[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #15748 [- Select a component]: feature request for discussion
#15748: feature request for discussion
----------------------------------+---------------------
Reporter: tada | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone:
Component: - Select a component | Version:
Keywords: | Actual Points:
Parent ID: | Points:
----------------------------------+---------------------
thanks for the hard work. I got a few questions that may or may not turn
into viable features. for your consideration... pls bear with me if this
is in the wrong section
1) if the is so much interception of internet traffic worldwide, is it not
more practical to make obfsproxy a default startup setting to reduce the
potential amount of attention from spying idiots
2) with the growing anti-NSA sentiment, has tor though about approving at
least one geoip plugin like WORLDIP, so folk who are super weary can see
where at website is located and if need be block an entire country if they
feel their privacy is at threat
3) with tors infrastructure pretty well established, there is still no way
to verify that when you visit tor it is not a NSA dummy site. Is it
possible to implement a verification site that sits as a hidden service
that holds some kind of session key, giving lets say the tor site a ring-
of-three auth model. so when a client visits tor, it has to fetch an
session key from a hidden service, so that the NSA's clever faster-than-
light tactic can be circumvented.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15748>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs