On Mon, Jul 28, 2014 at 12:45:33AM -0600, Mirimir wrote: > On 07/27/2014 09:24 AM, Virgil Griffith wrote: > > <SNIP> > > > Any others that come to mind from anyone? > > I'm very intrigued by possibilities of multiple hidden services with > fast HS-HS links via Tor. One use case would be the standard > front-end/back-end website design. Another would be "smart" > load-balancing proxies, which could detect and foil attacks such as > DDoS, localization, and so on. Another would be full anonet-style > darknets, using OnionCat or OpenVPN via Tor. This might win from authenticated hidden services and then building shorter circuits, since if the client and HS are controlled by the same person, then preserving the client's anonymity *from the HS* rather than an observing third party is less important. -- Andrea Shepard <andrea@xxxxxxxxxxxxxx> PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF DE79 A4FF BC34 F01D D536 PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5 DF7E 4191 13D9 D0CF BDA5
Attachment:
pgp7Oea2e8kac.pgp
Description: PGP signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk