons why the spooks love Tribler (Number N' will surprise you)

2014-12-20 Thread str4d
all BitTorrent clients on I2P are documented in [1]. str4d [0] https://cryptocoding.net/ [1] https://geti2p.net/en/docs/applications/bittorrent -BEGIN PGP SIGNATURE- iQIcBAEBCgAGBQJUlV4AAAoJEIA97kkaNHPnZFoP/iSsUzDBUsgApq6XC0o3TMlt SpjTEvYkuK4xq2wLEcggu+eX7ZOTQFLPjIocIfSkkPuj4DDT0/Esyg9/Fo55B

Re: [tor-dev] Potential projects for SponsorR (Hidden Services)

2014-10-21 Thread str4d
if everyday users are to understand it, and we need to research the trade-offs carefully. I am happy to discuss this further if anyone is interested, because a combined / general approach would benefit multiple networks. str4d [0] https://geti2p.net/en/docs/discussions/naming [1] htt

Re: [tor-dev] [tor-talk] Tor Research Framework update

2014-08-14 Thread str4d
you need > to write bindings or something... But better check this yourself, > I haven't looked into Peach in years. You could also use Jython to run tor-research-framework and use the Java crypto in the Python code. See Jy2P [0] for an example, it uses Jython to start the Java I2P

Re: [tor-dev] Java-version Tor router?

2014-04-02 Thread str4d
forking the Orchid codebase as part of their plan to bundle it by default[3]. str4d [0]: https://github.com/subgraph/Orchid [1]: http://plugins.i2p.me/plugins/orchid/ (via I2P inproxy) [2]: https://github.com/str4d/Orchid [3]: https://github.com/bitcoinj/bitcoinj/pull/28 -BEGIN PG

Re: [tor-dev] [Discussion] 5 ^H 3 hops rendezvous circuit design

2014-02-14 Thread str4d
ires no anonymity of its own, but wants its users to benefit). str4d > > zw > > > > ___ tor-dev mailing > list tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev > -BEGIN PGP

Re: [tor-dev] .i2p address support in torsocks

2013-11-02 Thread str4d
If there are problems with our SOCKS implementation, they can be fixed (or implemented - I2P supports datagrams, but SOCKS UDP is not yet implemented). For filtering, it is up to the user to decide if they want to use a filtered SOCKSIRC tunnel or an unfiltered SOCKS tunnel, but it should not affect to