> Just scanned through all the material and did find anything that directly
> discusses the question:
>
> _specifically_ why is the weight of middle relays for USE AS A GUARD not
> zero? The 'Wgm' parameter is described as
>
>Wgm - Weight for non-flagged nodes in the guard Position
This is
On Wed, Dec 16, 2015 at 10:51:21AM +0100, Fabio Pietrosanti (naif) - lists
wrote:
> Basically i would like to extract all emails account from the Contact:
> field of the consensus that end-up with .it.
The contact field is part of a relay's server descriptor, not of the
consensus.
> I'm wonderin
Greetings.
The Tor BSD Diversity Project (TDP) is working on a number of smaller
sub-projects besides porting Tor Browser to OpenBSD.
We are proud to formally announce "Porting PETs," a list of common
privacy-related ports and their statuses in the BSD ports systems.
Some of the applications are
>
> To get all the ways in which web browsers threat https differently
> from http: mixed content warnings, cookie policies etc. pp.
> Browsers won't special-case .onion as 'like https', and should not
> because whether they actually are depends on things outside the
> browser.
>
I suggest torprox
This one that was in my initial reply:
http://lists.w3.org/Archives/Public/public-webapps/2015OctDec/0205.html
Le 16/12/2015 12:07, Andreas Krey a écrit :
> On Wed, 16 Dec 2015 11:54:09 +, Aymeric Vitte wrote:
> ...
>> I will not start a CA model discussion again, but the unanswered
>> questio
On Wed, 16 Dec 2015 11:54:09 +, Aymeric Vitte wrote:
...
> I will not start a CA model discussion again, but the unanswered
> question in the thread was: what can ws with https hurt exactly and why
> are we obliged to use insecure http with ws?
Which thread are you living in?
Andreas
--
"To
Whether we follow the logic completely (all TLS with valid certificates)
and we have a solution for all cases, whether we don't, and currently
the W3C folks don't (WebRTC example) and forbid other things not
explaining clearly why.
I will not start a CA model discussion again, but the unanswered
q
> For what use exactly? ie why people should want a TLS certificate for a
> .onion, which by definition is something not tied to an official
> "domain", like anything that has no other choice than using self-signed
> certificates?
The benefit of a publicly signed certificate over a snake-oil certi
On Tue, 15 Dec 2015 22:24:05 +, Aymeric Vitte wrote:
> For what use exactly? ie why people should want a TLS certificate for a
> .onion,
To get all the ways in which web browsers threat https differently
from http: mixed content warnings, cookie policies etc. pp.
Browsers won't special-case .o
On 12/16/2015 10:51 AM, Fabio Pietrosanti (naif) - lists wrote:
> I'm wondering if it's possible to query in an easy way, trough some kind
> of online/cloud database the archived historical consensus.
Onionoo only offers the current state of the network, not historical
data, via REST API.
You can
Hello,
i would like to make a query on the Tor archved Historical Consensus
database.
Basically i would like to extract all emails account from the Contact:
field of the consensus that end-up with .it.
I would like to build a mailing list to promote the upcoming (hopefully
to be setup in 2016) O
The result...
https://cryptome.org/2015/12/s754-cisa.htm
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
12 matches
Mail list logo