- The position is remote and may take place in any location of the intern's choice. (Optionally, you're welcome to arrange with your mentor(s) to work in person, but we cannot allocate funds towards travel expenses at this time.)
- It is not necessary to be (or have been) a student to apply.
- If you are unable to provide code, please, in the $LANGUAGE you are choosing to do the project in, write a SOCKS5 (RFC 1928) proxy which (assuming there is no encryption, non-trivial encodings, or compression on the underlying protocol being transported, e.g. the underlying protocol is plaintext HTTP requests or something similar), upon receiving a connection from a client, rewrites the destination's response to change all gendered pronouns to those of some other gender. Your sample code should:
- Compile and/or run without errors;
- Demonstrate an ability to write networking code;
- Demonstrate the ability to do text manipulation in a safe and efficient manner;
- Show an understanding of how a basic proxy application functions;
- It is entirely permissible to use libraries to achieve the goal. For the blocking and asynchronous settings respectively, in Rust one might look at rust-socks or socks5-rs, and pysocks5 or txsocksx for Python.
- If you are unable to provide code, please, in the $LANGUAGE you are choosing to do the project in, write a SOCKS5 (RFC 1928) proxy which (assuming there is no encryption, non-trivial encodings, or compression on the underlying protocol being transported, e.g. the underlying protocol is plaintext HTTP requests or something similar), upon receiving a connection from a client, rewrites the destination's response to change all gendered pronouns to those of some other gender. Your sample code should:
Join the discussion...
Can I ask: What is the…
Can I ask: What is the status of pluggable transports in China? Which ones are known to work by default?
Yes, high school students…
Yes, high school students are welcome! I've edited the post to say that it's not necessary to be (or have been) a student to apply.
What does "$LANGUAGE" mean,…
What does "$LANGUAGE" mean, and why the "$" sign, please?
Object-oriented languages like C/C++ (I guess)?!
It is a reference to…
It is a reference to variables in many common scripting languages.
I guess it is also a signal for the sort of person they are hoping to attract for this spot. :)
Thank you arma,…
Thank you arma,
"$LANGUAGE" probably meant "scripting languages", as you said about the common reference. I actually dug around: found no clue. Even asked Larry Page multiple times: no answer! Oops!
Hahaha... I was talking to…
Hahaha... I was talking to Roger Dingledine!
And by editing the post, Isis Agora Lovecruft (the hacker, physicist, FBI wanted, among many other things for sure) has just cast another cloud over "what $LANGUAGE meant" again, btw!!! I -- surely am -- not sure what it meant now: other languages similar to Python/Rush or scripting languages or something else. It's w/e anyways! xD
Is it possible for non…
Is it possible for non-students (e.g. graduated in 2015) to apply? Thanks
Not for students only, I…
Not for students only, I believe.
Great question about the deadline -- I'll wait for Isis to answer that one.
I suspect the answer is …
I suspect the answer is "This is about getting the task done, so thinking about it in terms of hours per week is the wrong question. How long will it take you to do the task?"
Yes, arma is correct here…
Yes, arma is correct here. This is basically a small contract to do a task. If you can get it done by working one day per week, that's great! However, it's also perfectly fine if you need to take more time to learn/try things along the way.
When launching Tor,…
When launching Tor, sometimes the IP 199.254.238.52 shows up as ESTABLISHED. I don't know why or how, because the IP is no longer listed anywhere on current lists and local cache. I know 199.254.238.53 exists and is legit, but why is 199.254.238.52 showing up?
You are really off-topic for…
You are really off-topic for this post.
But the answer is that longclaw, one of the directory authorities, has the .52 address hard-coded in the Tor client. You can find it in src/or/config.c.
"You are really off-topic…
"You are really off-topic for this post."
Yet you kindly responded with the solution. Thank you.
is it relevant to involve a…
is it relevant to involve a study about censorship/ddosspartner/joint-venture ?
i mean that i access secure service using Tor and the relay look like compromised if the service (e-mail provider e.g.) has a partnership with ddoss protection compagny (israeli/military e.u, nsa) so should it be possible to implement a switch-function balancing/dropping/cutting the connection in case of corruption ?
I'm not sure I understand…
I'm not sure I understand what you're asking. Could you please try re-phrasing the question?
scanning, balancing, then…
scanning, balancing, then reporting could be done by a machine as an automatic task ; i do not understand why you need a human being for that job.
is it a static automatic scanner for balancing the bandwidth without any ... counter-measure dropping/blocking/ the bad relay ?
should it show a compromised relay ?
could you use it as a detection tool before the Bandwidth Authority do the measurement ?
is it relevant to black-list the suspicious relays and to drop it of the relays-networks ?
if it is just an announce (job) : create a bridge bandwidth scanner (5 000$) it should be put in another category : Tor recruits ... google summer ... i thing you want the shape/model be built then you will tweak it.
Yes, this post is looking…
Yes, this post is looking for a human being who will build an automated bandwidth measurement system. 🙃
Wouldn't the following…
Wouldn't the following unsafe code still compile and run with -fsanitize=address?
void main() {
int x;
printf("%d", x);
}
I didn't try it, but…
I didn't try it, but according to Wikipedia, "AddressSanitizer does not prevent any uninitialized memory reads..." You'd need something like Valgrind for that I suppose. But who would ever write something like that in the first place? Okay, don't answer that.
So, yes, but presumably not with -Wuninitialized -Wmaybe-uninitialized -Werror.
How do you make the…
How do you make the difference between a ghost a virtual or a unknown relay (new or compromised) infiltrating the network during the transfer/connection ?
i suppose there are some label or flag and you can't afford to sort an 'undefined noise' ...
If your challenge is a success ; you will be in front of a big problem : correcting the errors so you need the help of the expert working in the space area ; does it imply a quantum audit ?
Your article _ but i must be wrong _ proposes an ambitious project which looks like programming a stingray but reversed in its genuine function toward ... a better independence of the tor network.
Didn't you ask for some sort…
Didn't you ask for some sort of "data mining"?!
Interestingly, the definition(s) of "data mining" seems yet to converge though. I think the Oxford English Dictionaries' definition is pretty not good: [noun, uncountable, computing] "looking at large amount of information that has been collected on a computer and using it to provide new information". The definition from wikipedia.org is much better, I think.
What does "a quantum audit" mean, btw?? Never heard about that! An audit at the finest level?!
Assuming you got Tor Browser…
Assuming you got Tor Browser from https://torproject.org and it is the legitimate Tor Browser, this is most likely a false positive from your antivirus software.
I really do hope this gets…
I really do hope this gets implemented, I've seen way too many bridges that tend to become slow over time and frustrate user experience.