On 5/18/13 12:38 PM, Michael Zeltner wrote:
Hmm, interesting. A friend and I have recently "discovered" an easy Tor
configuration hack to do something similar: https://www.cryptoparty.at/tor2tcp

Would be interested to hear what you think of that. I haven't delved into why
using that instance of Tor for anything else makes it stop accepting
connections, but as a bare configuration it's remarkably simple to set up.
That's a nice hack!

However to make http proxying working properly there's a lot of hackery related to varios header and html tag rewriting.

Additionally tor2web does also:
- inject a disclaimer header into HEAD (to explain that's a proxy and you are not hosting content. Mandatory to avoid server takedown) - optimize connections to reduce latency (with a connection pool to each destination torhs)

Additionally tor2web is faster than torhs direct access because it use a custom version of Tor (Tor2web Mode) that *remove* the anonymity on the "client side" of the access.
In fact a user accessing Tor2web is not anonymous.

And it's strongly advised (by the injected disclaimer header) to download TBB and goes directly.


--
Fabio Pietrosanti (naif)
HERMES - Center for Transparency and Digital Human Rights
http://logioshermes.org - http://globaleaks.org - http://tor2web.org

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at [email protected] or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to