On 01/20/2016 03:29 PM, Oskar Wendel wrote:
> What do you all think?
I agree that HSDirs are the places to handle this. The network already
trusts them not to MitM connections, and send users to malicious HS,
right? And I presume that there is testing for dishonest HSDirs. If not,
there should
Apologies David, I often am to long wended but will endeavor to be a bit more
to the point in the future but I may fail as words are an not always the most
efficient form of communication.
Indeed Bash is what I use because it's what I know. While I've studied a bit of
Python (enough to read and
Firstly, I don't think my questions "deserved" such a long reply and
it is not my preference to have such a broad spattering of
conversation topics... but you started it and so I have tried to reply
to your various points.
The take-away i get from all of that is that you really like bash and
don't
Rejo Zenger:
>> The user can call the admin and ask the admin to read aloud the key
>> fingerprint.
>
> Yes, I like the idea. Still, I think this is not scalable, do you
> think?
In this case you will have to trust somebody who has already done that.
Maybe. Or probably the one you know trusts so
On Thu, Jan 21, 2016 at 5:45 PM, Virgil Griffith wrote:
> Fun fact. https://certsimple.com now supports doing Extended
> Validation TLS certificates for .onion. You can even get wildcard
> certs, ooo! so fancy!
>
> For some hidden service operators struggling with people cloning your
> site
Hey David, thank you for the link to the Ansible project; I'll be reading up on
how they suggest setting up relays and perhaps add in an option for using their
code instead if dependences are found to be met on the host system. I may not
know the language that they're using but the syntax isn't