Date: Thu, 20 Mar 2014 07:22:04 -0700 From: coderman <coderman@...il.com> To: oss-security@...ts.openwall.com Subject: Re: FD mailing list died. Time for new one (or something better!) Q: "Onions are fragile and sporadically un-available." A: that's not a question ;) see also <lots of Tor trac numbers here> Q: ".. How do faster soliderer onions?" A: glad you asked, earth human! for a limited time only!! [ ... shipping and handling not included, ... ] + with consensus, namecoin to a set of consistent or rotating onion URIs + concurrent hidden service endpoints to map addresses aggressively + concurrent ipv4 or ipv6 addrspaces to hidden web services on TCP/DNS + including those discussed built on multi-homed stream transports to the mapped endpoints Q: "How do you trust shady ipv4, ipv6, openssl, zlib, libevent, http, smtp, wtfp web attack surface?" A: clearly you should not. a legit op accrues pwn pot as show of good faith... [swelling pool of shadydogecoins for great justice!] Q: "Where is it?" A: ,, hah! almost got me! .. i know nothing. [ i hear the gruqq awaits to check your opsec at the subscreen? i was hallucinating. there were squirrels... ] Q: "Can this veer any further off-topic?" A: you're no exile from zeroed list, are you :P PS: the sooner someone leaks the bootstrap to hidden fuller disclosure the sooner i can take this tangent back apropos *grin* Q: "If I show you my digests will you show me yours teehee?" A: sure; builds ~200-500min - afford your patience accordingly. (builders shamelessly solicited) --- > a modest and proportionate proposal, > > fuller-disclosure:...
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ