Hi folks,
You are sincerely invited to the EDN evening and Workshop on January the
16 and 17 th in Dresden.
https://wiki.c3d2.de/Echt_Dezentrales_Netz#Veranstaltungen
For better location planning please
note your coming here:
https://dudle.inf.tu-dresden.de/privacy/EDN_Themenabend/
EDN intends t
On Friday 02 January 2015 06:26:34 Thomas White wrote:
> Re: setting up a CA. I done some research on this a while ago after
> bouncing the idea around on IRC and the problem is the legal side of
> things. It will be difficult for Mozilla to accept a CA who would only
> sign for .onion certificates
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
The whole CA system is a broken model in many ways yes, but that
doesn't mean we should totally disregard it. We can work with the CA's
to build up a standing as long as we don't forget that CA's are no
requirement to legitimacy. If a standard is set
On 2/01/2015 4:03 pm, Virgil Griffith wrote:
> Being a CA for .onion seems a reasonable thing to be. Should someone
> already part of the Tor community like torservers.net become that CA?
I thought the general consensus was that the CA system is totally
broken. Why would we want to build on an al
Being a CA for .onion seems a reasonable thing to be. Should someone
already part of the Tor community like torservers.net become that CA?
-V
On Thu, Jan 1, 2015 at 6:52 PM, Thomas White wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> To individuals - no. However that being said,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
To individuals - no. However that being said, I am currently working
with two CA's on getting them to set out a standard to adopt with the
other CAs since they cannot just issue a certificate without following
the guidance that the CA Forum sets out.
does any CA can issue SSL-CERT to an .onion address?
2015-01-02 9:17 GMT+08:00 Virgil Griffith :
> If an existing website simply wants to improve performance for Tor
> users, my understanding is that it's more efficient simply to run an
> Exit Enclave instead of a hidden service. Is that true?
>
Colin Mahns:
> I've written up an example email here:
> http://zerobinqmdqd236y.onion/?31934b9e07f96171#GM3e5ekrDUakoz612PNB8tCBmme/QRrj6zMgd1amZpU=
> Feel free to improve on it, I based it off of emails I've sent in the
> past. I'm not sure if we should list security concerns in the general
> sens
If an existing website simply wants to improve performance for Tor
users, my understanding is that it's more efficient simply to run an
Exit Enclave instead of a hidden service. Is that true?
https://trac.torproject.org/projects/tor/wiki/doc/ExitEnclave
-V
On Thu, Jan 1, 2015 at 5:06 PM, Colin
Awesome! Love the document title by the way :)
If I think of anything more to add, I'll be sure to edit it in.
Colin
On January 1, 2015 7:46:22 PM EST, Katya Titov wrote:
>Colin Mahns:
>> I've written up an example email here:
>>
>http://zerobinqmdqd236y.onion/?31934b9e07f96171#GM3e5ekrDUakoz6
Happy new ear (as they say in Italy).
On Tue, Dec 30, 2014 at 01:23:55PM +0330, cont...@sharebook.com wrote:
> User only establish hundreds of Tor hidden services once, when launch
> the app, which cost high computational power for awhile, but when all
> hidden services are connected then it doesn
On Dec 31, 2014 3:03 PM, "Sebastian G. " <
bastik@googlemail.com> wrote:
>
> 31.12.2014, 19:27 Nick Mathewson:
>
> Happy New Year to everyone.
>
> Some stuff could have been called "Minor changes" to silence people that
> grep for "bugfix" and count the occurrences, although there w
> Installed and working. (Yes, I read issue #32. What happens now that TBB
> updates in place? Will I remain with DWE when a new TBB is released?)
After an update to the TBB, the extension is reverted back to HTTPSE.
It's not ideal, but dwe itself is a bit of a hack.
> If there's a pro forma emai
On 01/01/2015 10:54 AM, spencer...@openmailbox.org wrote:
Jonathan Wilkes jancsika at yahoo.com wrote:
This has long been a chicken-or-egg problem. A general audience (i.e.,
not digital security specialists) must know what hidden services do
before they get involved in hosting hidden services (
Dear Sir ,
The first rule , is not my rule at all, is never never been broken for
a lot of years now because this rule gives hackers "the freedom" to test
things. So if you are a programmer you would understand what I am
talking about. Everything is made with this rule ...protocols , programs
Jonathan Wilkes jancsika at yahoo.com wrote:
This has long been a chicken-or-egg problem. A general audience (i.e.,
not digital security specialists) must know what hidden services do
before they get involved in hosting hidden services (or even using
them,
for that matter). But to know what h
On 12/31/14 7:27 PM, Nick Mathewson wrote:
> o Major features (hidden services):
> - Make HS port scanning more difficult by immediately closing the
> circuit when a user attempts to connect to a nonexistent port.
> Closes ticket 13667.
> - Add a HiddenServiceStatistics option
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd like to explore the possibility of hosting the Wikispooks site as
a Hidden service.
I have hosted and webmastered the site through its development on
vps's since 2010. The nature of its content has caused me to
familiarise myself with web anonymit
Colin Mahns:
> That was my fault, must've deleted a character by mistake.
> https://github.com/chris-barry/darkweb-everywhere is the right link
Installed and working. (Yes, I read issue #32. What happens now that TBB
updates in place? Will I remain with DWE when a new TBB is released?)
> I'm wond
19 matches
Mail list logo