[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] "*.onion" performance tru "onion.to"
On 5/21/12 11:02 AM, Jesus Cea wrote:
> On 21/05/12 09:09, Fabio Pietrosanti (naif) wrote:
>> Also via Tor2web, we enabled on one of the node Tor2web mode:
>
>> 1st request: 0m7.705s 2nd request: 0m1.898s
>
>> Please note that currently Tor2web.org is running 2 nodes and only
>> one of them run Tor2web mode with Tor2web 3.0:
>> burninetliliito5.tor2web.org 38.229.70.4 (t2w 2.0 + standard tor)
>> burninetliliito5.tor2web.org 194.150.168.70 (t2w 3.0 + t2w mode)
>
> Could you elaborate? What is t2w mode?
>
Tor2web is a way to use Tor for Tor2web improving performance:
https://trac.torproject.org/projects/tor/ticket/2553
You need to enable it at compile time with --enable-tor2web-mode .
It remove the number of hops required to connect to a TorHS.
That's because in Tor2web threat model:
- the client accessing the TorHS resource is not anonymous
- the server exposing the TorHS resource is anonymous
so there is not need to "enforce tor client anonymity" in that use-case.
Now imho there is the need to have "volounteer python hacking" on
Tor2web 3.0 code to work on that set of issues
https://github.com/globaleaks/Tor2web-3.0/issues .
If someone want to subscribe to Tor2web mailing list to get engaged
http://wiki.tor2web.org/index.php/Main_Page#Contact
-naif
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk