[tor-talk] Reminder invitation

2015-01-01 Thread demos
Hi folks, You are sincerely invited to the EDN evening and Workshop on January the 16 and 17 th in Dresden. https://wiki.c3d2.de/Echt_Dezentrales_Netz#Veranstaltungen For better location planning please note your coming here: https://dudle.inf.tu-dresden.de/privacy/EDN_Themenabend/ EDN intends t

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread tor-admin
On Friday 02 January 2015 06:26:34 Thomas White wrote: > Re: setting up a CA. I done some research on this a while ago after > bouncing the idea around on IRC and the problem is the legal side of > things. It will be difficult for Mozilla to accept a CA who would only > sign for .onion certificates

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 The whole CA system is a broken model in many ways yes, but that doesn't mean we should totally disregard it. We can work with the CA's to build up a standing as long as we don't forget that CA's are no requirement to legitimacy. If a standard is set

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Peter Tonoli
On 2/01/2015 4:03 pm, Virgil Griffith wrote: > Being a CA for .onion seems a reasonable thing to be. Should someone > already part of the Tor community like torservers.net become that CA? I thought the general consensus was that the CA system is totally broken. Why would we want to build on an al

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Virgil Griffith
Being a CA for .onion seems a reasonable thing to be. Should someone already part of the Tor community like torservers.net become that CA? -V On Thu, Jan 1, 2015 at 6:52 PM, Thomas White wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > To individuals - no. However that being said,

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 To individuals - no. However that being said, I am currently working with two CA's on getting them to set out a standard to adopt with the other CAs since they cannot just issue a certificate without following the guidance that the CA Forum sets out.

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Xiaolan.Me
does any CA can issue SSL-CERT to an .onion address? 2015-01-02 9:17 GMT+08:00 Virgil Griffith : > If an existing website simply wants to improve performance for Tor > users, my understanding is that it's more efficient simply to run an > Exit Enclave instead of a hidden service. Is that true? >

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Katya Titov
Colin Mahns: > I've written up an example email here: > http://zerobinqmdqd236y.onion/?31934b9e07f96171#GM3e5ekrDUakoz612PNB8tCBmme/QRrj6zMgd1amZpU= > Feel free to improve on it, I based it off of emails I've sent in the > past. I'm not sure if we should list security concerns in the general > sens

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Virgil Griffith
If an existing website simply wants to improve performance for Tor users, my understanding is that it's more efficient simply to run an Exit Enclave instead of a hidden service. Is that true? https://trac.torproject.org/projects/tor/wiki/doc/ExitEnclave -V On Thu, Jan 1, 2015 at 5:06 PM, Colin

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Colin Mahns
Awesome! Love the document title by the way :) If I think of anything more to add, I'll be sure to edit it in. Colin On January 1, 2015 7:46:22 PM EST, Katya Titov wrote: >Colin Mahns: >> I've written up an example email here: >> >http://zerobinqmdqd236y.onion/?31934b9e07f96171#GM3e5ekrDUakoz6

Re: [tor-talk] Cryptographic social networking project

2015-01-01 Thread carlo von lynX
Happy new ear (as they say in Italy). On Tue, Dec 30, 2014 at 01:23:55PM +0330, cont...@sharebook.com wrote: > User only establish hundreds of Tor hidden services once, when launch > the app, which cost high computational power for awhile, but when all > hidden services are connected then it doesn

Re: [tor-talk] Tor 0.2.6.2-alpha is now released!

2015-01-01 Thread Nick Mathewson
On Dec 31, 2014 3:03 PM, "Sebastian G. " < bastik@googlemail.com> wrote: > > 31.12.2014, 19:27 Nick Mathewson: > > Happy New Year to everyone. > > Some stuff could have been called "Minor changes" to silence people that > grep for "bugfix" and count the occurrences, although there w

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Colin Mahns
> Installed and working. (Yes, I read issue #32. What happens now that TBB > updates in place? Will I remain with DWE when a new TBB is released?) After an update to the TBB, the extension is reverted back to HTTPSE. It's not ideal, but dwe itself is a bit of a hack. > If there's a pro forma emai

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Jonathan Wilkes
On 01/01/2015 10:54 AM, spencer...@openmailbox.org wrote: Jonathan Wilkes jancsika at yahoo.com wrote: This has long been a chicken-or-egg problem. A general audience (i.e., not digital security specialists) must know what hidden services do before they get involved in hosting hidden services (

Re: [tor-talk] All I Want For X-mas: TorPhone

2015-01-01 Thread Arxaios
Dear Sir , The first rule , is not my rule at all, is never never been broken for a lot of years now because this rule gives hackers "the freedom" to test things. So if you are a programmer you would understand what I am talking about. Everything is made with this rule ...protocols , programs

[tor-talk] Giving Hidden Services some love

2015-01-01 Thread spencerone
Jonathan Wilkes jancsika at yahoo.com wrote: This has long been a chicken-or-egg problem. A general audience (i.e., not digital security specialists) must know what hidden services do before they get involved in hosting hidden services (or even using them, for that matter). But to know what h

Re: [tor-talk] Tor 0.2.6.2-alpha is now released!

2015-01-01 Thread Fabio Pietrosanti (naif) - lists
On 12/31/14 7:27 PM, Nick Mathewson wrote: > o Major features (hidden services): > - Make HS port scanning more difficult by immediately closing the > circuit when a user attempts to connect to a nonexistent port. > Closes ticket 13667. > - Add a HiddenServiceStatistics option

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Peter Presland
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I'd like to explore the possibility of hosting the Wikispooks site as a Hidden service. I have hosted and webmastered the site through its development on vps's since 2010. The nature of its content has caused me to familiarise myself with web anonymit

Re: [tor-talk] Giving Hidden Services some love

2015-01-01 Thread Katya Titov
Colin Mahns: > That was my fault, must've deleted a character by mistake. > https://github.com/chris-barry/darkweb-everywhere is the right link Installed and working. (Yes, I read issue #32. What happens now that TBB updates in place? Will I remain with DWE when a new TBB is released?) > I'm wond