>No, I am just suggesting not to use Tor for something it wasn't built
>for. We have been working on a technology that combines anonymization
>with multicast distribution and is therefore a lot better suited for
>social use cases. I hoped you would see this point and maybe consider
>joining forc
> Hey,
>
> This looks like a pretty good start so far! I'm looking forward to seeing
> further development on this. For what it's worth, I think there were some
> other people vaguely hacking on Tor ControlPort libraries in Go; perhaps they
> will speak up and you all can work together. :)
>
> Th
sycamoreone transcribed 0.6K bytes:
> Hi,
>
> I recently started to implement parts of the Tor control protocol in Go.
> The result for now is a thin abstraction layer that still might be
> useful if somebody wants to use the control protocol from within a Go
> program.
>
> The code is at https:/
Virgil Griffith transcribed 0.9K bytes:
> yeah I figured. Just checking.
>
> -V
The super high-bandwidth Bridges with really good uptime which are included in
TBB have many thousands of clients, and push terabytes of traffic. So, if you
ran a Bridge like those, then you might see some additiona
You probably want to use TorBirdy:
https://addons.mozilla.org/en-US/thunderbird/addon/torbirdy/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
I don't meant to change the hash funktion from SHA-1 to SHA-256, I
meant to hash the 100 KB blocks and the higher level hashes with SHA-1
and to provide a SHA-256 hash that is generated from the file itself
too.
Because two hashes are more secur
On Wed, Jan 7, 2015 at 5:32 AM, taxakis wrote:
>
> Headline: Post-Quantum Secure Onion Routing (Future Anonymity in Today\'s
> Budget), by Satrajit Ghosh and Aniket Kate
> http://eprint.iacr.org/2015/008
Interesting stuff!
I wonder, does anybody around here have the cryptographic background
to
yeah I figured. Just checking.
-V
On Wed, Jan 7, 2015 at 11:59 PM, Xiaolan.Me wrote:
> No, bridge is similar an Entry Node...
>
> 2015-01-08 15:43 GMT+08:00 Virgil Griffith :
>
>> For example, if you run an exit node, your regular traffic is
>> disguised by exit traffic also coming from your ip
No, bridge is similar an Entry Node...
2015-01-08 15:43 GMT+08:00 Virgil Griffith :
> For example, if you run an exit node, your regular traffic is
> disguised by exit traffic also coming from your ip#. Is there
> anything similar for running a bridge node?
>
> -V
> --
> tor-talk mailing list -