Re: [tor-dev] Tor in a safer language: Network team update from Amsterdam

2017-04-01 Thread z...@manian.org
Rust seems like the best available choice for Tor in a safer language. Rust has several issues with securely obtaining a Rust toolchain that the Tor community should be attentive to. Rust is a self hosted compiler. Building Rust requires obtaining binaries for a recent Rust compiler. The Rust too

Re: [tor-dev] Shor's Algorithm meets Lattices

2016-11-26 Thread z...@manian.org
3) on Scott Aaronson's blog post and the discussion in the comments is the most information I've seen. |http://www.scottaaronson.com/blog/?p=2996 On Sat, Nov 26, 2016 at 9:36 AM Jesse V wrote: > On 11/26/2016 07:50 AM, ban...@openmailbox.org wrote: > > > > While an error in the calculations has

Re: [tor-dev] prop224: Ditching key blinding for shorter onion addresses

2016-07-31 Thread z...@manian.org
In order to have an effective system of blinded identities, you need to have an out of band channel to transmit 128-256 bits from the server to the client. This is essential for blinding the in-band adversary to the long term shared identity between the client and server. A naming system will move

Re: [tor-dev] Just releasted : haskell-tor

2015-11-18 Thread z...@manian.org
There is this one as well. https://github.com/tvdw/gotor On Wed, Nov 18, 2015 at 11:25 AM, grarpamp wrote: > > Galois Inc has just released an implementation of the Tor protocol > > implemented in the Haskell programming langauge: > > https://github.com/GaloisInc/haskell-tor > > What other

Re: [tor-dev] Globe needs a new maintainer (was: maintenance status of atlas or globe)

2015-03-30 Thread z...@manian.org
It looks like Atlas is essentially a static application where everything runs client side. Globe has a has a node.js backend. Is there any actually need for state to persist within the application? Atlas looks like a cleaner system in many ways. On Mon, Mar 30, 2015 at 2:40 AM, isis wrote: >