This may be not quite what you want, but the Estonia E-resident card
supports basic crypto with the private key on the smart card---i.e.,
you have to physically have the card to be able to read the encrypted
mail.
There are probably more elegant solutions than plugging into the
Estonia E-resident
Razvan,
Your email is confusing. To host a Hidden Service you do not need to be
a Tor node - we call them relays in the common terminology.
So, a relay relays traffic for Tor clients. This will consume as much as
you give. You can throttle the relay bandwidth rate / burst or limit the
traffic con
On Mon, 23 May 2016 00:56:56 +0300
Razvan Dragomirescu wrote:
> Hello everyone,
>
> I'm working on an Internet of Things project and Tor will be a part
> of it (Hidden Services to be more precise). The nodes however may be
> battery powered or have slow (or metered) Internet connectivity, so
> I
Hello everyone,
I'm working on an Internet of Things project and Tor will be a part of it
(Hidden Services to be more precise). The nodes however may be battery
powered or have slow (or metered) Internet connectivity, so I'm trying to
estimate the traffic patterns for a fully functional Tor node.
Hello again,
I wanted to revisit this subject and actually start writing some code, but
it looks like Ivan Markin's GitHub account is gone, together with all the
code there. Ivan, are your modifications to OnionBalance still available
anywhere?
Thank you,
Razvan
--
Razvan Dragomirescu
Chief Tech
isis transcribed 35K bytes:
> Hello,
>
> Peter (in CC) and I have recently composed a draft proposal for a new Tor
> handshake. It's a hybrid handshake combining Tor's current X25519-based NTor
> handshake with the NewHope lattice-based key exchange, in order to protect the
> secrecy of Tor conne