[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] UseEntryGuards: 0?
> I'd like to reduce these false positives
> and thought
> of using "UseEntryGuards: 0" to have circuits been rebuild more often.
> I'd only do this for the onion services which are also reachable in the
> non-tor internet
> and therefore their IP adresses are known anyway.
For services that I don't mind leaking the location of (e.g. because
they have a "regular web" mirror), I configure my onion services to be
non-anonymous.
Disable the socks port and set two options:
SocksPort 0
HiddenServiceSingleHopMode 1
HiddenServiceNonAnonymousMode 1
All onion services that this tor process operates will connect directly
to introduction and rendezvous points. This lowers the hop count from 6
to 3 and rivals/beats exit connections in terms of latency/bandwidth.
The location of the onion service is no longer protected, yet visitors
of the onion service are no worse off than before.
Matt (pastly)
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk