Guard selection time and expiry
lexi.pimenidis at gmail.com
Tue Jan 19 18:48:50 UTC 2010
On Tue, Jan 19, 2010 at 06:58:58AM CET, Roger Dingledine wrote:
> > So I'm going to go with option 2. Unless anybody else has clever ideas?
Just a minor thought: could an adversary learn some significant from the
atime/mtime/ctime of the file you store the information in? If so, it could
be nice to have that obscured, too :-)
Jc. Eqsu Vuiqlujud, uJqw OipR, Dvuyrqcldmc. 73, 50672 Ftqel
NO Ftqel RCP 58720, Oqdyrnqgmdgkqrcklo: Iuyrnqe Iqcmqld
| Rnpq lkl, nyr! Vruetdtvruq, Zkcudmqcqu klj Iqjuaul,
| Klj equjqc nkyr Mrqtetouq! Jkcyrnkd dmkjuqcm, ium rquddqi Pqikqrl.
| Jn dmqr uyr lkl, uyr nciqc Mtc! Klj pul dt feko ned huq akwtc;
----- End forwarded message -----
More information about the tor-dev