[tor-talk] What are use cases made unpleasant by Tor's speed?
andrea at torproject.org
Mon Jul 28 12:15:57 UTC 2014
On Mon, Jul 28, 2014 at 12:45:33AM -0600, Mirimir wrote:
> On 07/27/2014 09:24 AM, Virgil Griffith wrote:
> > Any others that come to mind from anyone?
> I'm very intrigued by possibilities of multiple hidden services with
> fast HS-HS links via Tor. One use case would be the standard
> front-end/back-end website design. Another would be "smart"
> load-balancing proxies, which could detect and foil attacks such as
> DDoS, localization, and so on. Another would be full anonet-style
> darknets, using OnionCat or OpenVPN via Tor.
This might win from authenticated hidden services and then building shorter
circuits, since if the client and HS are controlled by the same person,
then preserving the client's anonymity *from the HS* rather than an
observing third party is less important.
<andrea at torproject.org>
PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF DE79 A4FF BC34 F01D D536
PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5 DF7E 4191 13D9 D0CF BDA5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 840 bytes
Desc: not available
More information about the tor-talk