NTPT writes: > And is it possible (and how ? ) to run end to end encrypted (ssl) web > traffic via tor network ?
If you mean end-to-end encrypted to a hidden service, there is a problem in that most certificate authorities won't issue a certificate for a .onion hostname today. That means that the Tor Browser will give a certificate warning when users navigate to the hidden service via HTTPS, because the service won't be able to present a certificate that the browser will accept. They can still use HTTPS, but they might develop a risky habit of ignoring or bypassing certificate warnings (which is riskier when using the Tor Browser to visit an HTTPS site on the public Internet, since the warning could indicate an attack from the exit node, a situation which is far less plausible with hidden services). There was recently a cert issued to Facebook for a .onion name, but it's not clear when this kind of cert will be easily available to the general public. -- Seth Schoen <sch...@eff.org> Senior Staff Technologist https://www.eff.org/ Electronic Frontier Foundation https://www.eff.org/join 815 Eddy Street, San Francisco, CA 94109 +1 415 436 9333 x107 -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk