[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Using EOTK to put clearnet websites onto onion addresses



Thanks Alec!

This is very useful. Especially plain HTTP sites are unsafe because the
attacker might inject something to HTTP traffic. For some weird reason many
popular sites, like CNN in your example, are not supporting HTTPS. As a
result, exit node or someone else can inject something nasty to this
traffic. Tor user may want to see videos and interactive content of these
sites and activates JS and videos (the user trusts CNN, but does not see
the problem with HTTP).

-Juha


On Sun, Feb 5, 2017 at 6:37 PM, Alec Muffett <alec.muffett@xxxxxxxxx> wrote:

> I released EOTK (Enterprise Onion Toolkit) a few days ago.
>
> It's "alpha" code, very much still in development.
>
> I posted a couple of videos of how to set it up:
>
> * Introduction: https://www.youtube.com/watch?v=ti_VkVmE3J4
>
> * Rough Edges & "Gotchas": https://www.youtube.com/watch?v=UieLTllLPlQ
>
>      - alec
>
> --
> http://dropsafe.crypticide.com/aboutalecm
> --
> tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk