On 5/18/13 12:38 PM, Michael Zeltner wrote:
Hmm, interesting. A friend and I have recently "discovered" an easy Tor
configuration hack to do something similar: https://www.cryptoparty.at/tor2tcp
Would be interested to hear what you think of that. I haven't delved into why
using that instance of Tor for anything else makes it stop accepting
connections, but as a bare configuration it's remarkably simple to set up.
That's a nice hack!
However to make http proxying working properly there's a lot of hackery
related to varios header and html tag rewriting.
Additionally tor2web does also:
- inject a disclaimer header into HEAD (to explain that's a proxy and
you are not hosting content. Mandatory to avoid server takedown)
- optimize connections to reduce latency (with a connection pool to each
destination torhs)
Additionally tor2web is faster than torhs direct access because it use a
custom version of Tor (Tor2web Mode) that *remove* the anonymity on the
"client side" of the access.
In fact a user accessing Tor2web is not anonymous.
And it's strongly advised (by the injected disclaimer header) to
download TBB and goes directly.
--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at [email protected] or changing your settings at
https://mailman.stanford.edu/mailman/listinfo/liberationtech