[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] "*.onion" performance tru "onion.to"
On 5/21/12 11:02 AM, Jesus Cea wrote:
> On 21/05/12 09:09, Fabio Pietrosanti (naif) wrote:
>> Also via Tor2web, we enabled on one of the node Tor2web mode:
>> 1st request: 0m7.705s 2nd request: 0m1.898s
>> Please note that currently Tor2web.org is running 2 nodes and only
>> one of them run Tor2web mode with Tor2web 3.0:
>> burninetliliito5.tor2web.org 22.214.171.124 (t2w 2.0 + standard tor)
>> burninetliliito5.tor2web.org 126.96.36.199 (t2w 3.0 + t2w mode)
> Could you elaborate? What is t2w mode?
Tor2web is a way to use Tor for Tor2web improving performance:
You need to enable it at compile time with --enable-tor2web-mode .
It remove the number of hops required to connect to a TorHS.
That's because in Tor2web threat model:
- the client accessing the TorHS resource is not anonymous
- the server exposing the TorHS resource is anonymous
so there is not need to "enforce tor client anonymity" in that use-case.
Now imho there is the need to have "volounteer python hacking" on
Tor2web 3.0 code to work on that set of issues
If someone want to subscribe to Tor2web mailing list to get engaged
tor-talk mailing list