Thank Toy very much for your response. Regarding the Tor's source code I have many questions:
1- how can I download the latest stable release. I found the link for source code bust I couldn't figure out which is the latest and how to download the latest release. 2- Is there any detailed documentation for Tor's source code in order to understand it and be able to maintain it. 3- Is the Tor plug-in used with Shadow simulator updated and implementing all processes done by Tor. Thanks, Suhaib Mbarak On 12 June 2017 at 07:00, <tor-talk-requ...@lists.torproject.org> wrote: > Send tor-talk mailing list submissions to > tor-talk@lists.torproject.org > > To subscribe or unsubscribe via the World Wide Web, visit > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > or, via email, send a message with subject or body 'help' to > tor-talk-requ...@lists.torproject.org > > You can reach the person managing the list at > tor-talk-ow...@lists.torproject.org > > When replying, please edit your Subject line so it is more specific > than "Re: Contents of tor-talk digest..." > > > Today's Topics: > > 1. Re: tor-talk Digest, Vol 77, Issue 11 (Suhaib Mbarak) > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Mon, 12 Jun 2017 02:55:58 -0500 > From: Suhaib Mbarak <suhaib.om...@gmail.com> > To: tor-talk@lists.torproject.org > Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 11 > Message-ID: > <CAL+9+aYNxHO5hRixhmH3zgirmDNoy=94Snq > qumffpm7gvte...@mail.gmail.com> > Content-Type: text/plain; charset="UTF-8" > > Thank Toy very much for your response. > > Regarding the Tor's source code I have many questions: > > 1- how can I download the latest stable release. I found the link for > source code bust I couldn't figure out which is the latest and how to > download the latest release. > > 2- Is there any detailed documentation for Tor's source code in order to > understand it and be able to maintain it. > > 3- Is the Tor plug-in used with Shadow simulator updated and implementing > all processes done by Tor. > > Thanks, > Suhaib Mbarak > > On 9 June 2017 at 07:00, <tor-talk-requ...@lists.torproject.org> wrote: > > > Send tor-talk mailing list submissions to > > tor-talk@lists.torproject.org > > > > To subscribe or unsubscribe via the World Wide Web, visit > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > or, via email, send a message with subject or body 'help' to > > tor-talk-requ...@lists.torproject.org > > > > You can reach the person managing the list at > > tor-talk-ow...@lists.torproject.org > > > > When replying, please edit your Subject line so it is more specific > > than "Re: Contents of tor-talk digest..." > > > > > > Today's Topics: > > > > 1. Re: tor-talk Digest, Vol 77, Issue 9 (Seth David Schoen) > > > > > > ---------------------------------------------------------------------- > > > > Message: 1 > > Date: Thu, 8 Jun 2017 16:59:40 -0700 > > From: Seth David Schoen <sch...@eff.org> > > To: tor-talk@lists.torproject.org > > Subject: Re: [tor-talk] tor-talk Digest, Vol 77, Issue 9 > > Message-ID: <20170608235940.GI2963@demorgan> > > Content-Type: text/plain; charset=us-ascii > > > > Suhaib Mbarak writes: > > > > > I'm a master student and doing some researches on TOR . I'm using > shadow > > > simulator; not real tor network; my goal is only to run an experiment > and > > > from the output of that experiment I can confess my students that Tor > > > really : [...] > > > > It seems to me that one useful possibility is to modify the Tor client so > > that it outputs logs of the decisions it makes and the actions it takes, > > as well as, maybe, the cryptographic secrets that it uses. For example, > > your modified Tor client could print out how it chose a path, and the > > actions that it took to build the path, and the actual encryption keys > > that it used in communicating with the nodes along the path. > > > > You could then also use a packet sniffer (or some mechanism for packet > > capture if your network is totally virtual) to examine the actual > > traffic in your simulated network, and, for example, to decrypt it using > > the keys that were logged by the modified client, showing exactly what > > information can be seen by someone in possession of each secret key, and > > conversely which keys are necessary in order to learn which information. > > > > -- > > Seth Schoen <sch...@eff.org> > > Senior Staff Technologist https://www.eff.org/ > > Electronic Frontier Foundation https://www.eff.org/join > > 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107 > > > > > > ------------------------------ > > > > Subject: Digest Footer > > > > _______________________________________________ > > tor-talk mailing list > > tor-talk@lists.torproject.org > > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > > > > ------------------------------ > > > > End of tor-talk Digest, Vol 77, Issue 11 > > **************************************** > > > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > > > ------------------------------ > > End of tor-talk Digest, Vol 77, Issue 12 > **************************************** > -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk