[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor's source code



Thank Toy very much for your response.

Regarding the Tor's source code I have many questions:

1- how can I download the latest stable release. I found the link for
source code bust I couldn't figure out which is the latest and how to
download the latest release.

2- Is there any detailed documentation for Tor's source code in order to
understand it and be able to maintain it.

3- Is the Tor plug-in used with Shadow simulator updated and implementing
all processes done by Tor.

Thanks,
Suhaib Mbarak

On 12 June 2017 at 07:00, <tor-talk-request@xxxxxxxxxxxxxxxxxxxx> wrote:

> Send tor-talk mailing list submissions to
>         tor-talk@xxxxxxxxxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> or, via email, send a message with subject or body 'help' to
>         tor-talk-request@xxxxxxxxxxxxxxxxxxxx
>
> You can reach the person managing the list at
>         tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of tor-talk digest..."
>
>
> Today's Topics:
>
>    1. Re: tor-talk Digest, Vol 77, Issue 11 (Suhaib Mbarak)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Mon, 12 Jun 2017 02:55:58 -0500
> From: Suhaib Mbarak <suhaib.omari@xxxxxxxxx>
> To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 11
> Message-ID:
>         <CAL+9+aYNxHO5hRixhmH3zgirmDNoy=94Snq
> qumFfpm7GvTeUnQ@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset="UTF-8"
>
> Thank Toy very much for your response.
>
> Regarding the Tor's source code I have many questions:
>
> 1- how can I download the latest stable release. I found the link for
> source code bust I couldn't figure out which is the latest and how to
> download the latest release.
>
> 2- Is there any detailed documentation for Tor's source code in order to
> understand it and be able to maintain it.
>
> 3- Is the Tor plug-in used with Shadow simulator updated and implementing
> all processes done by Tor.
>
> Thanks,
> Suhaib Mbarak
>
> On 9 June 2017 at 07:00, <tor-talk-request@xxxxxxxxxxxxxxxxxxxx> wrote:
>
> > Send tor-talk mailing list submissions to
> >         tor-talk@xxxxxxxxxxxxxxxxxxxx
> >
> > To subscribe or unsubscribe via the World Wide Web, visit
> >         https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> > or, via email, send a message with subject or body 'help' to
> >         tor-talk-request@xxxxxxxxxxxxxxxxxxxx
> >
> > You can reach the person managing the list at
> >         tor-talk-owner@xxxxxxxxxxxxxxxxxxxx
> >
> > When replying, please edit your Subject line so it is more specific
> > than "Re: Contents of tor-talk digest..."
> >
> >
> > Today's Topics:
> >
> >    1. Re: tor-talk Digest, Vol 77, Issue 9 (Seth David Schoen)
> >
> >
> > ----------------------------------------------------------------------
> >
> > Message: 1
> > Date: Thu, 8 Jun 2017 16:59:40 -0700
> > From: Seth David Schoen <schoen@xxxxxxx>
> > To: tor-talk@xxxxxxxxxxxxxxxxxxxx
> > Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 9
> > Message-ID: <20170608235940.GI2963@demorgan>
> > Content-Type: text/plain; charset=us-ascii
> >
> > Suhaib Mbarak writes:
> >
> > > I'm a master student and doing some researches on TOR . I'm using
> shadow
> > > simulator; not real tor network; my goal is only to run an experiment
> and
> > > from the output of that experiment I can confess my students that Tor
> > > really : [...]
> >
> > It seems to me that one useful possibility is to modify the Tor client so
> > that it outputs logs of the decisions it makes and the actions it takes,
> > as well as, maybe, the cryptographic secrets that it uses.  For example,
> > your modified Tor client could print out how it chose a path, and the
> > actions that it took to build the path, and the actual encryption keys
> > that it used in communicating with the nodes along the path.
> >
> > You could then also use a packet sniffer (or some mechanism for packet
> > capture if your network is totally virtual) to examine the actual
> > traffic in your simulated network, and, for example, to decrypt it using
> > the keys that were logged by the modified client, showing exactly what
> > information can be seen by someone in possession of each secret key, and
> > conversely which keys are necessary in order to learn which information.
> >
> > --
> > Seth Schoen  <schoen@xxxxxxx>
> > Senior Staff Technologist                       https://www.eff.org/
> > Electronic Frontier Foundation                  https://www.eff.org/join
> > 815 Eddy Street, San Francisco, CA  94109       +1 415 436 9333 x107
> >
> >
> > ------------------------------
> >
> > Subject: Digest Footer
> >
> > _______________________________________________
> > tor-talk mailing list
> > tor-talk@xxxxxxxxxxxxxxxxxxxx
> > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
> >
> >
> > ------------------------------
> >
> > End of tor-talk Digest, Vol 77, Issue 11
> > ****************************************
> >
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> tor-talk mailing list
> tor-talk@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
>
> ------------------------------
>
> End of tor-talk Digest, Vol 77, Issue 12
> ****************************************
>
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk