<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p>Thanks Alec,</p>
<p>I am wrapping my head around alot at the moment, yesterday was
the first day I had an onion service!</p>
<p>I am passing the information and links you have provided back to
the Bisq network engineers (this is unfortunately not where I am
at). <br>
</p>
<p><br>
</p>
<p>They have asked me to ask here also if, when connected to a
hidden service, the circuit becomes "dirty" after default 10
minutes and resets?<br>
</p>
<br>
<div class="moz-cite-prefix">On 06/03/18 18:55, Alec Muffett wrote:<br>
</div>
<blockquote type="cite"
cite="mid:CAFWeb9+8X1iY4faYWPvnRoK2hd7nAn9OaurA4RvbiGtppgovVA@mail.gmail.com">
<div dir="ltr">
<div class="gmail_extra">
<div class="gmail_quote">On 6 March 2018 at 17:54, Michael
Jonker <span dir="ltr"><<a
href="mailto:michael@openpoint.ie" target="_blank"
moz-do-not-send="true">michael@openpoint.ie</a>></span>
wrote:<br>
<blockquote class="gmail_quote" style="margin:0px 0px 0px
0.8ex;border-left:1px solid
rgb(204,204,204);padding-left:1ex">
<div bgcolor="#FFFFFF">
<p>2) Bisq 's infrastructural backbone runs as a P2P
network over TOR network. Clients talk to each other
and there are various hidden services providing
network resources. <br>
</p>
</div>
</blockquote>
</div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra">At the risk of blowing my own
trumpet, I tried writing up suggestions for hardening hidden
services to preserve their anonymity:</div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra"> <font face="monospace, monospace"><a
href="https://github.com/alecmuffett/the-onion-diaries/blob/master/basic-production-onion-server.md"
moz-do-not-send="true">https://github.com/alecmuffett/the-onion-diaries/blob/master/basic-production-onion-server.md</a><br>
</font></div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra">...although the above was written
long before I got seriously into EOTK, and into the amazing
benefits of using Unix-domain sockets to connect my
webservers and tor-daemons.</div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra">Aside: the benefits of Unix-domain
sockets include: </div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra">- massively increased resistance to
socket-table-filling denial-of-onion-service attacks, and
faster recovery times</div>
<div class="gmail_extra">- (probably) lower latency</div>
<div class="gmail_extra">- reduced (but not eliminated) risk
of IP metadata leakage of internet address, etc, because
less reliance on network addresses</div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra">But between *that* document, and some
of the tech in EOTK, there may be some useful hardening tips
for you.</div>
<div class="gmail_extra"><br>
</div>
<div class="gmail_extra"> - alec</div>
<div class="gmail_extra"><br>
</div>
-- <br>
<div class="gmail_signature"><a
href="http://dropsafe.crypticide.com/aboutalecm"
target="_blank" moz-do-not-send="true">http://dropsafe.crypticide.com/aboutalecm</a><br>
</div>
</div>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
tor-onions mailing list
<a class="moz-txt-link-abbreviated" href="mailto:tor-onions@lists.torproject.org">tor-onions@lists.torproject.org</a>
<a class="moz-txt-link-freetext" href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions</a>
</pre>
</blockquote>
<br>
</body>
</html>