[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Programming language for anonymity network
- To: tor-talk@xxxxxxxxxxxxxxxxxxxx, p2p-hackers@xxxxxxxxxxxxxxx, liberationtech@xxxxxxxxxxxxxxxxxx, cpunks <cypherpunks@xxxxxxxxxx>
- Subject: [tor-talk] Programming language for anonymity network
- From: Stevens Le Blond <stevens@xxxxxxxxxxx>
- Date: Fri, 18 Apr 2014 10:26:37 +0200
- Cc: wonko@xxxxxxxxxxx, Peter Druschel <druschel@xxxxxxxxxxx>, Dave Choffnes <choffnes@xxxxxxxxxxx>, Nicholas Merritt <nmerritt@xxxxxxxxxxx>
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Fri, 18 Apr 2014 04:41:50 -0400
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=mpi-sws.org; s=mail200803; h=Content-Type:Subject:CC:To:MIME-Version:From:Date:Message-ID; bh=Kb10M7IyXCazodR4ZIgAFcA8cd74COKrTREBqx33CL8=; b=VIH6giMmi4YwrPS2XKNF7qBDJNnNfhnXi1a2i/W8MFllAH24M9MCiz6lM7TLG/Q0W15QSdpwc1HSg6k2qCafsEQUUz5QASmHcSHEj2bAxnQ7j0s/Z0WS78iuLsjxV3iYjUAU0Snl2wUkGKNEKB+gXq2DAZkGTguIJKqSEHoPz9I=;
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:tor-talk@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.16) Gecko/20121215 Icedove/3.0.11
Hello,
We are a team of researchers working on the design and implementation of
a traffic-analysis resistant anonymity network and we would like to
request your opinion regarding the choice of a programming language /
environment. Here are the criteria:
1) Familiarity: The language should be familiar or easy to learn for
most potential contributors, as we hope to build a diverse community
that builds on and contributes to the code.
2) Maturity: The language implementation, tool chain and libraries
should be mature enough to support a production system.
3) Language security: The language should minimize the risk of security
relevant bugs like buffer overflows.
4) Security of runtime / tool chain: It should be hard to
inconspicuously backdoor the tool chain and, if applicable, runtime
environments.
To give two concrete examples:
Using the C language + deterministic builds is an attractive option with
respect to 1), 2) and 4), but doesn’t provide much regarding 3).
Java does better with respect to 3), however, it trades some of 3) and
4) as compared to C. Specifically, we are concerned that large runtimes
may be difficult to audit. A similar argument may apply to other
interpreted languages.
Given these criteria, what language would you choose and for what
reasons? We would also appreciate feedback regarding our criteria.
All the best,
David, Nick, Peter, Stevens, and William
Attachment:
signature.asc
Description: OpenPGP digital signature
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk