Greetings, I use the Tor hidden services features in txtorcon that Meejah and I worked on... It's a Tor controller API for Twisted Python applications. In some cases existing Twisted applications can use our Twisted Tor hidden service endpoint and parser without modifying a single line of code.
Here's a powerful one-liner that reuses the Twisted webserver in a new way to service HTTP requests over a Tor hidden service: pip install txtorcon && twistd -n web --port "onion:80" --path ~/public_html you can read more about txtorcon here: http://timaq4ygg2iegci7.onion/ http://txtorcon.readthedocs.org/en/latest/ https://github.com/meejah/txtorcon You might also like the "pastebin" feature of carml: https://github.com/meejah/carml Of course txtorcon is not the only Tor controller API for python. There is also Stem which I believe has similar features that allow you to create Tor hidden services for non-Twisted python apps. Read more about it here: https://stem.torproject.org/ btw if you read the Tor Weekly News then you would have heard about these things =-) If you need verified end-to-end crypto and reliability of data storage then I'd suggest combining Tahoe-LAFS with Tor hidden services. I occasionally organize cryptoparty workshops on using Tahoe-LAFS with Tor hidden services. I can go into great detail about this if anyone is interested. Sincerely, David On Sat, Feb 7, 2015 at 10:52 AM, stef <[email protected]> wrote: > On Thu, Feb 05, 2015 at 02:45:54PM +0200, Александр wrote: >> https://github.com/micahflee/onionshare >> https://onionshare.org/ >> >> Well, it's too "young", but it's OpenSource and the idea is good. >> any thoughts? > > reminds me of my: https://github.com/stef/stash/ > micah has this habit of reimplementing stuff, but then maybe this is more > mature or "userfriendly" than mine which i have never really used. > > -- > otr fp: https://www.ctrlc.hu/~stef/otr.txt
