[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] wake up tor devs



Why is Tor wasting time in implementing secure hidden services? Why not
copy from here if they are doing it right:

Tor	I2P
Cell	Message
Client	Router or Client
Circuit	Tunnel
Directory	NetDb
Directory Server	Floodfill Router
Entry Guards	Fast Peers
Entry Node	Inproxy
Exit Node	Outproxy
Hidden Service	Eepsite or Destination
Hidden Service Descriptor	LeaseSet
Introduction point	Inbound Gateway
Node	Router
Onion Proxy	I2PTunnel Client (more or less)
Relay	Router
Rendezvous Point	somewhat like Inbound Gateway + Outbound Endpoint
Router Descriptor	RouterInfo
Server	Router

Why not distributed directory authorities and hardcoded?

Why not secure tunnels independent of guards?

Or does Tor want to remain less secure?


-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk