[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Bridge Communities?
> I mean, most overlays out there are NOT for anonymity
Not for strong anonymity at least. Many are closes source windows blobs
and generally weighted towards filesharing and vague vpn privacy claims.
Those are definitely the ones to avoid. If you can't see and change the code
it's not worth one bit of your time beyond cataloging it's 'features'
for possible
reimplementation.
> Sure, i2P exists, but who wants to spin up a huge honking java virtual
> machine just to participate in that relay pool?
It's actually pretty easy and can run on modest hardware as a node.
> Not only that, but i2P (last I checked) does not support IPv6 Eepsites,
> while Tor is (slowly) getting to that point.
Neither do, and neither are. You can shim both with onioncat to
some caveated win.
> IPv6 eepsites/hidden services is an important feature to me.
Absolutely.
> GNUnet or even more obscure overlays do not have stable featuresets
> regarding generic unmodified TCP or UDP services, be it over IPv4 or IPv6.
Phantom does this completely already, but is even more obscure.
> Sure GNUnet has IPv6 private VPNs on the eventual roadmap, and sure you
> could extend that to virtual interfaces, and sure you could enable linux or
> whatever to act as a router between those interfaces, you could even enable
> Quagga or whatever to swap an (alternative) BGP peering table, but GNUnet
> has a lot of other priorities, and isn't likely to get around to that
On the IPv6 interop front, the only thing these projects need to code
is unique address in specific /48 bound to an IPv6 interface and mapped
to internal 80bit address [sub]space for transport. User will setup all those
interconnects. There are projects in the works...
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk