Robert Ransom commited on 2011-03-29 23:17:33
              Zeige 3 geänderte Dateien mit 4 Einfügungen und 4 Löschungen.
            
| ... | ... | 
                      @@ -1307,7 +1307,7 @@ the same geographic location.  | 
                  
| 1307 | 1307 | 
                        <li>If you're running a fast relay, meaning you have many TLS connections  | 
                    
| 1308 | 1308 | 
                        open, you are probably losing a lot of memory to OpenSSL's internal  | 
                    
| 1309 | 1309 | 
                        buffers (38KB+ per socket). We've patched OpenSSL to <a  | 
                    
| 1310 | 
                        - href="http://archives.seul.org/or/dev/Jun-2008/msg00001.html">release  | 
                    |
| 1310 | 
                        + href="https://lists.torproject.org/pipermail/tor-dev/2008-June/001519.html">release  | 
                    |
| 1311 | 1311 | 
                        unused buffer memory more aggressively</a>. If you update to OpenSSL  | 
                    
| 1312 | 1312 | 
                        1.0.0-beta5, Tor's build process will automatically recognize and use  | 
                    
| 1313 | 1313 | 
                        this feature.</li>  | 
                    
| ... | ... | 
                      @@ -146,7 +146,7 @@ the United States too.</p>  | 
                  
| 146 | 146 | 
                        and help set a clear legal precedent establishing that merely running  | 
                    
| 147 | 147 | 
                        a node does not create copyright liability for either node operators  | 
                    
| 148 | 148 | 
                        or their bandwidth providers. If you want to be the EFF's test case,  | 
                    
| 149 | 
                        -<a href="http://archives.seul.org/or/talk/Oct-2005/msg00208.html">read  | 
                    |
| 149 | 
                        +<a href="https://lists.torproject.org/pipermail/tor-talk/2005-October/016301.html">read  | 
                    |
| 150 | 150 | 
                        more here</a>.</p>  | 
                    
| 151 | 151 | 
                         | 
                    
| 152 | 152 | 
                        <a id="ExitSnooping"></a>  | 
                    
| ... | ... | 
                      @@ -724,8 +724,8 @@ meetings around the world.</li>  | 
                  
| 724 | 724 | 
                        addresses and algorithms for gathering and blocking them. See <a  | 
                    
| 725 | 725 | 
                        href="<blog>bridge-distribution-strategies">our  | 
                    
| 726 | 726 | 
                        blog post on the topic</a> as an overview, and then look at <a  | 
                    
| 727 | 
                        - href="http://archives.seul.org/or/dev/Dec-2009/msg00000.html">Roger's  | 
                    |
| 728 | 
                        - or-dev post</a> from December for more recent thoughts — lots of  | 
                    |
| 727 | 
                        + href="https://lists.torproject.org/pipermail/tor-dev/2009-December/000666.html">Roger's  | 
                    |
| 728 | 
                        + or-dev post</a> from December 2009 for more recent thoughts — lots of  | 
                    |
| 729 | 729 | 
                        design work remains.</p>  | 
                    
| 730 | 730 | 
                        <p>If you want to get more into the guts of Tor itself (C), a more minor problem  | 
                    
| 731 | 731 | 
                        we should address is that current Tors can only listen on a single  | 
                    
| 732 | 732 |