Mail Index
- Re: [tor-dev] Two major improvements to the Tor Metrics back-end
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Go version in Gitian descriptors
- [tor-dev] Summary of meek's costs, December 2015
- Re: [tor-dev] Summary of meek's costs, December 2015
- Re: [tor-dev] Summary of meek's costs, December 2015
- [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] Questions about censorship detection paper
- Re: [tor-dev] Questions about censorship detection paper
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- [tor-dev] Does Orbot use default obfs4 bridges?
- Re: [tor-dev] Does Orbot use default obfs4 bridges?
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Two major improvements to the Tor Metrics back-end
- Re: [tor-dev] Needs Code Review: Shared Randomness Generation for Tor
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- [tor-dev] Entry/Exit node selection
- Re: [tor-dev] Entry/Exit node selection
- [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- From: Fabio Pietrosanti (naif) - lists
- Re: [tor-dev] tor-dev Digest, Vol 60, Issue 2
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Always up-to-date HSTS preload list for Tor?
- [tor-dev] Needs Code Review: Shared Randomness Generation for Tor
- [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- [tor-dev] Notes from 1st Tor proposal reading group [prop241, prop247, prop259]
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- [tor-dev] Getting people started on guard selection algorithms [prop259]
- [tor-dev] Notes from 3rd Tor proposal reading group [prop250]
- [tor-dev] [Win32] test_util.c + test_checkdir.c
- [tor-dev] ENGINE_get_default_ECDx missing?
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Tor Control Protocol: multiple commands in a single line possible?
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- Re: [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] trac account 'proper' - Full Disclosure
- Re: [tor-dev] Go version in Gitian descriptors
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Does Orbot use default obfs4 bridges?
- Re: [tor-dev] Getting people started on guard selection algorithms [prop259]
- [tor-dev] Always up-to-date HSTS preload list for Tor?
- [tor-dev] Go version in Gitian descriptors
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Summary of meek's costs, December 2015
- Re: [tor-dev] Summary of meek's costs, December 2015
- Re: [tor-dev] Summary of meek's costs, December 2015
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- [tor-dev] Questions about censorship detection paper
- Re: [tor-dev] Questions about censorship detection paper
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- [tor-dev] Two major improvements to the Tor Metrics back-end
- Re: [tor-dev] Two major improvements to the Tor Metrics back-end
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- [tor-dev] Upcoming Onionoo version 3.1 removes "family" field from details and stops returning code 500 when serving stale data
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Upcoming Onionoo version 3.1 removes "family" field from details and stops returning code 500 when serving stale data
- Re: [tor-dev] Should we disable the collection of some stats published in extra-infos?
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Tor Control Protocol: multiple commands in a single line possible?
- [tor-dev] txtorcon: ipaddress instead of ipaddr?
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- [tor-dev] Applications Team meeting today (Tuesday Jan 5) 19:00 UTC
- Re: [tor-dev] Proposal 247 (Hidden Service Vanguards) Overhaul
- [tor-dev] Proposal: Load Balancing with Overhead Parameters
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Notes from 1st Tor proposal reading group [prop241, prop247, prop259]
- [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- [tor-dev] Proposal 251 (netflow padding) meeting logs, minutes, and action items
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal 247: Alternate Path Lengths
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- Re: [tor-dev] Fwd: Orbot roadmap feedback
- [tor-dev] Fwd: Orbot 15.1.0-RC-1
- Re: [tor-dev] Does Orbot use default obfs4 bridges?
- Re: [tor-dev] Does Orbot use default obfs4 bridges?
- Re: [tor-dev] Release: obfs4proxy-0.0.6
- [tor-dev] Fwd: Orbot v15.1.0-RC-4
- [tor-dev] Fwd: [guardian-dev] RC-7 is out - try to repro? Re: towards reproducible Orbot
- Re: [tor-dev] Fwd: [guardian-dev] RC-7 is out - try to repro? Re: towards reproducible Orbot
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- [tor-dev] Oops / Re: Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- [tor-dev] Proposal 264: Putting version numbers on the Tor subprotocols
- [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- Re: [tor-dev] Proposal 247 (Hidden Service Vanguards) Overhaul
- Re: [tor-dev] Propsal 263 Quantum-safe Hybrid handshake for Tor, updated feature request
- [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- [tor-dev] Moving prop#250 discussion meeting to Tuesday, 1600 UTC
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- [tor-dev] Tor not affected by recent openssl security advisories
- Re: [tor-dev] Tor metrics: Questionable relays-by-platform accounting
- [tor-dev] SyslogIdentityTag considered to be backported to 0.2.7?
- [tor-dev] trac account 'proper' - Full Disclosure
- [tor-dev] Tor Control Protocol: multiple commands in a single line possible?
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Notes from 1st Tor proposal reading group [prop241, prop247, prop259]
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- Re: [tor-dev] Comparing Stem, metrics-lib, and zoossh
- [tor-dev] Transparent proxying: automagically add firewall rules
- Re: [tor-dev] ENGINE_get_default_ECDx missing?
- [tor-dev] New Shadow versions now available
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- From: Sebastian G. <bastik.tor>
- [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- [tor-dev] Fwd: Need to know if this is a bug
- [tor-dev] Quantum-safe Hybrid handshake for Tor
- [tor-dev] Fwd: Orbot roadmap feedback
- [tor-dev] Fwd: Orbot roadmap feedback
- [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- [tor-dev] Entry/Exit node selection
- [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- [tor-dev] Entry/Exit node selection
- [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- Re: [tor-dev] Go version in Gitian descriptors
- Re: [tor-dev] Tor not affected by recent openssl security advisories
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Go version in Gitian descriptors
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] [Win32] test_util.c + test_checkdir.c
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Much-revised draft, RFC: removing current obsolete clients from the network
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal 264: Putting version numbers on the Tor subprotocols
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Needs Code Review: Shared Randomness Generation for Tor
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Needs Code Review: Shared Randomness Generation for Tor
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Revisiting Proposal 246: Merging Hidden Service Directories and Introduction Points
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Entry/Exit node selection
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Notes from 1st Tor proposal reading group [prop241, prop247, prop259]
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal xxx: Filtering malicious rendezvous points at hidden service server side
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposals should have reviews. Let's make sure that happens. Here's a schedule.
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Need to know if this is a bug
- From: Tim Wilson-Brown - teor
- Re: [tor-dev] Proposal: Load Balancing with Overhead Parameters
- From: Tim Wilson-Brown - teor
- [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Tor Control Protocol: multiple commands in a single line possible?
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] Proposal: Stop giving Exit flags when only unencrypted traffic can exit
- Re: [tor-dev] How many exits exit from an IP address different than their OR address? (10.7%)
- [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- Re: [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- Re: [tor-dev] Fwd: [guardian-dev] RC-7 is out - try to repro? Re: towards reproducible Orbot
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] Transparent proxying: automagically add firewall rules
- Re: [tor-dev] ENGINE_get_default_ECDx missing?
- Re: [tor-dev] Entry/Exit node selection
- Re: [tor-dev] Entry/Exit node selection
- Re: [tor-dev] Is it possible to specify voluntary delays in my Tor client?
- Re: [tor-dev] SyslogIdentityTag considered to be backported to 0.2.7?
- [tor-dev] Release: obfs4proxy-0.0.6
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Introducing Snowflake (webrtc pt)
- Re: [tor-dev] Tor not affected by recent openssl security advisories
- Re: [tor-dev] Tor not affected by recent openssl security advisories
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- Re: [tor-dev] tor-dev Digest, Vol 60, Issue 2
- Re: [tor-dev] Quantum-safe Hybrid handshake for Tor
- [tor-dev] Propsal 263 Quantum-safe Hybrid handshake for Tor, updated feature request
Mail converted by MHonArc