[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: leaker-optimized versions of Tor



Hi,

My name is Brenno de Winter and I once worked on a project dat delivered the outline of such a system: http://www.smallsister.org/ the software works, but hasn't reached the wanted level of service. But hopefully it helps. I love to help out.

Cheers,

Brenno
Op 8-12-2010 14:17, Eugen Leitl schreef:
I'm thinking about high-latency (suitable for nonrealtime things
like leaking and email/messaging) anonymity-enhanced versions of Tor.
Delays from hours to days are tolerable here, provided the result
is reliable.

It would obviously have to be run as a private Tor network, though
perhaps with gateways to Tor and other networks. A fraction
of total nodes should be unlisted bridge relays. It would probably
profit from a botnet-like approach, especially if global scrutiny
increases. It should default to a much larger number of hops,
introduce random delays and chaffing. Each node should come with
a hidden service to Tahoe-LAFS or similar. A version should come
as a convenient and containable virtual appliance, or packaged as
plug computers.

Comments, other suggestions?


***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/