<div style=""><span style="font-family: Arial, sans-serif; font-size: 14px; font-weight: 400; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);">Hello,</span></div><div style=""><span style="font-family: Arial, sans-serif; font-size: 14px; font-weight: 400; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><br></span><span style=""></span></div><blockquote style="border-left: 3px solid rgb(200, 200, 200); border-color: rgb(200, 200, 200); padding-left: 10px; color: rgb(102, 102, 102);"><div style="font-family: Arial, sans-serif; font-size: 14px;"><span style="font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", sans-serif; color: rgb(19, 19, 19); background-color: rgb(250, 250, 250);">Similar
to Briar, even developers of such clients above tell the loss of
messages and low reliability of the hidden to hidden path. Some of you
might know, that there were use cases with missing messages in a range
of 35-45 %.</span><br></div></blockquote><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div>
<div class="protonmail_signature_block" style="font-family: Arial, sans-serif; font-size: 14px;">
<div class="protonmail_signature_block-user protonmail_signature_block-empty">
</div>
<div class="protonmail_signature_block-proton">Sorry, but this is just not the case from my experience - it may take a while to fetch the descriptor of the hidden service, but once a TCP connection is established, aka. the ACK packet has been received, there should be no problems with packet-loss, this is one of the core features of TCP: </div><div class="protonmail_signature_block-proton"><br></div><div class="protonmail_signature_block-proton">Retransmission on various conditions.<br></div>
</div>
<div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="font-family: Arial, sans-serif; font-size: 14px;">I also hosted a hidden IRC server, as well as a Tor hidden service on my grandmothers laptop, to be able to SSH in through Tor and troubleshoot problems.</div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="font-family: Arial, sans-serif; font-size: 14px;">Experienced no packet loss, unless a relay in the circuit suddenly went offline.</div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="font-family: Arial, sans-serif; font-size: 14px;">If you want, I can measure packet loss from various locations (Northern Europe, East Europe, and New York, USA).</div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div style="">Also, to improve latency and throughput, you could make the server a one hop hidden server by enabling:</div><div style=""><br></div><blockquote style="border-left: 3px solid rgb(200, 200, 200); border-color: rgb(200, 200, 200); padding-left: 10px; color: rgb(102, 102, 102);"><div><span style="font-family:Arial, sans-serif;line-height:normal">HiddenServiceSingleHopMode</span></div></blockquote><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><br></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style="">This way the looking up the server is faster, but clients remain anonymous using a normal 3-hop circuit.</span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><br></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style="">I don't think we need extra code for this, you could just build your app using the programming language of your desire and use the existing network.</span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><br></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style="">That's what I was doing with my ~200 user IRC server, and it worked fine, even while being hosted at home at a limited uplink of 15 Mbps, which now got upgraded to 30 Mbps.</span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><br></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style="">Unfortunately fiber is not an option, so we have to rely on 60+ years old copper wires maintained by Telecom, I have a quite fancy industrial router with modem software and capabilities, and we still use <span data-v-0d21419e="">VDSL2 17a G.Vector (ITU G.993.5).</span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e=""><br></span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e="">I do however own a virtual machine machine on my friends colocated server at DataWagon, they are very exit friendly, zero abuse so far, I believe they just redirect abuse mails to /dev/null or something.. lol.</span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e=""><br></span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e="">Anyway, point is that I never encountered packet loss, and even if, the protocol would compensate for it.</span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e=""><br></span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e="">This became kind of a rant while I'm at work, so if it's not that useful, Im sorry.</span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e=""><br></span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e="">Regards,</span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255);"><span style=""><span data-v-0d21419e="">George<br></span></span></div><div style="font-family: Arial, sans-serif; font-size: 14px;"><br></div><div class="protonmail_quote">
On Wednesday, August 14th, 2024 at 9:12 AM, Sam <alleestrasse100@gmail.com> wrote:<br>
<blockquote class="protonmail_quote" type="cite">
<div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><h1 style="margin:0px 0px 1rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m"><font size="2"><span style="font-weight:400">System wrote via Tor Project <<a href="mailto:noreply@forum.torproject.org" rel="noreferrer nofollow noopener">noreply@forum.torproject.org</a>>:</span></font></h1><h1 style="margin:0px 0px 1rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m"><font size="2"><span style="font-weight:400">Feedback: Please submit the proposal also to tor-dev: tor-dev Info Page</span></font></h1><h1 style="margin:0px 0px 1rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m"><span style="font-weight:400;font-size:small">Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes</span><br></h1><h1 style="margin:0px 0px 1rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m"><span style="font-weight:400;font-size:small"><a href="https://www.reddit.com/r/TOR/comments/1e4te8m/introducing_discussing_reflectors_as_concept/" target="_blank" rel="noreferrer nofollow noopener">https://www.reddit.com/r/TOR/comments/1e4te8m/introducing_discussing_reflectors_as_concept/</a></span><br></h1><h1 style="margin:0px 0px 1rem;font-size:1.5rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m"><br></h1><h1 style="margin:0px 0px 1rem;font-size:1.5rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m">==============================================================</h1><h1 style="margin:0px 0px 1rem;font-size:1.5rem;line-height:1.75rem;padding-left:0px;padding-right:0px" class="gmail-font-semibold gmail-text-neutral-content-strong gmail-m-0 gmail-text-18 gmail-xs:text-24 gmail-mb-xs gmail-px-md gmail-xs:px-0 gmail-xs:mb-md" id="gmail-post-title-t3_1e4te8m">Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay | Tor & Echo | Adding Entry-Relays as Reflec-Tor to Exit-Nodes</h1><div style="padding-left: 0px; padding-right: 0px; font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", sans-serif; font-size: 14px; color: rgb(19, 19, 19); background-color: rgb(250, 250, 250);" class="gmail-px-md gmail-xs:px-0"><span class="gmail-pdp-flair-slot" name="post-flair"><span><span></span></span></span></div><span style="display: contents; font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", sans-serif; font-size: 14px; background-color: rgb(250, 250, 250);" aria-label="previous-actions-popup"><span aria-describedby="faceplate-tooltip"><div style="margin: 0px; width: fit-content; border-width: 0rem; background-color: transparent;" class="gmail-w-fit gmail-m-0 gmail-border-0 gmail-bg-transparent gmail-cursor-pointer gmail-z-[1]"><span style="padding-bottom:0.5rem" class="gmail-pb-xs" name="mod-content-state-indicators"></span></div></span></span><span style="font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", sans-serif; font-size: 14px; color: rgb(19, 19, 19); background-color: rgb(250, 250, 250);" name="text-body"><div class="gmail-text-neutral-content"><div style="margin-bottom:0.5rem;padding-left:0px;padding-right:0px" class="gmail-mb-sm gmail-mb-xs gmail-px-md gmail-xs:px-0"><div style="line-height:1.25rem;font-size:0.875rem" class="gmail-md gmail-text-14" id="gmail-t3_1e4te8m-post-rtjson-content"><p style="margin-bottom:1rem;margin-top:0px"><strong style="margin-top:0px;margin-bottom:0px"><br></strong></p><p style="margin-bottom:1rem;margin-top:0px"><strong style="margin-top:0px;margin-bottom:0px">Tor-Messaging: Introducing & Discussing "Reflec-Tor"s as concept | Exit-Relay as Entry-Relay |</strong></p><p style="margin-bottom:1rem">Hello,</p><p style="margin-bottom:1rem">I think this belongs to this core, general, relay topic-forum, as it is also a development & community issue, request and efford, I post it here into the reddit forum for your core discussion:</p><p style="margin-bottom:1rem">The idea is to add next to Bridges, Relays and Exit-Nodes also "Entry-Nodes" as "Reflec-Tor"(s) to the point of Exit-Nodes. Hence: Exit-Nodes are developed futher to be also an Entry-Node.</p><p style="margin-bottom:1rem">Some may remember when gnutella got hybrid with edonkey and then also with torrent, Mike Stokes from Shareaza did that.</p><p style="margin-bottom:1rem">The idea today, 20 years later, is to add some Echo-capabilities to Tor in regard of the servers for Exit and Entry.</p><p style="margin-bottom:1rem"><strong style="margin-top:0px;margin-bottom:0px">Vision: Every (updated) Exit-Node is an Echo-Server - For a better Tor-Messaging.</strong></p><p style="margin-bottom:1rem">What does that mean?</p><p style="margin-bottom:1rem">An Echo-Server is a server for chat-messaging to send an incomming message packet again out to all connected clients at the moment. Ping-in and Ping-Out to all. That simple, that's why it is called the Echo. Like a shout in front of a forrest, all connected users can hear and get the (encrypted) shout or message or packet back from the tree wall.</p><p style="margin-bottom:1rem">There are 3 software applications for Echo-Servers:</p><ul style="margin-bottom:1rem;padding-left:2rem"><li style="margin-top:0px"><p style="margin-bottom:0px;margin-top:0px"><a style="text-decoration-line:none;font-size:1em;margin-top:0px;margin-bottom:0px" target="_blank" rel="noreferrer nofollow noopener" href="https://github.com/textbrowser/spot-on" class="gmail-relative gmail-pointer-events-auto gmail-a gmail-hover:underline">https://github.com/textbrowser/spot-on</a> (Desktop, sercer in the Listener Tab)</p></li><li style="margin-top:0.25rem"><p style="margin-bottom:0px;margin-top:0px"><a style="text-decoration-line:none;font-size:1em;margin-top:0px;margin-bottom:0px" target="_blank" rel="noreferrer nofollow noopener" href="https://github.com/textbrowser/smokestack" class="gmail-relative gmail-pointer-events-auto gmail-a gmail-hover:underline">https://github.com/textbrowser/smokestack</a> (java for Android)</p></li><li style="margin-top:0.25rem;margin-bottom:0px"><p style="margin-bottom:0px;margin-top:0px"><a style="text-decoration-line:none;font-size:1em;margin-top:0px;margin-bottom:0px" target="_blank" rel="noreferrer nofollow noopener" href="https://github.com/textbrowser/spot-on-lite" class="gmail-relative gmail-pointer-events-auto gmail-a gmail-hover:underline">https://github.com/textbrowser/spot-on-lite</a> (headless deamon for Linux)</p></li></ul><p style="margin-bottom:1rem">Now, the Listener function with ping in and ping out should be implemented within a Tor-Exit-Node.</p><p style="margin-bottom:1rem">When it comes to Tor-Messaging, there are some pathes possible:</p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">A) Tor-Chat-Client-Alice - Tor - Internet - Echo-Server - Internet - Tor - Tor-Chat-Client-Bob (Tor-proxied Chat-Server, which only accepts encrypted packets)</code></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">B) Tor-Chat-Client-Alice - Echo - Tor - Tor - Echo - Tor-Chat-Client-Bob (Echo Tor-tunneled)</code></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">C) Tor-Chat-Client-Alice - Echo-Server - Tor-Chat-Client-Bob (direct connection to Echo-Server with only encypted packets)</code></p><p style="margin-bottom:1rem">The request here is to build and develop option A.</p><p style="margin-bottom:1rem">That is just right now also possible, by an Exit-Node of Tor running the Echo-Server-Software on the same machine in parallel. Just the port is different.</p><p style="margin-bottom:1rem">This is an idea for some might be new, but thinking Tor Messaging a bit, it comes quickly to this ideas and better soluttion.</p><p style="margin-bottom:1rem">The way to connect</p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">D) Tor-Chat-Client-Alice - Hidden Onion Server v3 - Tor - Tor - Hidden Onion Server v3 - Tor-Chat-Client-Bob</code></p><p style="margin-bottom:1rem">is the current given way for clientes like RicoChet Refresh, Quiet or Cwtch.</p><p style="margin-bottom:1rem">Similar to Briar, even developers of such clients above tell the loss of messages and low reliability of the hidden to hidden path. Some of you might know, that there were use cases with missing messages in a range of 35-45 %. Don't quote me on that, but as core developers and community members you might be in contact with those who experience this.</p><p style="margin-bottom:1rem">Furthermore the Messaging clients are not advanced in functionality, nor advanced in strong encryption.</p><p style="margin-bottom:1rem">It would be third a long development way to got that route.</p><p style="margin-bottom:1rem">It is cost effective and needs cappable developers.</p><p style="margin-bottom:1rem">Some project have stamped on and made a workable client, but does that unite all our power in the sense of Tor-Messaging?</p><p style="margin-bottom:1rem">Messaging needs a Vision and Statement from the Tor-Core-Developer team with a discussion in the community in that regard with honor to the individual projects and also with support for their chosen path (Model D). At the same time we have to state that it is as it is, a HTTP-Server in the middle like in Model A is faster than Model D.</p><p style="margin-bottom:1rem">In the graph-path the Echo-Server in the middle handles only encrypted traffic, so it is just like another Relay. We can call it "Reflec-Tor". The only sense it to multiply incomming encrypted packets from one node to all connected nodes.</p><p style="margin-bottom:1rem">With that Idea, the Messenger Spot-On could be used as a Tor-Messenger.</p><p style="margin-bottom:1rem">This Messenger has stong encryption and is full of feature for messaging and also cryptography.</p><p style="margin-bottom:1rem">it is like adding Firefox to Tor-Browsing, when Spot-On is added to Tor-Messaging.</p><p style="margin-bottom:1rem">Something to read at the community forum:</p><p style="margin-bottom:1rem"><a style="text-decoration-line:none;font-size:1em;margin-top:0px;margin-bottom:0px" target="_blank" rel="noreferrer nofollow noopener" href="https://www.reddit.com/r/Spot_On_Encryption/" class="gmail-relative gmail-pointer-events-auto gmail-a gmail-hover:underline">https://www.reddit.com/r/Spot_On_Encryption/</a></p><p style="margin-bottom:1rem">Also there is a Mobile Client for Android, which also connects to Reflec-Tors, find "Smoke" Messenger at F-Droid.org.</p><p style="margin-bottom:1rem">Please, get this right, it is not about a technical view on slow and failing chat-packets to hidden servers, and it is not about those start-up clients using this inside technology, some do a good project. It is about the idea, that an Reflec-Tor mirroring and pinging back packets on the Exit-Node this hop within the path of tor is not outside, it is always fully encryted for the messaging packets and should be seen as one Tor-Path, especially if the Listener-Ping-Back function (the Echo capabilities) is build in the Exit-Node-Tor Software.</p><p style="margin-bottom:1rem">Spot-On is already a Tor-Messenger - as it uses also HTTPs and it sends only encrypted packets.</p><p style="margin-bottom:1rem"><strong style="margin-top:0px;margin-bottom:0px">A test is easy to make:</strong></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">(1) Start the Tor-Browser, which has always the Port 9051 to Tor, Tor is running.</code></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">Next to Surfing with Tor-Browser Firefox the Chat with Tor-Messenger Spot-On can start.</code></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">(2) Start Spot-On on a webserver and create in the Listeners Tab a Listener on Port 4710.</code></p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px">(3) Start two Spot-On Instances Alice and Bob on two Laptops, in the Neighbors Tab you connect the Webserver via Tor: Add the IP and Port 4710 to the neighbor and choose Proxy:</code> <a style="text-decoration-line:none;font-size:1em" target="_blank" rel="noreferrer nofollow noopener" href="http://127.0.0.1/" class="gmail-relative gmail-pointer-events-auto gmail-a gmail-hover:underline">127.0.0.1</a> <code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-bottom:0px">Port 4710.</code></p><p style="margin-bottom:1rem">You get the the Path:</p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">Tor-Chat-Client-Alice - Tor - Internet - Echo-Server - Internet - Tor - Tor-Chat-Client-Bob</code></p><p style="margin-bottom:1rem">The idea is now to integrate this a bit more:</p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">Tor-Chat-Client-Spot-On-Alice - Tor - [Tor-Exit-Node also Reflec-Tor (Echo-Server)] - Tor - Tor-Chat-Client-Spot-On-Bob</code></p><p style="margin-bottom:1rem">You see, the way stays all within the Tor-Family.</p><p style="margin-bottom:1rem">For sure, in case Alice does not want to use Tor, she also can message to Bob, who is behind Tor.</p><p style="margin-bottom:1rem"><code style="border-radius:4px;padding:2px 4px;font-size:0.9em;margin-top:0px;margin-bottom:0px">Tor-Chat-Client-Spot-On-Alice --> [Tor-Exit-Node as Entry-Node also Reflec-Tor (Echo-Server)] - Tor - Tor-Chat-Client-Spot-On-Bob</code></p><p style="margin-bottom:1rem">The IP of an Entry-Node is shown in the Tor-Browser and can get a port added. Then two user can simply cata over that node.</p><p style="margin-bottom:1rem">We need in times of surveillance, data retention, chat control and for sake of the needs of whistleblowser and people who want to chat privat and anonymously more decentral and open source chat server.</p><p style="margin-bottom:1rem"><strong style="margin-top:0px;margin-bottom:0px">The mission is: Every Tor-Exit Node is an Entry-Node for Chat.</strong></p><p style="margin-bottom:1rem">It should be not a lot of code to be added to the ports of an Exit-Node and displaying the Port of the Exit-Node in the Tor-Browser path icon.</p><p style="margin-bottom:1rem">This makes sense in several effects to be discussed and developed further:</p><ul style="margin-bottom:1rem;padding-left:2rem"><li style="margin-top:0px"><p style="margin-bottom:0px;margin-top:0px">Taking the next Development Step for Tor-Messaging: BTW, A Forum about Tor-Messaging could be made as a category here in the forum please.</p></li><li style="margin-top:0.25rem;margin-bottom:0px"><p style="margin-bottom:0px;margin-top:0px">directly support Tor-based Messaging for the Spot-On Messaging client</p></li></ul><p style="margin-bottom:1rem">To be developed and discussed is, if this infra-structure could help to</p><ul style="margin-bottom:1rem;padding-left:2rem"><li style="margin-top:0px"><p style="margin-bottom:0px;margin-top:0px">support bootstrapping of Tor</p></li><li style="margin-top:0.25rem"><p style="margin-bottom:0px;margin-top:0px">support Censorship circumvention of Tor Reflec-Tors as SnowFlakes over the Messenger with EPKS</p></li><li style="margin-top:0.25rem;margin-bottom:0px"><p style="margin-bottom:0px;margin-top:0px">Accept, that some routing to an HTTPS internet server at the Tor-Node is faster than to an hidden onion server at the Tor Node.</p></li></ul><p style="margin-bottom:1rem">Well, to add some "ping-in-and-out" for an packet is what every netcat and socat under linux can do. It is a small development step to make each Tor-Exit node a free chat server for messaging, which is a big step for mankind to have a network of free messaging chat servers.</p><p style="margin-bottom:1rem">Lets also see, how users and community will test and develop this messaging. So it is not only a discussion for developers, it is also a step forward the needs of the communities <strong style="margin-top:0px;margin-bottom:0px">for a free internet:</strong></p><ul style="margin-bottom:1rem;padding-left:2rem"><li style="margin-top:0px;margin-bottom:0px"><p style="margin-bottom:0px;margin-top:0px"><strong style="margin-top:0px;margin-bottom:0px">for chat and their discussions.</strong></p></li></ul><p style="margin-bottom:1rem">A few code lines to exit nodes make them a Reflec-Tor and messaging over Tor can start really decentral and open source and free.</p><p style="margin-bottom:1rem"><strong style="margin-top:0px;margin-bottom:0px">What do you think?</strong> does this privacy-concept bring more privacy and reliability in packet delivery to messaging with Tor?</p><p style="margin-bottom:0px">Regards</p></div></div></div></span></div></div></div></div>
</blockquote><br>
</div>