Hello there,
seems like the prop259 algorithm has kind of stabilized and you guys have
jumped into implementation. That's great!
A small problem in this process is that I'm probably the only person in Tor who
understands the new algorithm right now. We could fix this by doing a small
proposal IRC
Thank you.
Another thing I'm interested in is how the proposed algorithm structure
fits into current tor code. The proposed algorithm is:
OPEN_CIRCUIT:
context = ALGO_CHOOSE_ENTRY_GUARD_START(...)
while True:
entryGuard = ALGO_CHOOSE_ENTRY_GUARD_NEXT(context)
circu
Reinaldo de Souza Jr writes:
> That would be great!
>
OK. Let's say Wednesday 15:00 UTC then!
> I have a couple of questions that may help me better prepare for this
> meeting:
>
> 1) In the proposal we assume the arrival of a new consensus as a
> discrete event. Does this assumption match curr
Sounds good to me, Iván and company?
--
Ola Bini (https://olabini.se)
"Yields falsehood when quined" yields falsehood when quined.
signature.asc
Description: PGP signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproje
This sounds great to me. The sooner the better.
El 18/03/16 a las 07:17, Ola Bini escribió:
> Sounds good to me, Iván and company?
>
signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://li
That would be great!
I have a couple of questions that may help me better prepare for this
meeting:
1) In the proposal we assume the arrival of a new consensus as a
discrete event. Does this assumption match current tor implementation,
or is it more like "having at least X relay descriptors avai
Reinaldo de Souza Jr writes:
> [ text/plain ]
> Thank you.
>
> Another thing I'm interested in is how the proposed algorithm structure
> fits into current tor code. The proposed algorithm is:
>
> OPEN_CIRCUIT:
> context = ALGO_CHOOSE_ENTRY_GUARD_START(...)
> while True:
>