[tor-dev] Proposal 273: Exit relay pinning for web services

teor teor2345 at gmail.com
Sun Oct 16 00:09:25 UTC 2016


> On 7 Oct 2016, at 00:22, s7r <s7r at sky-ip.org> wrote:
> 
> I don't care about location anonymity because my
> website is clearnet public anyway and I want my website to handle many
> Tor users, just setup a bridge Tor instance on localhost (127.0.0.1) not
> published to the bridge authority, point the second Tor instance to use
> bridge 127.0.0.1:port and single hop hidden services.

I don't understand why you have an extra bridge relay here.
Can't you just use HiddenServicePort 80 ?

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------------







-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20161016/a9e6d50e/attachment.sig>


More information about the tor-dev mailing list