August 2015 Archives by date
Starting: Mon Aug 3 14:03:38 UTC 2015
Ending: Mon Aug 31 22:58:05 UTC 2015
Messages: 203
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
George Kadianakis
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
Ian Goldberg
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
Paul Syverson
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 5, 14:00 UTC in #tor-project
Karsten Loesing
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] CompCert C compiler
Mansour Moufid
- [tor-dev] 5th status report for OnioNS
Jesse V
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
George Kadianakis
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] Tor's default behavior for ed25519 identities
Nick Mathewson
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] Get Stem and zoossh to talk to each other
Philipp Winter
- [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?
Steve Snyder
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?
Yawning Angel
- [tor-dev] simple onionoo patch
firebrand at ruggedinbox.com
- [tor-dev] Relay Dashboard Code Review
Damian Johnson
- [tor-dev] Relay Dashboard Code Review
meejah
- [tor-dev] Relay Dashboard Code Review
Damian Johnson
- [tor-dev] Relay Dashboard Code Review
meejah
- [tor-dev] Relay Dashboard Code Review
meejah
- [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)
Yawning Angel
- [tor-dev] Summary of meek's costs, July 2015
David Fifield
- [tor-dev] Relay Dashboard Code Review
Cristobal
- [tor-dev] Relay Dashboard Code Review
teor
- [tor-dev] Tor's default behavior for ed25519 identities
Nick Mathewson
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] simple onionoo patch
Karsten Loesing
- [tor-dev] First release of OnioNS for beta testing
Jesse V
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] First release of OnioNS for beta testing
Xinwen Fu
- [tor-dev] Future Onion Addresses and Human Factors
Paul Syverson
- [tor-dev] Future Onion Addresses and Human Factors
Roger Dingledine
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] collector problems since 2015-08-07 18:00?
nusenu
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] collector problems since 2015-08-07 18:00?
Tom Ritter
- [tor-dev] Future Onion Addresses and Human Factors
David Goulet
- [tor-dev] collector problems since 2015-08-07 18:00?
nusenu
- [tor-dev] collector problems since 2015-08-07 18:00?
Karsten Loesing
- [tor-dev] Invitation to participate in a survey about Tor's future
Sue Gardner
- [tor-dev] Future Onion Addresses and Human Factors
bernard
- [tor-dev] Future Onion Addresses and Human Factors
grarpamp
- [tor-dev] Future Onion Addresses and Human Factors
Jeff Burdges
- [tor-dev] Invitation to participate in a survey about Tor's future
teor
- [tor-dev] Future Onion Addresses and Human Factors
Jeremy Rand
- [tor-dev] Future Onion Addresses and Human Factors
Jeff Burdges
- [tor-dev] Future Onion Addresses and Human Factors
Jeremy Rand
- [tor-dev] Future Onion Addresses and Human Factors
Jeff Burdges
- [tor-dev] Future Onion Addresses and Human Factors
Ben Laurie
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] Future Onion Addresses and Human Factors
Ben Laurie
- [tor-dev] Get Stem and zoossh to talk to each other
Philipp Winter
- [tor-dev] Future Onion Addresses and Human Factors
Nick Mathewson
- [tor-dev] Future Onion Addresses and Human Factors
Philipp Winter
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] Future Onion Addresses and Human Factors
bernard
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
George Kadianakis
- [tor-dev] Tor's default behavior for ed25519 identities
Nick Mathewson
- [tor-dev] First release of OnioNS for beta testing
Jesse V
- [tor-dev] tor's definition of 'median'
nusenu
- [tor-dev] tor's definition of 'median'
Nick Mathewson
- [tor-dev] [important] sponsors deliverables discussion point for Wed's meeting
Isabela
- [tor-dev] Future Onion Addresses and Human Factors
Philipp Winter
- [tor-dev] Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy
David Stainton
- [tor-dev] tor's definition of 'median'
Virgil Griffith
- [tor-dev] Future Onion Addresses and Human Factors
Philipp Winter
- [tor-dev] tor's definition of 'median'
John
- [tor-dev] tor's definition of 'median'
Virgil Griffith
- [tor-dev] tor's definition of 'median'
Maciej Soltysiak
- [tor-dev] tor's definition of 'median'
Andreas Krey
- [tor-dev] Tor's default behavior for ed25519 identities
s7r
- [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 12, 14:00 UTC in #tor-project
Karsten Loesing
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
George Kadianakis
- [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
teor
- [tor-dev] tor's definition of 'median'
Virgil Griffith
- [tor-dev] IMPT -- Re: Future Onion Addresses and Human Factors
Alec Muffett
- [tor-dev] IMPT -- Re: Future Onion Addresses and Human Factors
Nick Mathewson
- [tor-dev] [important] sponsors deliverables discussion point for Wed's meeting
Isabela
- [tor-dev] tor's definition of 'median'
nusenu
- [tor-dev] [Twisted-Python] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy
David Stainton
- [tor-dev] tor's definition of 'median'
Nick Mathewson
- [tor-dev] tor's definition of 'median'
nusenu
- [tor-dev] tor's definition of 'median'
teor
- [tor-dev] tor's definition of 'median'
Sebastian Hahn
- [tor-dev] Future Onion Addresses and Human Factors
grarpamp
- [tor-dev] Alpha/Beta/Release cycle
tordev123 at Safe-mail.net
- [tor-dev] Get Stem and zoossh to talk to each other
l.m
- [tor-dev] Get Stem and zoossh to talk to each other
Damian Johnson
- [tor-dev] Get Stem and zoossh to talk to each other
tordev123 at Safe-mail.net
- [tor-dev] Get Stem and zoossh to talk to each other
Philipp Winter
- [tor-dev] Get Stem and zoossh to talk to each other
Damian Johnson
- [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 19, 14:00 UTC in #tor-project
Karsten Loesing
- [tor-dev] Two new Onionoo versions 2.4 and 2.5 add new "effective_family" and "measured" fields
Karsten Loesing
- [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if you hack Tor!
Nick Mathewson
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Philipp Winter
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Yawning Angel
- [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
Michael Rogers
- [tor-dev] bwauths: Are you publishing your output somewhere?
nusenu
- [tor-dev] [RFC] On new guard algorithms and data structures
George Kadianakis
- [tor-dev] [RFC] On new guard algorithms and data structures
l.m
- [tor-dev] [RFC] On new guard algorithms and data structures
s7r
- [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
l.m
- [tor-dev] [RFC] On new guard algorithms and data structures
s7r
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
George Kadianakis
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Jacek Wielemborek
- [tor-dev] [RFC] On new guard algorithms and data structures
l.m
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
George Kadianakis
- [tor-dev] [RFC] On new guard algorithms and data structures
s7r
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Jeff Burdges
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Yawning Angel
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Ian Goldberg
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Adam Shostack
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Yawning Angel
- [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
Joss Wright
- [tor-dev] [RFC] On new guard algorithms and data structures
l.m
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Jesse V
- [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
George Kadianakis
- [tor-dev] [RFC] On new guard algorithms and data structures
teor
- [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
l.m
- [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
s7r
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
teor
- [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
teor
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Yawning Angel
- [tor-dev] [RFC] On new guard algorithms and data structures
isis
- [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
George Danezis
- [tor-dev] 6th status report for OnioNS
Jesse V
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Jeff Burdges
- [tor-dev] Proposal: Padding for netflow record resolution reduction
Mike Perry
- [tor-dev] [RFC] On new guard algorithms and data structures
George Kadianakis
- [tor-dev] [RFC] On new guard algorithms and data structures
George Kadianakis
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Georg Koppen
- [tor-dev] Number of directory connections
tordev123 at Safe-mail.net
- [tor-dev] Number of directory connections
George Kadianakis
- [tor-dev] Number of directory connections
l.m
- [tor-dev] [RFC] On new guard algorithms and data structures
l.m
- [tor-dev] Number of directory connections
tordev123 at Safe-mail.net
- [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
l.m
- [tor-dev] Number of directory connections
l.m
- [tor-dev] [RFC] On new guard algorithms and data structures
Paul Syverson
- [tor-dev] Number of directory connections
tordev123 at Safe-mail.net
- [tor-dev] tor callgrinds
coderman
- [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if you hack Tor!
Fabio Pietrosanti (naif) - lists
- [tor-dev] Number of directory connections
tordev123 at Safe-mail.net
- [tor-dev] Number of directory connections
Yawning Angel
- [tor-dev] Number of directory connections
tordev123 at Safe-mail.net
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Tom Ritter
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
R. Anthony Lomartire
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Kevin P Dyer
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Kevin P Dyer
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Yawning Angel
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Yawning Angel
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Kevin P Dyer
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
Yawning Angel
- [tor-dev] Proposal: Padding for netflow record resolution reduction
Nick Mathewson
- [tor-dev] request for advice regarding bug 15901
starlight.2015q3 at binnacle.cx
- [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
Andreas Stieger
- [tor-dev] Two new Onionoo versions 2.4 and 2.5 add new "effective_family" and "measured" fields
David Fifield
- [tor-dev] Design for onionsite certification and use with Let's Encrypt
Paul Syverson
- [tor-dev] Design for onionsite certification and use with Let's Encrypt
Paul Syverson
- [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if you hack Tor!
teor
- [tor-dev] Proposal: Padding for netflow record resolution reduction
teor
- [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
teor
- [tor-dev] Updated aggregated data served by Metrics
Karsten Loesing
- [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
Andreas Stieger
- [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
teor
- [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 26, 14:00 UTC in #tor-project
Karsten Loesing
- [tor-dev] Video of my presentation on domain fronting (PETS 2015)
David Fifield
- [tor-dev] Design for onionsite certification and use with Let's Encrypt
Ben Laurie
- [tor-dev] Design for onionsite certification and use with Let's Encrypt
Jacob Appelbaum
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
Ben Laurie
- [tor-dev] FSCONS CFP extended
tordevmuc at encambio.com
- [tor-dev] Triaged some TorCoreTeam201508 tickets; please review
Nick Mathewson
- [tor-dev] Triaged some TorCoreTeam201508 tickets; please review
Nick Mathewson
- [tor-dev] patch to improve consensus download decompress performance
starlight.2015q3 at binnacle.cx
- [tor-dev] patch to improve consensus download decompress performance
Tim Wilson-Brown - teor
- [tor-dev] patch to improve consensus download decompress performance
David Fifield
- [tor-dev] 7th and last status report for OnioNS
Jesse V
- [tor-dev] Donncha's SoP Status Report 7 - Final
Donncha O'Cearbhaill
- [tor-dev] Hash Visualizations to Protect Against Onion Phishing
ncl at cock.li
- [tor-dev] Remove NULL checks for *_free() calls
Michael McConville
- [tor-dev] Remove NULL checks for *_free() calls
Mansour Moufid
- [tor-dev] Remove NULL checks for *_free() calls
Michael McConville
- [tor-dev] Remove NULL checks for *_free() calls
Andreas Krey
- [tor-dev] Remove NULL checks for *_free() calls
Zack Weinberg
- [tor-dev] Remove NULL checks for *_free() calls
tordev123 at Safe-mail.net
- [tor-dev] Where are the GetTor downloads (e.g. GitHub)?
David Fifield
- [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
Karsten Loesing
- [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Sep 2, 14:00 UTC in #tor-project
Karsten Loesing
- [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
nusenu
- [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
nusenu
- [tor-dev] Should cloud-hosted relays be rejected?
Philipp Winter
- [tor-dev] Should cloud-hosted relays be rejected?
Tim Wilson-Brown - teor
- [tor-dev] Should cloud-hosted relays be rejected?
nusenu
Last message date:
Mon Aug 31 22:58:05 UTC 2015
Archived on: Mon Aug 31 22:58:27 UTC 2015
This archive was generated by
Pipermail 0.09 (Mailman edition).