On Wed, Aug 20, 2014 at 9:41 PM, Moritz Bartl wrote:
> On 08/20/2014 06:15 AM, Virgil Griffith wrote:
> > For whatever it's worth I was going to suggest migrating the shirts to
> > Hanes Beefy Ts.
>
> http://ethixmerch.com/content/anvil-gildan-and-hanes
Thanks for the link, really interesting.
Roadmap aimed for the first, "alpha, no OTR", versions to be done by
March 31, 2014.
https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/notes/RoadmapTIMB
The Daily Dot wrote "so TIMB can have its first release in July".
http://www.dailydot.com/technology/tor-instant-
Hi,
We have placed MKRAND - A Digital Random Bit Generator, on GitHub, and it
would be helpful to receive some feedback regarding its potential use in
the TOR project.
This RBG does not use mathematical methods, and thus does not suffer from
wraparound issues or dependency on ALU architectures.
Is there a paper available for the algorithm?
On Thu, Aug 21, 2014 at 2:35 PM, Mark Knight wrote:
> Hi,
>
> We have placed MKRAND - A Digital Random Bit Generator, on GitHub, and it
> would be helpful to receive some feedback regarding its potential use in
> the TOR project.
>
> This RBG does no
> We have placed MKRAND - A Digital Random Bit Generator, on GitHub, and it
> would be helpful to receive some feedback regarding its potential use in
> the TOR project.
What benefit would it give? What would it replace? This seems to me to
solve a problem that has already solved, but in an obfusc
> After using Tor for some years I realized that third-parties can determine
> what sites I visit when watching my internet activity.
What do you mean by third-parties?
> When I visit hidden services how can they know what site it is or know what
> site I visit that's not on Tor?
Why do you