- Mar 05, 2015
-
-
Alex authored
-
- Feb 05, 2015
-
-
akwizgran authored
-
- Jan 30, 2015
-
-
akwizgran authored
-
- Jan 29, 2015
-
-
akwizgran authored
-
- Jan 28, 2015
-
-
akwizgran authored
-
- Jan 14, 2015
- Jan 07, 2015
-
-
Abraham Kiggundu authored
bug#49 Fixed by ensuring that intents for different contacts/groups can be distinguished from each other when resolving PendingIntent refs
-
- Jan 05, 2015
-
-
akwizgran authored
-
- Dec 29, 2014
-
-
akwizgran authored
1. The things we're really trying to protect - contact identities, message contents, etc - can't be erased from memory because they're encapsulated inside objects we don't control. 2. Long-term secrets can't be protected by erasing them from memory because they're stored in the database and the database key has to be held in memory whenever the app's running. 3. If the runtime uses a compacting garbage collector then we have no way to ensure an object is erased from memory. 4. Trying to erase secrets from memory makes the code more complex. Conclusion: Let's not try to protect secrets from an attacker who can read arbitrary memory locations.
-
- Dec 26, 2014
-
-
Abraham Kiggundu authored
-
Abraham Kiggundu authored
- replaced use of Object instance mutex with a private final Lock object - replaced Object signaling with specific condition signalling
-
- Dec 14, 2014
- Dec 13, 2014
-
-
akwizgran authored
DuplexOutgoingSession flushes its output stream if it's idle for a transport-defined interval, causing an empty frame to be sent. The TCP and Tor plugins use a socket timeout equal to twice the idle interval to detect dead connections. See bugs #27, #46 and #60.
-
- Dec 05, 2014
- Nov 09, 2014
-
-
akwizgran authored
-
- Nov 05, 2014
-
-
akwizgran authored
-
- Nov 04, 2014
- Oct 29, 2014
-
-
akwizgran authored
-
- Oct 08, 2014
-
-
akwizgran authored
-
- Oct 07, 2014
-
-
akwizgran authored
This should make it easier for people to build the project with a freshly downloaded ADT Bundle.
-
- Oct 06, 2014
-
-
akwizgran authored
Two changes have been made to Tor: 1. Set can_complete_circuit to false when the network is disabled, and don't try to build introduction circuits while can_complete_circuit is false. This avoids a situation where Tor tries to build introduction circuits as soon as the network is re-enabled, all the circuits fail, and then Tor waits 5 minutes before trying to build more. 2. Added a FORGETHS command to the control protocol which clears any cached client state relating to a specified hidden service. This can be used to flush state that's likely to be stale before trying to connect to a hidden service with an unstable network connection. Support for the FORGETHS command was also added to jtorctl.
-
- Oct 03, 2014
- Oct 02, 2014
-
-
akwizgran authored
We don't need two separate executors for long-running IO threads.
-
- Jul 08, 2014
-
-
akwizgran authored
Tor has a controller command, TAKEOWNERSHIP, and a configuration option, __OwningControllerProcess, that work together to ensure Tor shuts down when the controlling process dies and/or disconnects from the control port. By using them we can avoid creating runaway Tor processes that have to be killed with hacks.
-
- Jul 04, 2014
-
-
akwizgran authored
-
- Jul 02, 2014
-
-
akwizgran authored
-
- Jun 05, 2014
- May 14, 2014
-
-
akwizgran authored
Patched jtorctl to pass more information about circuit events to the controller to help us debug connection problems.
-
- May 09, 2014