[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Dutch police break into webservers over hidden services



[I initially sent this just to Mike Cardwell.  Sorry about that.]

On 09/09/11 10:36, Gregory Maxwell wrote:

> On Fri, Sep 9, 2011 at 6:14 AM, Gozu-san <gozu@xxxxxxxxxxxx> wrote:
>> Alternatively, one could run Tor on VMs that can only access the
>> internet via OpenVPN-based "anonymity services".  OpenVPN clients can be
> 
> OpenVPN-based "anonymity services" ~= snake oil.

Although some are over-hyped, that's a very broad generalization.

> If you're running a hidden service you've already got a perfectly good
> network anonymity service running.

I totally agree.  Upon reflection, I get the elegance and wisdom of Mike
Cardwell's guidance.  The approach that I suggested, except perhaps with
elaborate implementations that I didn't explain, is clearly inferior.  I
apologize to anyone whom I've misled.

FWIW, my comments were colored by considerations re discretely hosting
multiple hidden services.  I'll explain that in a new thread.

_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk