[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] wake up tor devs
On 09/17/2014 03:04 PM,
BM-2cUqBqHFVDHuY34ZcpL3PNgkpLUEEer8ev@xxxxxxxxxxxxx wrote:
> Why is Tor wasting time in implementing secure hidden services? Why not
> copy from here if they are doing it right:
>
> Tor I2P
> Cell Message
> Client Router or Client
> Circuit Tunnel
> Directory NetDb
> Directory Server Floodfill Router
> Entry Guards Fast Peers
> Entry Node Inproxy
> Exit Node Outproxy
> Hidden Service Eepsite or Destination
> Hidden Service Descriptor LeaseSet
> Introduction point Inbound Gateway
> Node Router
> Onion Proxy I2PTunnel Client (more or less)
> Relay Router
> Rendezvous Point somewhat like Inbound Gateway + Outbound Endpoint
> Router Descriptor RouterInfo
> Server Router
>
> Why not distributed directory authorities and hardcoded?
Huh? Tor uses distributed directory authorities, and the main ones are
hardcoded in the software.
> Why not secure tunnels independent of guards?
Using entry guards protects against Sybil attacks.
> Or does Tor want to remain less secure?
;)
See
http://tor.stackexchange.com/questions/27/how-does-tors-threat-model-differ-from-i2ps-threat-model.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk