[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #30029 [Applications/Tor Browser]: Objective 2, Activity 5: POC for Human-memorable addresses for .onion services



#30029: Objective 2, Activity 5: POC for Human-memorable addresses for .onion
services
--------------------------------------+--------------------------------
 Reporter:  pili                      |          Owner:  tbb-team
     Type:  project                   |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:  #30281                    |         Points:
 Reviewer:                            |        Sponsor:  Sponsor27-must
--------------------------------------+--------------------------------

Comment (by cypherpunks):

 Responding to the title of this ticket, which includes 'Human-memorable
 addresses for .onion services': we must be careful to consider Zooko's
 trilemma, which argues that names cannot be human-meaningful, global, and
 secure.  In particular, we must not seek to re-implement something like
 DNS, whose requirement of universality implies the creation of hierarchy,
 authorities, and control points, all of which undermine a salient benefit
 of onion services, the ability for all individuals to create and use them
 freely.  Consider the implicit role for authorities in any
 [https://sockpuppet.org/blog/2015/01/15/against-dnssec/ effort to secure
 DNS].

 As an alternative, we might consider adopting an approach more like
 [http://www.skyhunter.com/marcs/petnames/IntroPetNames.html Petnames],
 which encourages individuals to create and use their own meaningful names
 for opaque identifiers, without requiring everyone to agree.

 We might also want to create tools to help users track the provenance of
 addresses learned via introductions, so that they would be empowered to
 make decisions based upon the trustworthiness of those who provided
 introductions.  We could likewise encourage individual users to establish
 multiple identities for their own services this way and use different
 addresses based upon context.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30029#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs