[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Tor Double HiddenService w/ Server Level Intercepting Request and Content Anonymization
On 10/29/2013 08:48 AM, Manfred Ackermann wrote:
> Hi List.
>
> Sorry to push this up, just wondering if this approach is such stupid that
> it's not even worth leaving a related comment to it ;-) Or is it just of no
> interest?
>
> Any comments apriciated.
Hello Manfred,
Sounds like a fantastic idea. But I think I'm missing something that I'm
hoping you can clear me up on. How does this protect the user if the
first-in-line server is compromised? So the user connects to HS on
computer1 which is compromised. How does your system stop them from
being compromised instead of forwarded deeper into the network to computer2?
Cheers,
Anthony
--
Anthony Papillion
XMPP/Jabber: cajuntechie@xxxxxx
OTR Fingerprint: 1515393D53BA593C19E2CD549AE59FB650F82ABC
SIP: 17772471988@xxxxxxxxxxxxxxx
PGP Key: 0xDC89FF2E
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk