[tor-talk] Hiding the server

2012-07-11 Thread Anthony Papillion
I know that Tor does a good job at protecting users from discovery but what about the server? Is it as hard to find as the clients? I'm thinking no. Also, is there a good a goo aT to protect the server from location discovery? Thanks, Anthony -- Sent from my mobile device _

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
tor-admin: > Am Mittwoch, 11. Juli 2012, 17:43:52 schrieb Fabio Pietrosanti: >> Don't exaggerate, it still need a software client to access them, so the >> usability is heavily impacted. >> This imply that TorHS are not for general uses in the context of mutual >> anonymity . > What about a Firefox

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread tor-admin
Am Mittwoch, 11. Juli 2012, 17:43:52 schrieb Fabio Pietrosanti: > Don't exaggerate, it still need a software client to access them, so the > usability is heavily impacted. > This imply that TorHS are not for general uses in the context of mutual > anonymity . What about a Firefox/Chromium addon, th

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
Fabio Pietrosanti (naif): > Yo, > > i really appreciate such discussion about empowering TorHS, a lot of > work still have to be done to make proper leverage of the capabilities > that TorHS provide. > > On 7/11/12 5:36 PM, proper wrote: >> I think the concept of hidden services has a lot potenti

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
Rejo Zenger: > Hi, > >> - You get transparent, free end to end encryption. No flawed root CA system. > > Just curious, maybe I am overlooking something: how would this be better than > a self-signed and self-generated certificate (apart from the user not being > nagged with a warning)? Self-si

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Gregory Maxwell
On Wed, Jul 11, 2012 at 2:30 PM, Rejo Zenger wrote: > Hi, > >> - You get transparent, free end to end encryption. No flawed root CA system. > > Just curious, maybe I am overlooking something: how would this be better than > a self-signed and self-generated certificate (apart from the user not bei

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Rejo Zenger
Hi, > - You get transparent, free end to end encryption. No flawed root CA system. Just curious, maybe I am overlooking something: how would this be better than a self-signed and self-generated certificate (apart from the user not being nagged with a warning)? -- Rejo Zenger . . 0x21DBEFD4 .

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Fabio Pietrosanti (naif)
Yo, i really appreciate such discussion about empowering TorHS, a lot of work still have to be done to make proper leverage of the capabilities that TorHS provide. On 7/11/12 5:36 PM, proper wrote: > I think the concept of hidden services has a lot potential. Not only > because they are hidden. L

[tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
I think the concept of hidden services has a lot potential. Not only because they are hidden. Let's face it: - You get a free domain for live. - You get transparent, free end to end encryption. No flawed root CA system. - That's something remarkable, isn't it? With some modifications/improvements

Re: [tor-talk] [tahoe-dev] switching from introducers to gossip?

2012-07-11 Thread Eugen Leitl
- Forwarded message from Michael Rogers - From: Michael Rogers Date: Wed, 11 Jul 2012 14:45:21 +0100 To: jam...@echeque.com, Tahoe-LAFS development Subject: Re: [tahoe-dev] switching from introducers to gossip? User-Agent: Mozilla/5.0 (X11; Linux i686; rv:13.0) Gecko/20120614 Th