[tor-talk] wake up tor devs

Mirimir mirimir at riseup.net
Wed Sep 17 22:06:57 UTC 2014


On 09/17/2014 03:04 PM,
BM-2cUqBqHFVDHuY34ZcpL3PNgkpLUEEer8ev at bitmessage.ch wrote:
> Why is Tor wasting time in implementing secure hidden services? Why not
> copy from here if they are doing it right:
> 
> Tor	I2P
> Cell	Message
> Client	Router or Client
> Circuit	Tunnel
> Directory	NetDb
> Directory Server	Floodfill Router
> Entry Guards	Fast Peers
> Entry Node	Inproxy
> Exit Node	Outproxy
> Hidden Service	Eepsite or Destination
> Hidden Service Descriptor	LeaseSet
> Introduction point	Inbound Gateway
> Node	Router
> Onion Proxy	I2PTunnel Client (more or less)
> Relay	Router
> Rendezvous Point	somewhat like Inbound Gateway + Outbound Endpoint
> Router Descriptor	RouterInfo
> Server	Router
> 
> Why not distributed directory authorities and hardcoded?

Huh? Tor uses distributed directory authorities, and the main ones are
hardcoded in the software.

> Why not secure tunnels independent of guards?

Using entry guards protects against Sybil attacks.

> Or does Tor want to remain less secure?

;)

See
http://tor.stackexchange.com/questions/27/how-does-tors-threat-model-differ-from-i2ps-threat-model.


More information about the tor-talk mailing list