Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'privcount'

  • #1889 defect: Contradictory bandwidth reports in overlapping extra-info descriptors (new)
  • #7281 enhancement: Bandwidth auths should publish average and weighted onionskin failure rates (new)
  • #7509 enhancement: Publish and use circuit success rates in extrainfo descriptors (new)
  • #22422 defect: Add noise to PaddingStatistics (assigned)
  • #22729 defect: Revisit relay read/write history resolution (for onion services) (new)
  • #22955 task: Specify how PrivCount will work with Tor (closed: implemented)
  • #23061 defect: crypto_rand_double() should produce all possible outputs on platforms ... (assigned)
  • #23126 enhancement: HSDirs should publish some count about new-style onion addresses (new)
  • #23147 enhancement: prop288: Merge privcount-in-tor data collector backend implementation (closed: wontfix)
  • #23414 defect: rep_hist_format_hs_stats() should add noise, then round (assigned)
  • #23415 defect: sample_laplace_distribution() should take multiple random inputs (assigned)
  • #23416 enhancement: Document the precision and limits of sample_laplace_distribution() (assigned)
  • #23492 defect: Fix some typos in prop 280 (closed: fixed)
  • #23501 defect: Refactor rep_hist_format_hs_stats() to add noise when counters are ... (assigned)
  • #23523 defect: Handle extreme values better in add_laplace_noise() (assigned)
  • #23573 enhancement: Do we want to close all connections when tor closes? (needs_revision)
  • #25153 task: Specify how PrivCount in Tor statistics are configured and interpreted (assigned)
  • #25381 enhancement: Add crypto_rand_double_sign() in C and Rust (needs_revision)
  • #25669 enhancement: Privcount: blinding and encryption should be finished up (new)
  • #26637 defect: Privcount noise generation implemented and deployed (new)
  • #26904 task: Work out if we need to round scanner measured bandwidths to protect ... (new)
  • #26905 task: Work out if we need to round observed relay bandwidths to protect ... (new)
  • #26939 defect: Privcount blinding and encryption: type fixes (closed: fixed)
  • #26940 defect: Privcount blinding and encryption: doc fixes (closed: fixed)
  • #26941 defect: Privcount blinding and encryption: review dependencies (assigned)
  • #26942 defect: Privcount blinding and encryption: Rust code conventions (closed: fixed)
  • #26943 defect: Privcount blinding and encryption: Safety fixes (closed: fixed)
  • #26944 defect: Privcount blinding and encryption: Add tests (assigned)
  • #26945 defect: Privcount blinding and encryption: always enable i128 (assigned)
  • #26946 defect: Privcount blinding and encryption: warning fixes (closed: fixed)
  • #26953 defect: Privcount blinding and encryption: add travis CI (closed: fixed)
  • #26955 defect: Privcount blinding and encryption: rustfmt (closed: implemented)
  • #26956 defect: Privcount blinding and encryption: deny warnings (closed: implemented)
  • #26957 defect: Privcount blinding and encryption: Derive copy and debug where possible (assigned)
  • #26958 defect: Privcount blinding and encryption: run clippy on travis rust nightly (needs_revision)
  • #26970 task: Privcount: plan the modules and components (assigned)
  • #26973 defect: Privcount blinding and encryption: add rustfmt CI check (closed: implemented)
  • #27162 enhancement: Travis: consider running CI on beta, nightly, and tor's lowest ... (assigned)
  • #27906 defect: PrivCount noise specification (assigned)
  • #27907 enhancement: PrivCount config and version spec (new)
  • #27908 task: PrivCount proof of concept with existing statistics (new)
  • #29004 enhancement: PrivCount proof of concept: implement check counters (new)
  • #29005 enhancement: PrivCount proof of concept: implement consumed bandwidth counters (new)
  • #29006 enhancement: PrivCount proof of concept: add noise to counters (assigned)
  • #29007 enhancement: PrivCount proof of concept: implement debugging for PrivCount (assigned)
  • #29008 enhancement: PrivCount proof of concept: add a PrivCount module, torrc option, and ... (assigned)
  • #29009 enhancement: PrivCount proof of concept: use blinding and Shamir secret sharing (new)
  • #29010 enhancement: PrivCount proof of concept: work out how to do CI for PrivCount using ... (new)
  • #29011 enhancement: PrivCount proof of concept: work out how to do integration testing ... (closed: wontfix)
  • #29018 enhancement: Make all statistics depend on ExtraInfoStatistics (closed: fixed)
  • #29019 enhancement: Make relays report bandwidth usage more often in test networks (needs_revision)
  • #29027 enhancement: PrivCount proof of concept: put the PrivCount statistics in a stats/ file (assigned)
  • #29129 defect: PrivCount proof of concept: decide if we want to remove bandwidth ... (new)
  • #29131 enhancement: Split rephist.c into modules for each type of statistic (new)
  • #29261 enhancement: Create consensus parameters to turn off all stats and individual stats (new)
  • #29264 task: Create a libprivcount repository containing a rust crate (new)
  • #29265 enhancement: PrivCount proof of concept: Re-implement the C code in Rust (new)
  • #29266 enhancement: PrivCount proof of concept: round results to hide usage over time (new)
  • #29268 enhancement: PrivCount proof of concept: Use the subsystems API for PrivCount (new)
  • #29270 enhancement: Work out the config and control interfaces to PrivCount (new)
  • #29271 enhancement: PrivCount proof of concept: use pubsub for events that PrivCount cares ... (new)
  • #29317 enhancement: Protect heartbeat logs using PrivCount (new)