On 5/28/13 3:19 AM, Micah Lee wrote:
I agree, most of the time leak sites don't need as much anonymity from hidden services.
In the GlobaLeaks's threat model the node is always placed over a Tor Hidden Service as a key enabling point to support mutual-anonymity with the whistleblower.
In case of internet exposure, this exposure is managed trough the use of Tor2web software.
The server is, in any case, always behind a Tor Hidden service and partitioned/sandboxed to work behind Tor.
-- Fabio Pietrosanti (naif) HERMES - Center for Transparency and Digital Human Rights http://logioshermes.org - http://globaleaks.org - http://tor2web.org _______________________________________________ tor-talk mailing list tor-talk@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk