Version 206 (modified by zooko, at 2014-05-12T22:19:52Z) (diff) |
---|
Weekly Meeting
There is a twice-weekly videoconference using Google Hangout. The connection URL is posted on this page and IRC a few minutes before the meeting.
Who | Core developers or interested community members |
---|---|
What | Dev Topics Meeting |
When | Thursdays 22:00Z (Tesla Coils and Corpses) and Mondays 21:00Z (Nuts and Bolts) |
Where | Google Hangout, IRC fallback (see below) |
Why | Voice/video interaction complements IRC/mailing list |
How | See Agenda below |
(*) Z (Zulu) time refers to UTC; check where you are
Go here to register what times of the day, on Mondays, you could attend Nuts and Bolts.
Go here to register what times of the day, on Thursdays, you could attend Tesla Coils and Corpses.
WebRTC
WebRTC seems to require Google Chrome/Chromium? or a FireFox? ≥ v28 or so.
- recommended WebRTC chat rooms:
- https://opentokrtc.com/hot.peach.hurt.halloween.rib — This one claims to be fully Open Source.
- https://talky.io/hot.peach.hurt.halloween.rib — This one claims to be only partially Open Source, but it supports screen-sharing (although only with Google Chrome/Chromium?) and opentokrtc.com doesn't seem to.
- other WebRTC chat rooms:
Upcoming
the next Nuts and Bolts meeting
URL: TBA
Date: 2014-05-12 21:00Z countdown
get on channel "#tahoe-lafs" on irc.oftc.net (port 6697 for TLS)
agenda: experiment with alternatives to Google Hangouts for video-conferencing:
This will be a "NUTS AND BOLTS" meeting — it is about engineering, debugging, documentation, making stable releases, etc.
If you're more into science, big new features, writing papers about our work, etc. then stay tuned for a future meeting about "TESLA COILS AND CORPSES".
the next Tesla Coils and Corpses meeting
URL:
Date: 2014-05-01 22:00Z countdown
Agenda: novel cryptocurrency ideas
This will be a "TESLA COILS AND CORPSES" meeting — it is about science, big new features, writing papers about our work, etc.
If you're more into engineering, debugging, documentation, making stable releases, etc. then stay tuned for a future meeting about "NUTS AND BOLTS".
Proposed Future Topics
- #1382 #1382 #1382 and #1382; It is almost done. Is it done? Maybe we need one more round of code review‽ Can we merge it?
- #2125 (amiller wants to work on it)
- do code-review on the tickets that already have patches written for them! Milestone 1.11.0
- POSSIBLE AGENDA ITEM: Tahoe-LAFS over I2P, Tor, and/or cjdns by Twisted Endpoints (pycryptopp #203) because https://pypi.python.org/pypi/txi2p exists now!
- POSSIBLE AGENDA ITEM: let's do ChaCha20⊕AES (pycryptopp #84 and Tahoe-LAFS #1164).
- Noether status report by Daira ("TESLA COILS AND CORPSES")
- Rainhill design review which Daira will distribute; call for outside crypto expert reviewers ("TESLA COILS AND CORPSES")
- Proof-of-Retrievability In The Presence Adaptive Adversaries by Zooko ("TESLA COILS AND CORPSES")
- Awesome Generalized Authenticated Data Structures, Part 2 by Andrew ("TESLA COILS AND CORPSES")
- Awesome Generalized Cryptocurrencies, Part 2 by Brian ("TESLA COILS AND CORPSES")
Notes / Archives
2014-03-24
- foolscap, I2P, IPv6, Tor, Twisted endpoints, HTTP transport, HTTP/2
2014-03-20
- 1.11.0 release blockers, including #1382
2014-03-06
- post-Tahoe-LAFS/new-PetMail/"FireFoxTahoeThing" ideas from Brian Warner, about how to do introduction, sharing, and garbage-collection.
2014-12-13
- ("NUTS AND BOLTS"): #1382
2014-12-12
- ("NUTS AND BOLTS"): #1382
2014-02-06
- ("NUTS AND BOLTS"): #1382
2013-11-14
- ("NUTS AND BOLTS"):
- plans for Tahoe-LAFS Summit next week in SF.
- #1382 #1382 #1382 and #1382 (because Mark_B and Zooko will both be in this dev chat and they want to work on comment:50:ticket:1382)
2013-10-23
- ("NUTS AND BOLTS"):
tests of packaging
publish buildbot config
travis-ci
tests of packaging:
- pip install allmydata-tahoe (currently fails due to Nevow bug #XXX )
- python setup.py install (currently doesn't install deps) (ticket #XXX )
- the tests from the old buildmaster and from the old misc/build_helpers/test*.py
2013-10-02
2013-09-11
- ("NUTS AND BOLTS"): code-review on the tickets that already have patches written for them! Milestone 1.11.0
2013-08-28
- ("NUTS AND BOLTS"): Agenda: Planning for Tahoe-LAFS v1.11 release!
What will be new in Tahoe-LAFS v1.11? Here is the list of v1.11 tickets already closed: Here is the list of v1.11 tickets awaiting code review.
2013-08-21
- ("NUTS AND BOLTS"): Agenda: I2P, v1.11 release, Mark's tickets
2013-08-07
- ("NUTS AND BOLTS"): Agenda: GSoC, #1870, Buildbot
2013-07-31
2013-07-16
- ("NUTS AND BOLTS"): Agenda: GSoC, #1382
2013-07-09
- ("NUTS AND BOLTS"): Agenda: Tahoe-LAFS v1.11 ticket triage
2013-07-04
- ("NUTS AND BOLTS"): Agenda: "Mark Berger's improvements to immutable peer selection"
2013-06-20
- ("NUTS AND BOLTS"): Agenda: "Mark Berger's improvements to immutable peer selection"
2013-05-30
- ("NUTS AND BOLTS"): Agenda: "Write some patches for Tahoe-LAFS v1.11!"
- Leif's recent patches to the WUI (#1973)
- improve the design and beauty of the WUI (https://github.com/tahoe-lafs/tahoe-lafs/pull/32 , #1492)
- fix defects in the WUI (#1993, #1931, #1375, #1462, #1502, #1961, #622, #311, #525, #631, #1588, #1645, #1706)
- write cool new WUI (#1942, #1369, #1551, #1499, #277)
(I can't remember whether we actually followed the agenda.)
2013-05-02
- ("TESLA COILS AND CORPSES"): Agenda: "Post-LAFS: What would you invent (or are you inventing) now that you already understand Tahoe-LAFS? Possibilities: LDMF (fancier authenticated data structures), Brian's secret file-sharing project within Mozilla, BitTorrent Sync, saying 'Okay, storage is good enough, let's work on decentralized currencies/payment-systems instead.'"
Actual topic turned out to be "Post-Bitcoin" instead.
2013-04-25
- ("NUTS AND BOLTS"): Google Summer of Code project planning
2013-04-18
- ("TESLA COILS AND CORPSES"): Andrew Miller: "type-directed security definitions for generic authenticated data structures"
2012-04-11
- ("NUTS AND BOLTS"): IPv6 and tests thereof
2012-03-14
- ("NUTS AND BOLTS"): Tahoe-LAFS v1.10 patches; 1.10.0, contribute patches, tests, docs, or comments.
2012-03-07
- ("NUTS AND BOLTS"): Tahoe-LAFS v1.10 patches; 1.10.0, contribute patches, tests, docs, or comments.
2013-02-28
- ("TESLA COILS AND CORPSES"): (attempt number 3) Iraklis's research in applying Ristenpart's Message-Locked Encryption to LAFS. This requires extending the model of Message-Locked Encryption, and it suggests interesting directions for future extensions of LAFS.
2012-02-21
- ("TESLA COILS AND CORPSES"): (attempt number 2) Iraklis's research in applying Ristenpart's Message-Locked Encryption to LAFS. This requires extending the model of Message-Locked Encryption, and it suggests interesting directions for future extensions of LAFS.
2012-02-14
- ("TESLA COILS AND CORPSES"): Iraklis's research in applying Ristenpart's Message-Locked Encryption to LAFS. This requires extending the model of Message-Locked Encryption, and it suggests interesting directions for future extensions of LAFS.
2012-01-31
- ("NUTS AND BOLTS"): Tahoe-LAFS v1.10, new WUI, "timeline" visualization, https://LeastAuthority.com commercialization of Tahoe-LAFS
…
[some weekly hangouts were skipped due to travel]
2012-01-10
- ("NUTS AND BOLTS"): Tahoe-LAFS v1.10
2012-12-13
- ("NUTS AND BOLTS"): documentation and internationalization
- ("NUTS AND BOLTS"): Tahoe-LAFS v1.10
- ("TESLA COILS AND CORPSES"): new secure hash function
2012-12-06
- ("TESLA COILS AND CORPSES"): Proofs-of-Retrievability!
2012-11-29
- ("NUTS AND BOLTS"): documentation
- ("TESLA COILS AND CORPSES"): distributed introduction, defense against rollback attack
2012-11-22
- ("NUTS AND BOLTS"): work on Tahoe-LAFS v1.10 tickets!
2012-11-15
- ("TESLA COILS AND CORPSES"): async notifications
What a lot of people really want is an alternative to Dropbox — something that functions very like Dropbox but without exposing your plaintext to spying and corruption. David-Sarah implemented a part of this with the drop-upload feature. It seems to me that the blocker which prevents Tahoe-LAFS from doing the rest of it is that LAFS clients have no way to get an asynchronous notification that a file has changed (i.e., so that they don't have to poll to find out if the file has changed). So: could we add that? Why not just define a remote interface offered by LAFS clients to LAFS servers. The remote interface is "hey_you_this_file_has_changed(storageindex)".
2012-11-08
("NUTS AND BOLTS"):
- #1240; Is it done? (I think it still needs fixed tests.) Can we commit it to trunk and be done with it? Do we need to merge it with #1679?
- #1679; Let's write a test for it! Has The Dod had continuous good service since he applied the patch? Has nejucomo tried reproducing his bug and applying the patch?
2012-11-01
("TESLA COILS AND CORPSES"): Garbage collection: use cases and protocols;
- #1832 (support indefinite leases with garbage collection)
- #1833 (storage server deletes garbage shares itself instead of waiting for crawler to notice them)
- #1834 (stop using share crawler for anything except constructing a leasedb)
- #1835 (stop grovelling the whole storage backend looking for externally-added shares to add a lease to)
- #1836 (use leasedb (not crawler) to figure out how many shares you have and how many bytes)
- #1837 (remove the "override lease duration" feature)
And the associated mailing list thread.
2012-10-23
Topics: Ticket #1240, Tahoe-LAFS birthday party, future agendas.
Attendees: Zooko, David-Sarah, amiller, ambimorph, nejucomo.
Concise summary:
- #1240 debug session - Incorrect caching logic suspected.
- Tahoe-LAFS birthday party - Saturday, 2012-10-27 at 23:00z - Each locale connects with a projector + google hangout.
- Future agendas - next week, Proof of Retrievability paper review; two weeks out, Rainhill review with outside crypto reviewers.
Finely detailed notes in MeetingNotes_2012_10_23
2012-10-16
Topics: Proof-of-Retrievability
Attendees: Zooko, David-Sarah, nejucomo
From IRC, Zooko summarizes (edited for spelling):
- "The reason we can do better than the previous state of the art is that we've expanded the setting to multiple servers and multiple clients, which opens up new defenses for the good guys against Ponda Baba."
- "It is useful way to think, to start with the completely safe camouflaged download protocol: just run your normal verifier, but tell it to save what it gets, and then to talk about how to make it faster without breaking camouflage."
- "There are two dimensions of how you might be able to make it faster: the dimension of multiple downloader/verifiers and the dimension of multiple servers."