[tor-talk] Using EOTK to put clearnet websites onto onion addresses

Nurmi, Juha juha.nurmi at ahmia.fi
Thu Feb 9 04:48:49 UTC 2017

Thanks Alec!

This is very useful. Especially plain HTTP sites are unsafe because the
attacker might inject something to HTTP traffic. For some weird reason many
popular sites, like CNN in your example, are not supporting HTTPS. As a
result, exit node or someone else can inject something nasty to this
traffic. Tor user may want to see videos and interactive content of these
sites and activates JS and videos (the user trusts CNN, but does not see
the problem with HTTP).


On Sun, Feb 5, 2017 at 6:37 PM, Alec Muffett <alec.muffett at gmail.com> wrote:

> I released EOTK (Enterprise Onion Toolkit) a few days ago.
> It's "alpha" code, very much still in development.
> I posted a couple of videos of how to set it up:
> * Introduction: https://www.youtube.com/watch?v=ti_VkVmE3J4
> * Rough Edges & "Gotchas": https://www.youtube.com/watch?v=UieLTllLPlQ
>      - alec
> --
> http://dropsafe.crypticide.com/aboutalecm
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

More information about the tor-talk mailing list