August 2015 Archives by subject
      
      Starting: Mon Aug  3 14:03:38 UTC 2015
         Ending: Mon Aug 31 22:58:05 UTC 2015
         Messages: 203
     
- [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Philipp Winter
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Yawning Angel
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Kevin P Dyer
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Kevin P Dyer
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Yawning Angel
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Yawning Angel
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Kevin P Dyer
 - [tor-dev] "Seeing through Network-Protocol Obfuscation"
 
Yawning Angel
 - [tor-dev] 5th status report for OnioNS
 
Jesse V
 - [tor-dev] 6th status report for OnioNS
 
Jesse V
 - [tor-dev] 7th and last status report for OnioNS
 
Jesse V
 - [tor-dev] [important] sponsors deliverables discussion point for	Wed's meeting
 
Isabela
 - [tor-dev] [important] sponsors deliverables discussion point for Wed's meeting
 
Isabela
 - [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 12, 14:00 UTC in #tor-project
 
Karsten Loesing
 - [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 19, 14:00 UTC in #tor-project
 
Karsten Loesing
 - [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 26, 14:00 UTC in #tor-project
 
Karsten Loesing
 - [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Aug 5, 14:00 UTC in #tor-project
 
Karsten Loesing
 - [tor-dev] [Measurement Team] Next IRC meeting happens on Wednesday, Sep 2, 14:00 UTC in #tor-project
 
Karsten Loesing
 - [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
 
Andreas Stieger
 - [tor-dev] [PATCH] Log malformed hostnames in socks5 request	respecting SafeLogging
 
teor
 - [tor-dev] [PATCH] Log malformed hostnames in socks5 request respecting SafeLogging
 
Andreas Stieger
 - [tor-dev] [PATCH] Log malformed hostnames in socks5 request	respecting SafeLogging
 
teor
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
George Kadianakis
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
l.m
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
s7r
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
s7r
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
l.m
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
s7r
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
l.m
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
teor
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
isis
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
George Kadianakis
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
George Kadianakis
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
l.m
 - [tor-dev] [RFC] On new guard algorithms and data structures
 
Paul Syverson
 - [tor-dev] [Twisted-Python] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy
 
David Stainton
 - [tor-dev] Alpha/Beta/Release cycle
 
tordev123 at Safe-mail.net
 - [tor-dev] bwauths: Are you publishing your output somewhere?
 
nusenu
 - [tor-dev] collector problems since 2015-08-07 18:00?
 
nusenu
 - [tor-dev] collector problems since 2015-08-07 18:00?
 
Tom Ritter
 - [tor-dev] collector problems since 2015-08-07 18:00?
 
nusenu
 - [tor-dev] collector problems since 2015-08-07 18:00?
 
Karsten Loesing
 - [tor-dev] CompCert C compiler
 
Mansour Moufid
 - [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?
 
Steve Snyder
 - [tor-dev] curve25519_donna vs. crypto_scalarmult_curve25519?
 
Yawning Angel
 - [tor-dev] Design for onionsite certification and use with Let's	Encrypt
 
Paul Syverson
 - [tor-dev] Design for onionsite certification and use with Let's Encrypt
 
Paul Syverson
 - [tor-dev] Design for onionsite certification and use with Let's	Encrypt
 
Ben Laurie
 - [tor-dev] Design for onionsite certification and use with Let's	Encrypt
 
Jacob Appelbaum
 - [tor-dev] Donncha's SoP Status Report 7 - Final
 
Donncha O'Cearbhaill
 - [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
 
George Kadianakis
 - [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
 
Ian Goldberg
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor Voting
 
Paul Syverson
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
George Kadianakis
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
George Kadianakis
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
George Kadianakis
 - [tor-dev] Draft Proposal: Random Number Generation During Tor	Voting
 
teor
 - [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if you	hack Tor!
 
Nick Mathewson
 - [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if you hack Tor!
 
Fabio Pietrosanti (naif) - lists
 - [tor-dev] Feature freeze plans for Tor 0.2.7: Please read if	you hack Tor!
 
teor
 - [tor-dev] First release of OnioNS for beta testing
 
Jesse V
 - [tor-dev] First release of OnioNS for beta testing
 
Xinwen Fu
 - [tor-dev] First release of OnioNS for beta testing
 
Jesse V
 - [tor-dev] FSCONS CFP extended
 
tordevmuc at encambio.com
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Paul Syverson
 - [tor-dev] Future Onion Addresses and Human Factors
 
Roger Dingledine
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
David Goulet
 - [tor-dev] Future Onion Addresses and Human Factors
 
bernard
 - [tor-dev] Future Onion Addresses and Human Factors
 
grarpamp
 - [tor-dev] Future Onion Addresses and Human Factors
 
Jeff Burdges
 - [tor-dev] Future Onion Addresses and Human Factors
 
Jeremy Rand
 - [tor-dev] Future Onion Addresses and Human Factors
 
Jeff Burdges
 - [tor-dev] Future Onion Addresses and Human Factors
 
Jeremy Rand
 - [tor-dev] Future Onion Addresses and Human Factors
 
Jeff Burdges
 - [tor-dev] Future Onion Addresses and Human Factors
 
Ben Laurie
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Ben Laurie
 - [tor-dev] Future Onion Addresses and Human Factors
 
Nick Mathewson
 - [tor-dev] Future Onion Addresses and Human Factors
 
Philipp Winter
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
bernard
 - [tor-dev] Future Onion Addresses and Human Factors
 
Philipp Winter
 - [tor-dev] Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] Future Onion Addresses and Human Factors
 
Philipp Winter
 - [tor-dev] Future Onion Addresses and Human Factors
 
grarpamp
 - [tor-dev] Get Stem and zoossh to talk to each other
 
Philipp Winter
 - [tor-dev] Get Stem and zoossh to talk to each other
 
Philipp Winter
 - [tor-dev] Get Stem and zoossh to talk to each other
 
l.m
 - [tor-dev] Get Stem and zoossh to talk to each other
 
Damian Johnson
 - [tor-dev] Get Stem and zoossh to talk to each other
 
tordev123 at Safe-mail.net
 - [tor-dev] Get Stem and zoossh to talk to each other
 
Philipp Winter
 - [tor-dev] Get Stem and zoossh to talk to each other
 
Damian Johnson
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
George Kadianakis
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Jacek Wielemborek
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
George Kadianakis
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Jeff Burdges
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Yawning Angel
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Ian Goldberg
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Adam Shostack
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Yawning Angel
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Jesse V
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
teor
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Yawning Angel
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Jeff Burdges
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Georg Koppen
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Tom Ritter
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
R. Anthony Lomartire
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
Ben Laurie
 - [tor-dev] Hash Visualizations to Protect Against Onion Phishing
 
ncl at cock.li
 - [tor-dev] IMPT -- Re:  Future Onion Addresses and Human Factors
 
Alec Muffett
 - [tor-dev] IMPT -- Re: Future Onion Addresses and Human Factors
 
Nick Mathewson
 - [tor-dev] Invitation to participate in a survey about Tor's future
 
Sue Gardner
 - [tor-dev] Invitation to participate in a survey about Tor's	future
 
teor
 - [tor-dev] Is anyone using tor-fw-helper? (Was Re: BOINC-based Tor wrapper)
 
Yawning Angel
 - [tor-dev] moved from [Tor-censorship-events] Improving the	censorship event detector.
 
l.m
 - [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
 
Joss Wright
 - [tor-dev] moved from [Tor-censorship-events] Improving the	censorship event detector.
 
l.m
 - [tor-dev] moved from [Tor-censorship-events] Improving the censorship event detector.
 
George Danezis
 - [tor-dev] moved from [Tor-censorship-events] Improving the	censorship event detector.
 
l.m
 - [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
 
Karsten Loesing
 - [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
 
nusenu
 - [tor-dev] New Onionoo version 2.6 adds new "alleged_family" and "indirect_family" fields
 
nusenu
 - [tor-dev] Number of directory connections
 
tordev123 at Safe-mail.net
 - [tor-dev] Number of directory connections
 
George Kadianakis
 - [tor-dev] Number of directory connections
 
l.m
 - [tor-dev] Number of directory connections
 
tordev123 at Safe-mail.net
 - [tor-dev] Number of directory connections
 
l.m
 - [tor-dev] Number of directory connections
 
tordev123 at Safe-mail.net
 - [tor-dev] Number of directory connections
 
tordev123 at Safe-mail.net
 - [tor-dev] Number of directory connections
 
Yawning Angel
 - [tor-dev] Number of directory connections
 
tordev123 at Safe-mail.net
 - [tor-dev] patch to improve consensus download decompress performance
 
starlight.2015q3 at binnacle.cx
 - [tor-dev] patch to improve consensus download decompress	performance
 
Tim Wilson-Brown - teor
 - [tor-dev] patch to improve consensus download decompress performance
 
David Fifield
 - [tor-dev] please can haz code review -> Tor-ified Twisted Python HTTP proxy server - txtorhttpproxy
 
David Stainton
 - [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
 
Michael Rogers
 - [tor-dev] Proposal: Merging Hidden Service Directories and	Introduction Points
 
George Kadianakis
 - [tor-dev] Proposal: Merging Hidden Service Directories and Introduction Points
 
s7r
 - [tor-dev] Proposal: Merging Hidden Service Directories and	Introduction Points
 
teor
 - [tor-dev] Proposal: Padding for netflow record resolution reduction
 
Mike Perry
 - [tor-dev] Proposal: Padding for netflow record resolution	reduction
 
Nick Mathewson
 - [tor-dev] Proposal: Padding for netflow record resolution	reduction
 
teor
 - [tor-dev] Relay Dashboard Code Review
 
Damian Johnson
 - [tor-dev] Relay Dashboard Code Review
 
meejah
 - [tor-dev] Relay Dashboard Code Review
 
Damian Johnson
 - [tor-dev] Relay Dashboard Code Review
 
meejah
 - [tor-dev] Relay Dashboard Code Review
 
meejah
 - [tor-dev] Relay Dashboard Code Review
 
Cristobal
 - [tor-dev] Relay Dashboard Code Review
 
teor
 - [tor-dev] Remove NULL checks for *_free() calls
 
Michael McConville
 - [tor-dev] Remove NULL checks for *_free() calls
 
Mansour Moufid
 - [tor-dev] Remove NULL checks for *_free() calls
 
Michael McConville
 - [tor-dev] Remove NULL checks for *_free() calls
 
Andreas Krey
 - [tor-dev] Remove NULL checks for *_free() calls
 
Zack Weinberg
 - [tor-dev] Remove NULL checks for *_free() calls
 
tordev123 at Safe-mail.net
 - [tor-dev] request for advice regarding bug 15901
 
starlight.2015q3 at binnacle.cx
 - [tor-dev] Should cloud-hosted relays be rejected?
 
Philipp Winter
 - [tor-dev] Should cloud-hosted relays be rejected?
 
Tim Wilson-Brown - teor
 - [tor-dev] Should cloud-hosted relays be rejected?
 
nusenu
 - [tor-dev] simple onionoo patch
 
firebrand at ruggedinbox.com
 - [tor-dev] simple onionoo patch
 
Karsten Loesing
 - [tor-dev] Summary of meek's costs, July 2015
 
David Fifield
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] Tor's default behavior for ed25519 identities
 
Nick Mathewson
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] Tor's default behavior for ed25519 identities
 
Nick Mathewson
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] Tor's default behavior for ed25519 identities
 
Nick Mathewson
 - [tor-dev] Tor's default behavior for ed25519 identities
 
s7r
 - [tor-dev] tor's definition of 'median'
 
nusenu
 - [tor-dev] tor's definition of 'median'
 
Nick Mathewson
 - [tor-dev] tor's definition of 'median'
 
Virgil Griffith
 - [tor-dev] tor's definition of 'median'
 
John
 - [tor-dev] tor's definition of 'median'
 
Virgil Griffith
 - [tor-dev] tor's definition of 'median'
 
Maciej Soltysiak
 - [tor-dev] tor's definition of 'median'
 
Andreas Krey
 - [tor-dev] tor's definition of 'median'
 
Virgil Griffith
 - [tor-dev] tor's definition of 'median'
 
nusenu
 - [tor-dev] tor's definition of 'median'
 
Nick Mathewson
 - [tor-dev] tor's definition of 'median'
 
nusenu
 - [tor-dev] tor's definition of 'median'
 
teor
 - [tor-dev] tor's definition of 'median'
 
Sebastian Hahn
 - [tor-dev] tor callgrinds
 
coderman
 - [tor-dev] Triaged some TorCoreTeam201508 tickets; please review
 
Nick Mathewson
 - [tor-dev] Triaged some TorCoreTeam201508 tickets; please review
 
Nick Mathewson
 - [tor-dev] Two new Onionoo versions 2.4 and 2.5 add new "effective_family" and "measured" fields
 
Karsten Loesing
 - [tor-dev] Two new Onionoo versions 2.4 and 2.5 add new "effective_family" and "measured" fields
 
David Fifield
 - [tor-dev] Updated aggregated data served by Metrics
 
Karsten Loesing
 - [tor-dev] Video of my presentation on domain fronting (PETS 2015)
 
David Fifield
 - [tor-dev] Where are the GetTor downloads (e.g. GitHub)?
 
David Fifield
    
 
    
      Last message date: 
       Mon Aug 31 22:58:05 UTC 2015
    Archived on: Mon Aug 31 22:58:27 UTC 2015
    
   
     
     
     This archive was generated by
     Pipermail 0.09 (Mailman edition).