ll-meaning idea, and the concerns behind it are valid -
> > but the approach would likely introduce more problems than it solves. The
> > current design of Tor reflects a lot of hard lessons about trust,
> > decentralization, and threat modeling that we’ve learned the hard w
uld likely introduce more problems than it solves. The current
design of Tor reflects a lot of hard lessons about trust, decentralization, and
threat modeling that we’ve learned the hard way over the past few years.
Thank you,
- George
On Wednesday, July 16th, 2025 at 11:45 AM, Khaled Roomi
become slower but more anonymous. And
that’s my idea, I hope you guys are safe and goodbye.
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
com/Ch1ffr3punk/pluto
>
> I post it here, because on the regular Tor forum
> it did not yet received any attention, in form of replies.
>
> Best regards
> Stefan
___________________
tor-dev mailing list -- tor-dev@lists.torproject.org
To
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
on gitlab, or to discuss here.
Discussion on the forum is also okay!
peace,
--
Nick
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
.
:w
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
orproject.org>
_______
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
Onion Association authentication.
This proposal was written by Paul Syverson, I'm announcing it on his
behalf.
--
Micah Anderson (he/him)
Director of Engineering
The Tor Project, Inc. <https://torproject.org>
_______
tor-dev mailing list -- tor-dev@list
,Austria
https://www.linkedin.com/in/valentinaschiavon1/
https://github.com/valentinaschiavon99
valentinaschiavo...@gmail.com
___________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
scuss here.
Discussion on the forum is also okay!
best wishes,
--
Nick
___________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
ikely to be _worse_ than our
current malleable relay encryption.
Please feel free to open tickets on gitlab, or to discuss here.
Discussion on the forum is also okay!
cheers,
--
Nick
_______
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe
I added this as:
https://gitlab.torproject.org/tpo/core/tor/-/issues/41046
kind regards,
nusenu
--
https://nusenu.github.io
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
On Tue, Apr 08, 2025 at 08:32:24AM -0400, Nick Mathewson via tor-dev wrote:
> > Is tor able to use secondary groups?
>
> Hm. In src/lib/process.setuid.c, it looks like we're only calling
> setgroups() with a single gid from the password database, not with any
> additio
we're going to change their state from
"Open" to "Accepted" in about a week. If anybody would like to
comment, either here or on the bugtracker
(https://gitlab.torproject.org/tpo/core/torspec/), that would be
great!
best wishes,
--
Nick
_________
On Thu, Apr 3, 2025 at 6:29 PM nusenu via tor-dev
wrote:
>
> Hi,
>
> given the following example, tor fails to access the familykeydir folder.
>
> familykeydir has the following permissions:
>
> drwxr-x--- 2 root tor_reader
>
> id _tor
> uid=996(_tor) gid=993(_tor
_tor manually, it is possible to read files
in that folder without problems.
The problem does not happen when _tor's primary group is set to 'tor_reader'.
Tested on debian.
kind regards,
nusenu
--
https://nusenu.github.io
___________
tor-d
the forum is also okay!
cheers,
--
Nick
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
tickets on gitlab, or to discuss here.
Discussion on the forum is also okay!
cheers,
--
Nick
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
discuss here.
Discussion on the forum is also okay!
cheers,
--
Nick
___
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
scuss here.
Discussion on the forum is also okay!
cheers,
--
Nick
___________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
e pages on a daily basis ;) So in case
if it not a time critical, we get the information about a new release without
any need from your side to inform me :)
Regards
hefee
signature.asc
Description: This is a digitally signed message part.
_______
tor-dev
s more processes, possibly of different archs (e.g. `torsocks bash
-c "wget ..."`)
Yes it would be nice, if torsocks could detect the arch correctly, but I also
thought at these complications about subprocesses.
Regards,
hefee
Thanks for reaching out!
-Jim
________
sibly of different archs (e.g. `torsocks bash
> -c "wget ..."`)
Yes it would be nice, if torsocks could detect the arch correctly, but I also
thought at these complications about subprocesses.
Regards,
hefee
signature.asc
Description: This is a digitally signed message part.
This looks basically ok to me. More below:
On 3/10/25 8:50 AM, Hefee via tor-dev wrote:
Hey,
in Debian we want to enable mutli-arch support for torsocks. To be able to run
different binaries of different archs.
We already splitted libtorsocks into own package, so you can now install
e.g
ure.asc
Description: This is a digitally signed message part.
_______________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
.torproject.org/tpo/core/torspec/-/issues/307
Comment here is also acceptable.
--
Mike Perry
___________
tor-dev mailing list -- tor-dev@lists.torproject.org
To unsubscribe send an email to tor-dev-le...@lists.torproject.org
On 01/03/2025 17.33, techmetx11 via tor-dev wrote:
Are there any plans to revamp the algorithm for newer Tor versions?
I don't think so. All the focus right now is on getting Arti into a
state where it can replace all of Tor's current usage. Arti has just
gotten an RPC layer that
. Theoretically, an attacker can expose this to
autheticate into a Tor Control Port without having to know the password.
Are there any plans to revamp the algorithm for newer Tor versions?
[1]: https://shattered.io/
___
tor-dev mailing list -- tor-dev
o-maintainer of Metadata Cleaner, please get
in touch at mat-...@boum.org (public mailing list).
Thanks in advance, and many thanks to Romain Vigier for creating
Metadata Cleaner!
--
intrigeri, for the Tails Team
jvoisin, mat2 developer
_______
tor-dev
nds / colleagues
place, otherwise I would have likely opened a Gitlab ticket, given I figured
out the actual bug behind it, if any.
However, as I am unable right now and also not at my usual workplace, I
included tor-dev in the recipients.
Thanks.
-GH
publickey - hartle
I will have tried. :))
Phew!
a.
--
Antoine Beaupré
torproject.org system administration
___
tor-project mailing list
tor-proj...@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project
_________
On Tuesday, October 22nd, 2024 at 11:24 PM UTC, Watson Ladd wrote:
>
>
> On Tue, Oct 22, 2024, 4:15 PM wrote:
>
> On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote:
>
> > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
> > tor-
On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote:
> On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
> tor-dev@lists.torproject.org wrote:
>
> > Hi all,
> >
> > I want to promote some recent work of mine in the hope that someone here
>
On Tue, Oct 22, 2024, 4:15 PM wrote:
> On Tuesday, October 22nd, 2024 at 9:04 PM UTC, Watson Ladd wrote:
>
> > On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
> > tor-dev@lists.torproject.org wrote:
> >
> > > Hi all,
> > >
> > >
On Tue, Oct 22, 2024 at 3:47 AM stifle_savage042--- via tor-dev
wrote:
>
> Hi all,
>
> I want to promote some recent work of mine in the hope that someone here will
> find it interesting or useful. In my most concise language, it is a
> "decentralized, asynchronous ent
.@torproject.org>
wrote:
> stifle_savage042--- via tor-dev:
>> Hi all,
>>
>> I want to promote some recent work of mine in the hope that someone here
>> will find it interesting or useful. In my most concise language, it is a
>> "decentralized, asynchronous en
stifle_savage042--- via tor-dev:
Hi all,
I want to promote some recent work of mine in the hope that someone here will find it interesting or useful. In my most concise language, it is a "decentralized, asynchronous entropy generator protocol." I've made a somewhat complete demo
GP MESSAGE-
gpg.key
Description: Binary data
_______________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
seen using:
$ dig blog.cloudflare.com -t TYPE65
If you have `drill` installed with modern HTTPS/SVCB support, you can also query
it with a nicer response using:
$ drill HTTPS blog.cloudflare.com
This should make it easier to test the feature.
--- snip ---
--
Alexander Færøy
____
amount of padding inside the
encryption and get a bunch of other details right. If you do end up writing
that spec, I'd be happy to help review it.
David
On Fri, Oct 11, 2024 at 12:48 PM Q Misell via tor-dev <
tor-dev@lists.torproject.org> wrote:
> Moin David,
>
> Thanks for se
see a
summary here:
https://lists.torproject.org/pipermail/tor-dev/2018-March/013026.html
Deconstructing the above to see if still holds today could be a good start imo.
Cheers!
David
--
OIA801GlIC38M7YQhAY3ojyedelKPpxaBcjfGrWKhDo=
signature.asc
Descrip
On Fri, Oct 4, 2024 at 3:57 AM Q Misell via tor-dev
wrote:
[...]
> What are people's thoughts on this?
Hi, Q!
I think migrating to QUIC over time might help a lot, particularly in
relay-to-relay communications where we have a large number of circuits
to multiplex.
## Design points
*
t, but that's not for c-tor/arti to do (and ECH needs proper DNS
> support over Tor, which could be considered a child item of UDP over Tor, or
> something we can already do with DNS over tcp/tls/https, or something
> orthogonal where a client could query directly the DNS of an ex
proper
DNS support over Tor, which could be considered a child item of UDP over
Tor, or something we can already do with DNS over tcp/tls/https, or
something orthogonal where a client could query directly the DNS of an exit
node with more than A//PTR).
On Tue, 8 Oct 2024 at 10:
ick thoughts on this.
On Friday, October 4th, 2024 at 9:56 AM, Q Misell via tor-dev
wrote:
> Hi all,
>
> I know the discussion on how best to support UDP applications over Tor has
> dragged on for a long time, so I thought what better to do than to throw
> another item t
lauca Digital and the Glauca logo are registered
trademarks in the UK, under № UK3718474 and № UK3718468,
respectively.
smime.p7s
Description: S/MIME Cryptographic Signature
___________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torpro
Your email client, I presume, is rewriting links to first go through
e.as207960.net.
I'm curious why that is.
Matt
On 9/25/24 04:23, Q Misell via tor-dev wrote:
Moin,
I've posted my thoughts on a potential solution to this in GitLab:
https://gitlab.torproject.org/tpo/core/torspe
or
> > transparent-proxy name resolution is relentlessly moving towards being
> > actively painful. I feel that now would be a good time to embrace a
> > different, ideally standards-compliant / more-futureproof approach.
> >
> > -a
> >
> > [1] Fun
C527CC.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
re is some
other state we still share between isolated circuits (in both C-Tor and
Arti), for example guards including vanguards.
Hope this helps,
--Roger
___________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
rt, but I don't know
if we'll get it built in the earliest versions of our FFI embedding
logic. There is a _lot_ of code to write, and a _lot_ of
functionality to support -- so please poke us again (maybe on the
bugtracker?) if this isn't easily do-able in the first supported FFI
emb
convenient cross-platform way AFAIK, so it probably isn't going to be
any portable application's first resort.
-
Sorry for all the text! But I do hope it's at least somewhat interesting.
best wishes,
It was very interesting! Thanks for all the ideas. Looks li
#x27;t use: OS-specific restrictions
Because somebody will mention it if I don't: you could probably cobble
something together using OS specific restrictions, like containers or
selinux. Of course, this isn't really something you can ship in a
convenient cross-platform way AFAIK, so it prob
d in the Arti RPC protocol
to associate a SOCKS request with some existing Client object,
or with a preexisting DataStream.
___________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-d
he `RpcDataStream` internally to create a new `DataStream`,
/// and to store that `DataStream` in itself.
/// The `RpcDataStream` with Object ID `STREAM-1`
/// is now an alias for the newly created `DataStream`.
/// Arti proxies the application's SOCKS connection through that `DataStream`.
///
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
onnection including an RPC object ID,
and to reject any as-yet-unspecified isolation mechanisms.
[^ObjectId]: An ObjectId is used in the Arti RPC protocol
to associate a SOCKS request with some existing Client object,
or with a preexisting DataStream.
_
On Tue, Sep 10, 2024 at 9:25 AM Q Misell via tor-dev
wrote:
>
> Is there a reason why this proposal extends the existing username/password
> auth, instead of defining a new SOCKS5 authentication type? c.f.
> https://datatracker.ietf.org/doc/html/rfc1928#section-3
Indeed there is
entations
> that do not support non-ASCII username/password values.
>
>
>
> ## C Tor migration
>
> When this proposal is accepted,
> we *should* configure C tor to implement it as follows:
>
> - To reject any SOCKS5 Username starting with ``
> unless it is exactly `0`.
>
> This behavior is sufficient to g
A5EA28FAE.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
___________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
[^ObjectId]: An ObjectId is used in the Arti RPC protocol
to associate a SOCKS request with some existing Client object,
or with a preexisting DataStream.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
contribute but trivially
don't know how to do it... Snowflake also comes to mind...
-- Aleff
publickey - alessandro.greco.1@protonmail.com - 0x1D14CC10.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
___________________
On Donnerstag, 29. August 2024 08:40:08 CEST George Hartley via tor-dev wrote:
> 1. You MUST have read the manual, at least the entries explaining the
> settings in your Tor configuration file. Please take a look at it here:
> https://2019.www.torproject.org/docs/tor-manual.html.en
Digital and the Glauca logo are registered
trademarks in the UK, under № UK3718474 and № UK3718468,
respectively.
On Fri, 30 Aug 2024 at 11:27, George Hartley via tor-dev <
tor-dev@lists.torproject.org> wrote:
> We want people to be knowledgeable, and these "do it one time an
t created the
> package (Turris routers) doesn't interestd in this anymore.
>
> For a desktop distros loke Ubuntu you may find a similar tool called Webmin
> that can be used for remote administration. Maybe you can create a plugin for
> it.
>
>
> 26 авг. 2024 г. 12:56:09
. 12:56:09 Alessandro Greco via tor-dev
:
> Hello everyone,
>
> I have been thinking about creating a web app that generates a script to
> configure a Tor node based on the settings defined by the user. Let me
> explain a bit further.
>
> This web app could work either en
behind the "> data"-buttons). E.g. one is
http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/bridgedb-distributor.csv
where the "indentifier" is "bridgedb-distributor".
Georg
Cheers,
Carlos.
_________________
examples) @
*http://hctxrvjzfpvmzh2jllqhgvvkoepxb4kfzdjm6h7egcwlumggtktiftid.onion/stats.html
Cheers,
Carlos.___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Sonntag, 25. August 2024 15:07:48 CEST Alessandro Greco via tor-dev wrote:
> I have been thinking about creating a web app that generates a script to
> configure a Tor node based on the settings defined by the user.
> I'm not sure if something like this already exists, but I thi
escription: OpenPGP digital signature
___________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Cancel what exactly?
You can unsubscribe from the list by logging in to the account that you have
created.
Sincerely,
George
On Wednesday, August 21st, 2024 at 2:38 PM, tj wrote:
> Sent from my iPhone
> ___
> tor-dev mailing list
Sent from my iPhone
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ing the following 4 lines
in a shell wherever you have the files downloaded:
cat <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
System wrote via Tor Project :Feedback:
Please submit the proposal also to tor-dev: tor-dev Info PageIntroducing &
Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor &
Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes
https://www.reddit.com/r/TO
y; Nick Feamster, University of Chicago
https://www.usenix.org/conference/usenixsecurity24/presentation/hoang
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
Hi Everyone!
It's been a minute since the last time I posted to this list about
Gosling (December, 2021 what the actual heck:
https://lists.torproject.org/pipermail/tor-dev/2021-December/014684.html
). Well, since then I have been quite busy leading the applications team
and shi
And also: If you like, you can see a rendered version of this proposal
at https://spec.torproject.org/proposals/350-remove-tap.html .
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
sh-dummy-tap-key` consensus parameter,
so that relays will no longer include TAP keys in their router descriptors.
[proposal 216]: ./216-ntor-handshake.txt
[proposal 245]: ./245-tap-out.txt
[hsv2-deprecation]: https://support.torproject.org/onionservices/v2-deprecation/
[relays in Arti]: https:/
ping `s` secret didn't actually achieve anything that couldn't
be achieved just as easily by keeping KP_hs_id secret.
best wishes,
--
Nick
___________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
) this would be relevant.
If you have any insights, please let me know. Also I am new to the TOR-Dev
world, so feel free to send me to a different mailing list, should I have
chosen the wrone one for this topic :)
Thanks in advance,
Thomas
--
```
M.Sc. Thomas Bellebaum
Applied Privacy
On 2024-04-24 14:58, Alessandro Greco via tor-dev wrote:
> Dear Tor Project Developers,
>
> I hope this email finds you well. I am writing to share with you a project
> [1] I have been working on called Tor Watchdog Bot [2], and I believe it may
> be of interest to you.
&g
ject (torproject.org)
- Signal (signal.org)
publickey - alessandro.greco.1@protonmail.com - 0x1D14CC10.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
h
epend upon full parsing and
protocol context, as opposed to just relay message command.
This work is part of Sponsor 112; arti-client support is due by EOY 2024.
C-Tor will not implement this proposal.
--
Mike Perry
_______
tor-dev mailing list
to
s://gitlab.torproject.org/tpo/core/torspec/-/blob/33308845cec54bfc0096b8ea0339a8ff183aa1b1/tor-spec.txt#L622
The new mdbook style makes it a little harder to refer to a specific
section. Since this is the only reference to tor-spec we have, I guess
what we'll do is change the bib entry to r
lls.
(For extra fun, I don't think anything promises that "2.3.1" will still
be the number of this section in the future.)
--Roger
___________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
ttps://www.caida.org/catalog/papers/2005_fingerprinting/KohnoBroidoClaffy05-devicefingerprinting.pdf
(I bet there are many more papers published after that one, but our
design means we have mercifully not needed to keep up with the remote
device fingerprint literature.)
--Roger
________
On 2/8/24 05:02, Vilgot Bergquist via tor-dev wrote:
Hi,
I looked at the suggested solutions and I think there is another approach,
which is much easier.
I C it's pretty easy to encapsulate UDP segments inside TCP segments. Hence
there is no need to re-organize the connection logic o
2B280B23E1107BB62ABFC40DDCC8824814F80A72 +
> 1zOHpg+FxqQfi/6jDLtCpHHqBTH8gjYmCKXkus1D5Ko.
> [warn] Problem bootstrapping. Stuck at 14% (handshake): Handshaking with a
> relay. (Unexpected identity in router certificate; IDENTITY; count 1;
> recommendation warn; host 111
onspray/-/issues
Finally, I'd like to thank Alec Muffett for his important work with EOTK
and for promoting Onion Services all these years :)
Thanks!
--
Silvio Rhatto
pronouns he/him
signature.asc
Description: PGP signature
___________________
tor-dev mailing
uards, when receiving an UDP packet, to just add a
TCP header and then it goes through the normal process. The exit nodes than
removed the TCP header and pass the UDP segment on.
Regards
Vilgot
tor-dev-requ...@lists.torproject.org
schrieb am Donnerstag, 25. Januar 2024 um 18:49:
>
>
Hi tor-dev@,
I have been running a bridge following the instructions at
<https://community.torproject.org/relay/setup/bridge/docker/> on a Debian 12.4
system but when I just tried to make sure everything is up to date I got the
following error message from docker-compose logs:
obfs4-br
Hello tor-dev folks!
Late last year I started taking a close look at what it would take to
support applications on Tor which rely on UDP networking. This was
originally to be based on Nick's proposal, 339-udp-over-tor.
The scope of this work so far has been specifically focused on end
so
Tor would either need to signal to the controller that an alarm was
needed, or the controller could just assume this whenever hidden
services were published, and wake the device every fifteen minutes
without explicitly communicating with Tor about alarms.
Cheers,
Michael
d of last resort. Are we already there?
Thanks,
--
Shawn Webb
Cofounder / Security Engineer
HardenedBSD
https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc
___________________
tor-dev mailing list
t
a Java API, so
> Tor would either need to signal to the controller that an alarm was
> needed, or the controller could just assume this whenever hidden
> services were published, and wake the device every fifteen minutes
> without explicitly communicating with Tor about alarms.
>
> Cheers,
> Michael
>> _
arm was
needed, or the controller could just assume this whenever hidden
services were published, and wake the device every fifteen minutes
without explicitly communicating with Tor about alarms.
Cheers,
Michael
___________________
tor-dev mailing
on about what's likely to happen if the timers
are arbitrarily delayed?
Thanks,
Michael
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
___
iance between scheduled wakeup and actual wakeup can be
bounded, or if there's any way to mark a timer as high-priority vs
low-priority or something.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
or Arti. Could
anyone give me an overview of how these local timers are handled in
Arti, or any information about what's likely to happen if the timers
are arbitrarily delayed?
Thanks,
Michael
___
tor-dev mailing list
tor-d
1 - 100 of 11093 matches
Mail list logo