Brian Barker: > > The Tor group just released their plan for TorCoin > > <https://docs.google.com/file/d/0B7r4osQgWVqKTHdxTlowUVpsVmJRcjF3Y3dtcTVscFhEaW5F/view?sle=true> > > to deal with this issue. It's a method of mining TorCoins as you host a > > node, using the proof-of-work schemes to verify you contributed a given > > amount to the network. Seems like a great way to make this more popular. This document does not come from the Tor Project and to the best of my knowledge is not endorsed by the project in any way. > > Lastly, the Grugq has a project called Portal > > <https://github.com/grugq/portal> which configures routers as tor-only > > network nodes. There's also a Raspberry Pi version > > <https://github.com/grugq/PORTALofPi>. These could be a fantastic > > starting point to creating easily-configurable devices to put on the mesh > > net. > > I would love to hear more from Tor experts or anyone else interested in how > this could work. One thing that Tor gives you: it makes it hard for your Internet access provider to learn your network activities. This is best achieved when the Tor client is running on your computer if you want to avoid monitoring from people sharing the local network. The other thing is that applications tend to reveal much more that you think about your system or your work. Without an audit (and some changes), most applications will leak sensitive data. Channeling their network traffic blindly to the Tor network might just give you a false sense of security. I'm not saying that approaching the question at the router level is uninteresting, but it's far trickier to get right than one may think. -- Lunar <lunar@xxxxxxxxxxxxxx>
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk