[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Private Exits
- To: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Subject: [tor-talk] Private Exits
- From: Jason Evans <jsevans@xxxxxxxxxx>
- Date: Sun, 28 Jun 2020 09:50:55 +0200 (CEST)
- Autocrypt: addr=jsevans@xxxxxxxxxx; keydata= mQENBF1C6QUBCADP1rhX+Jsxqnjg+4UexT/lbA/QkhLp0FvzgT2BTa0XYAV7skiq+IEykibk +dYHhMJRG7VMChh0MXpKfb6HXEZw1BtBvlbq26YPBrQneP8cszp9/Vg6dvA/9we1hSJNSrRw 72LAi7ILegLZQFuNF5mSQVZQCBES8rLaIts4fcWqI/KJGXP5RWA6Jsj4LjroKjbZm6BhHbPM QIDKTcSxo6bdKnyLF8uoFHHzSEamABI0ILcYkUjJRra8bYY/IMPCEQ/oF8P7G7I6YT/i13AG La6giYStvEWPPHX4DMcz6mAH8daI5xA9LLm7D5uv/PGNcill8tPjbf7Vxq1p+KOG7y1VABEB AAG0HEpTRXZhbnMgPGpzZXZhbnNAZW1haWxtZS5jej6JAU4EEwEIADgWIQTBb0f+gWnXBtnt jLce/2sicz0XvgUCXULpBQIbAwULCQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRAe/2sicz0X vtHfCADDe+mSfKb+5wAtc+smUdRZOW19/qkJReIN+64o7gVdXJRccNmKQPOu+yqBKn5/TLHh UoBIChNAn5x4qvbh1dOfmylTdWukrYIgnlkZFQ5jVaPyVAFPnNxKkSpuMBvG7XiYD/BK2yUb m7wLv9A6lNuwSabe4LsB1R+b17hykSmLUfNr5dxL2v2Zbz0U/Xak+l+cz6G3eCqAzZjTCi0V sQGnHyWlhvqI2QVe6EOJ6DL401gmJWCpcxdJhVrpgAJEFwBBzlwPgnBinghG4nR74dX2Pgy6 pEEjLkxo/UJwh1cV4zMyfOcBTiHTnYTBvf9+UGP0WxhFT+xVhKBCFt6lspGTuQENBF1C6QUB CACxWpQNlHXCYM+iJUKF8O7+CVJCO1jTFo5evEcEj0qkjJV/iBFghQWwcPAjWkBsYd0imHT/ LWnygHta1uHl17RBfHJlzTFJq0VamLeeYJTcgL4YyrixbUyPaEloRRIfPdrlN+2Qst3M4Uho bGPWS5kNFqssD4hgYH3EYPemZPS9Fb6AqKi6xu7Ak3uMcn4S1xevPJFBrNFAWXCP1RRZ7sDj BA6fZkMw0ERO6eghomxZKc3ft3VVtfmKJfeGCu9Y264bQN4mABRctFhl4soatfieJz3NOLCB dTGo5GKF4XC+pDB++JWqqLv0oODLGOGEwxmImS5ACjNSXH/j9mUXjnVjABEBAAGJATYEGAEI ACAWIQTBb0f+gWnXBtntjLce/2sicz0XvgUCXULpBQIbDAAKCRAe/2sicz0XvnNECACn3rPi hD4madzJiofBqzdR48QGwHayto0jCmb2rLATWcAY41vairlzYB4QpSwcLmOQ1NLfs6/BhUop dyb/WNMsuehpS4f+7DLH/oL0FN7peowJWNbGNlOttH7qz326GoSyVQT08tXUQuGcQ/uZTlbp jDzdlqWTvIR8x1+Xj1sk7snbZlGCUYNM+SFZNdhqpm1cIyPwrgnRk3V/2Lme4nttx1zk/8dM KFrCwwrfO+z7m8Q4/XGaOk3nc56M55OEviHgSjkzlpE56z9AAJePLtdruTKOZVVBQTHVzcBt Fg5tCTwmRSHJ6usKDrzf6aRReVC5bc6+l8m/agF8fZHUz71P
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Mon, 29 Jun 2020 00:26:50 -0400
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1593330659; s=20200206-8juo; d=emailme.cz; i=jsevans@xxxxxxxxxx; h=To:From:Subject:Message-ID:Date:MIME-Version:Content-Type:Content-Transfer-Encoding; l=2425; bh=k/grhJzOx9kqJLTVmf0ZeAa+3ZclxjirecR5QZSASnM=; b=g7jUdHhQq0iJMZCNe/TmcxTlDo4qDkgKVeSbxqmF5zyDtWkmFe7T/s+tvHoReehA jXokTNVxT8o+WW+yVVwyou2oUsvcN+a9DhQOEcdvm5+GjkktWRcIkTQ3PgWXnNMPCp6 Cx6w3SGcrkcjmA1Sn+1QYClzCHMRGX0xANGYEqTPmCzJYSV+29+n9nXo9SJD8RmozYn Cb8I+Ii9gR3WHJw/AtUATmshFluiLN8TJCCr0WCr+Gdo3zY5q4R4OWDxgv07osk99Qz kjyqIAZzgHLZpPgaYKXjcxvOWA+TXB6VNjizrMpJuqSDXI2D8v4kwZ9yKcmU4PPbfFI 2DEa8RWkSg==
- List-archive: <http://lists.torproject.org/pipermail/tor-talk/>
- List-help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
- List-id: "all discussion about theory, design, and development of Onion Routing" <tor-talk.lists.torproject.org>
- List-post: <mailto:tor-talk@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
- Reply-to: tor-talk@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-talk" <tor-talk-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0
The purpose of this email is to describe a solution that doesn't exist
but could. The technology is available, it just hasn't been created yet.
The current Tor network:
Alice uses Tor Browser to connect to mywebsite.com.
Tor Browser connects to a guard note, then a middle node, then an exit
node. mywebsite.com only sees the IP from the exist node and Alice
remains anonymous.
However mywebsite.com knows that the IP is from an exit node and at
first, it just annoys her with puzzles, then eventually it blocks her
altogether. She tries exit node after exit node and sometimes it works,
sometimes it doesn't.
Alice uses Tor Browser to connection to mywebsite.onion
Tor Browser connects to a guard note, then a middle node, then to
mywebsite.onion. mywebsite.onion only sees the previous hop but nothing
else and Alice remains anonymous.
The Tor network with Private Exits:
Alice uses Tor Browser to connect to myexit.onion.
Tor Browser connects to a guard note, then a middle node, then to
myexit.onion. myexit.onion provides a portal to the internet via a web
interface similar to a VNC session. myexit.onion is not recognized as a
Tor exit node and Alice can then go to mywebsite.com without any extra
harassment.
Private Exits would exist primarily as a stand alone software
application. They would provide the user with a web interface that would
require uploading a public key to authenticate (similar to SSH). Each
Private Exit would normally have a 1:1 User/Owner relationship but it
wouldn't always need to be like that.
More Examples:
Pedro is a journalist inside of a country with stringent internet laws.
He connects to pedrowork.onion. This Private Exit is located at his
office in New York. He has complete access to the full Internet.
VPN Provider Iheartanonymity.com creates a shared Private Exit for their
paid subscribers. mywebsite.com sees users coming from a VPN provider
but they don't hold them in the same regard as Tor users.
Iheartanonymity.com only sees a small portion of the traffic that they
would see from hosting a traditional Exit Node and without the worries
about treated like one.
Suggestions appreciated. I am not a developer and even the simple bash
scripts that I write are so bad that they are a crime against humanity.
I'm just hoping to maybe throw out some ideas for someone else to implement.
Best Regards,
Jason Evans
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk