Re: [tor-talk] Ahmia search engine works normally again

2016-12-08 Thread Juha Nurmi
On 08.12.2016 23:39, Alec Muffett wrote: > For general interest (perhaps to Juha, especially?): > > * I am building a 6-node, 24-core cluster, specifically to run an > Onion-traffic-serving experiment upon. > > * It's running a Debian variant - so the results/learnings should be > generally applic

Re: [tor-talk] Ahmia search engine works normally again

2016-12-08 Thread Alec Muffett
On 8 December 2016 at 20:09, scfith riseup wrote: > Thanks for the correction on that. My other two points still valid in > general? Recapping: >Second, if you do list .onion domains, know that they will be collected. Well, yes, onion addresses are like any other form of network address. Pe

Re: [tor-talk] Ahmia search engine works normally again

2016-12-08 Thread scfith riseup
Thanks for the correction on that. My other two points still valid in general? > On Dec 8, 2016, at 3:01 PM, Roger Dingledine wrote: > > On Thu, Dec 08, 2016 at 02:06:30PM -0500, scfith riseup wrote: >> First, not sure why you want to list .onion domains. The key here is that >> they are HIDDEN

Re: [tor-talk] Ahmia search engine works normally again

2016-12-08 Thread Roger Dingledine
On Thu, Dec 08, 2016 at 02:06:30PM -0500, scfith riseup wrote: > First, not sure why you want to list .onion domains. The key here is that > they are HIDDEN services. But I am sure you have reasons. Actually, that's part of the reason for the shift into calling them "onion services" -- many peopl

Re: [tor-talk] Ahmia search engine works normally again

2016-12-08 Thread scfith riseup
First, not sure why you want to list .onion domains. The key here is that they are HIDDEN services. But I am sure you have reasons. Second, if you do list .onion domains, know that they will be collected. Third, provide a simple path of machine-readable content to download so that bots won’t ki

Re: [tor-talk] Self-deleting scripts in http connections

2016-12-08 Thread Jonathan Marquardt
> This sequence of events got me thinking; the exit node queries servers on > the behalf of the Tor Browser. Some sites simply cannot be connected to via > HTTPS. Thus, the exit node must query the site requested in HTTP, which can > be modified in transit. If done, what form of protections could a