Re: [tor-talk] Secure hosting

2014-10-27 Thread CJ
On 10/26/2014 01:21 PM, Johnny Cash wrote:
 I'm setting up a blog and I need a secure hosting service.
 
 First, I signed up with HostGator, but received an email telling me I
 needed to call and confirm my account. When I did, they told me my
 application was rejected, because they refuse registrations made over the
 TOR network, due to abuse (to be fair, other proxies too).
 
 Second, I tried SiteGround, but their live chat requires a plugin, which
 could reveal my location.
 
 Since the Snowden documents revealed government complicity, I won't use
 GoDaddy, because of their relationship with Microsoft products.
 
 Last, I'm looking at host, A Small Orange, but they're based in Texas (like
 HostGator), and that entire state makes me hear the theme music from the
 Empire play in my head: dum, dum, duh, dum. ::chills::
 
 Can anyone recommend a good hosting site for a WordPress blog?
 

What about having some small device [at home] running some wordpress
instance and a Tor Hidden Service? This means:
- no way to know who's behind the content unless you let traces (like
captcha…)
- you own the hardware, you can put it wherever you want
- thus you know who's accessing the device (physically I mean).

Downside: users must use Tor in order to access it, or any tor2web
gateway that aren't pwned by some gvt instance, if any.

Cheers,

C.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] recent firefox releases

2014-10-27 Thread Gigi Bigio

registered user
bigi...@cheapnet.it 


Dear Sirs,

 

as far as I understand, recent Firefox releases do not support anymore Vidalia 
and its related possibility to browse anonymously. Though the onion button is 
still present on the top left corner, it will not work, as you know.

The alternative is to use Tor Browser. The problem is that you don't always 
want or need to browse anonymously every time you connect to internet and have 
then to wait for a few seconds (30+) your browser till it gets the line through 
its Tor.

Of course Icould use and older version of Firefox, like release 4, for 
instance, but this is far to old for a satisfactory and safe browsing.

So what can I do? I can not have two different versions of Firefox (i.e. Tor 
Browser + Firefox 31) on my PC, because they interfere the one with the other, 
trying to share, for example, the same Extensions folder and so on.

 

The alternative is to use two different browsers, like Chrome and Tor Browser. 
But what about if I only wanted to use Firefox? Is'n there a way to have a 
version of Firefox with the option to browse anonymously on demand only anymore?

 

Thanks

Giorgio


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] recent firefox releases

2014-10-27 Thread Roger Dingledine
On Mon, Oct 27, 2014 at 09:48:55AM +0100, Gigi Bigio wrote:
 as far as I understand, recent Firefox releases do not support anymore
Vidalia and its related possibility to browse anonymously. Though the
onion button is still present on the top left corner, it will not work,
as you know.

Vidalia was just a program to help you visualize what's going on with
Tor, and help you launch your Tor program. It didn't have anything to
do with Firefox.

But yes, you're right that long ago the Torbutton extension provided a way
to switch your Firefox between using Tor and not using Tor. But that
turned out to be hard to keep safe:
https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton
and in retrospect it was probably a good decision:
http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/

 The alternative is to use Tor Browser. The problem is that you don't
always want or need to browse anonymously every time you connect to
internet and have then to wait for a few seconds (30+) your browser till
it gets the line through its Tor.

Have you tried the recent Tor Browser releases? They start much faster
for me than the old ones.

 Of course Icould use and older version of Firefox, like release 4,
for instance, but this is far to old for a satisfactory and safe browsing.

Agreed, this is not a wise choice.

 So what can I do? I can not have two different versions of Firefox
(i.e. Tor Browser + Firefox 31) on my PC, because they interfere the
one with the other, trying to share, for example, the same Extensions
folder and so on.

This is exactly what many of us do. Tor Browser is designed to not
interfere with your other Firefox install. They shouldn't be interfering
in any way. If they are, either you're using it wrong (in which case
maybe there's a usability issue we can fix), or there's a bug that it
would be great to hear about.

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] using UDPGW and tun2socks over Tor

2014-10-27 Thread grarpamp
On Fri, Oct 24, 2014 at 1:35 AM, Nathan Freitas nat...@freitas.net wrote:
 Is there any reason we shouldn't consider supporting UDP over Tor with
 Orbot, by tunneling the packets using the combination of badvpn's
 tun2socks and udpgw (udp gateway) feature?

There's no reason raw IP itself (any/none of its numbered protocols)
shouldn't / couldn't be transported over Tor using OpnVPN (at least
until Tor itself is extended as such).

 This has come up as we are
 implementing the Android VPNService, and discovered how easy to
 implement and well performing the badvpn UDP tunneling capability is.

 This means we can support SIP calling over Tor, video conference and
 streaming, among other applications...

 https://code.google.com/p/badvpn/
 https://code.google.com/p/badvpn/wiki/tun2socks
 https://github.com/ambrop72/badvpn

... Not necessarily, unless you're statically mapping all the people
(IP's) you want to communicate with beforehand, (which you can't with
random unknown participants ie: Bittorrent, or people on dynamic or
mobile), you're currently constrained by address collisions:
- Trying to pack the entire IPv4 address space you might want to
'call' into your tiny 10.0.0.0/24 adapter space. Same for put entire IPv6
space into your private IPv6/48 adapter space.
- Similarly what you're going to do when Tor moves to wider than
80bit onion addressing which currently fits nicely into a private IPv6/48.
(Need a secure IPv6-onion address mapping layer pushed into a
DHT/blockchain or just resorting to trusting some volunteer run in-net
lookup service.)

edit: Just noticed badvpn's mention of pushing a *VM* on a 10 address
through socks with this, at least for TCP, which is simpler. As opposed
to pushing any app on the raw iron through a *VPN* which could be
constrained as above. Left this anyway for thought in related things.

 It does mean that someone would have to operate the
 gateway/infrastructure portion of udpgw at a capacity necessary to
 handle all udp streaming traffic sent for all Orbot users, but I would
 consider that to be feasible. Perhaps udpgw instances can be run along
 side all Tor exit nodes?

Read below thread flowing on both tor-talk and tor-relays, flows over
May and June, with better specification/answers in later posts.
https://lists.torproject.org/pipermail/tor-relays/2014-May/004516.html
Subject: Ops request: Deploy OpenVPN terminators
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] using UDPGW and tun2socks over Tor

2014-10-27 Thread grarpamp
 On Fri, Oct 24, 2014 at 1:35 AM, Nathan Freitas nat...@freitas.net wrote:

 This means we can support SIP calling over Tor, video conference and
 streaming, among other applications...

Tor as a client also needs support for inbound binds for some apps, at
least at the single per port level when interacting with internet at the far
end. OpenVPN might, or could be extended to arbitrate those port
binding requests.
Hidden services do support such binds in hs-to-hs mode, at least
statically.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread grarpamp
On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo
mle+to...@mega-nerd.com wrote:

http://arxiv.org/pdf/1410.6079v1.pdf

 Could this situation be improved if people ran limited exit nodes that only
 alloed the bitcoin p2p protocol to exit? I for one don't have enough

There are about ten exit nodes that do only this today.
[One of which is run by Mike Hearn who has advocated building in
censorship capabilities to Tor, and blocking (historically) tainted coins
(such as you have now or might receive through otherwise completely
innocent transactions with you, or from your own trans/mixing with
others).]

Then there is question if your client will select such 'only *coin' nodes
versus those with high bandwidth and open exit policies.

There are also a fair number of hidden services in Tor/I2P/CJDNS
that act as bitcoin nodes.

As related tangent, yes, the bitcoin protocol needs to be encrypted
on the wire, at least bitcoin node to bitcoin node with TLS, obviously
and urgently so, particularly if you wish to guard your trans from
wire listeners.

You might be best to in fact run bitcoin always and entirely over Tor,
especially while transacting.
But then also routinely compare that received blockchain to one
you receive via alternate/trusted sources, such as clearnet or signed
bittorrent checkpoints.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread Thomas White
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I didn't realise my nodes didn't allow the bitcoin port. I'll get
right on it.

Also, if anyone in the Tor community has spare capacity, you can also
setup a full bitcoin node on the same server you use as an
exit/relay/bridge and it doesn't take up a great deal of resources
other than disk space (16Gb I think right now and growing slowly). On
my series of exits there is also full bitcoin nodes accessible
exclusively over hidden services and others which are accessible over
regular clearnet.

- -T

On 27/10/2014 19:58, grarpamp wrote:
 On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo 
 mle+to...@mega-nerd.com wrote:
 
 http://arxiv.org/pdf/1410.6079v1.pdf
 
 Could this situation be improved if people ran limited exit nodes
 that only alloed the bitcoin p2p protocol to exit? I for one
 don't have enough
 
 There are about ten exit nodes that do only this today. [One of
 which is run by Mike Hearn who has advocated building in censorship
 capabilities to Tor, and blocking (historically) tainted coins 
 (such as you have now or might receive through otherwise
 completely innocent transactions with you, or from your own
 trans/mixing with others).]
 
 Then there is question if your client will select such 'only *coin'
 nodes versus those with high bandwidth and open exit policies.
 
 There are also a fair number of hidden services in Tor/I2P/CJDNS 
 that act as bitcoin nodes.
 
 As related tangent, yes, the bitcoin protocol needs to be
 encrypted on the wire, at least bitcoin node to bitcoin node with
 TLS, obviously and urgently so, particularly if you wish to guard
 your trans from wire listeners.
 
 You might be best to in fact run bitcoin always and entirely over
 Tor, especially while transacting. But then also routinely compare
 that received blockchain to one you receive via alternate/trusted
 sources, such as clearnet or signed bittorrent checkpoints.
 

- -- 
Fingerprint: 9DB0 082F 8FE2 E691 DA2A 6D03 4DAE 4226 9EB0 EB0B
Fingerprint: FAA4 2253 AA4B 38D0 1BC4 085E F688 CEF6 F9BF D57F
OTR IRC: DF63021D 27973EAA 02FA4DF6 9E52C9E0 8821E0EF
OTR XMPP: 77DB65BC C417C4DD 19F9664D 83D6D3FB 6C3D3A0E

Twitter: https://twitter.com/CthulhuSec

Not familiar with PGP? Get started today:
http://www.bitcoinnotbombs.com/beginners-guide-to-pgp/
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)
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=jdgx
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] using bridges with dns name

2014-10-27 Thread Angel García
Here is my problem:
The network administrator of my job search the firewall's (squid) log for
anything strange, so when tor connects using a bridge, the firewall's log
show:
...
mail.google.com
www.frootvpn.com
23.54.23.32  - bridge's ip
bits.wikimedia.org
startpage.com
...
I get the dns name of the bridge's ip and put it in the configuration of
Vidalia, but the ip keeps showing in the log.

My question is, is there a way to tell tor to use dns names for bridges
instead of ip, in a way that the dns name is registered by the firewall
instead of the ip?
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Here are some Bitcoin reliable nodes sponsored by Thomas (TheCthulhu)
accessible via Tor hidden services:

h2vlpudzphzqxutd.onion

sbow7bnje2f4gcvt.onion

dioq2yg3l5ptgpge.onion

All use Bitcoin default port 8333. These servers are up all the time
and very fast.

Hidden services are end-to-end encrypted so the risk of MITM between
nodes does not exist. Also, if you run bitcoin in such a way with
onlynet=tor enabled in config, nobody listening your wire can have a
slight clue that you use bitcoin.

We think tor-hidden-services only Bitcoin nodes are a very important
part of the Bitcoin ecosystem.

Getting them running is quite simple. You just need disk space, at
least 50GB free for now. Here are some guides:

https://www.sky-ip.org/configure-bitcoin-node-debian-ubuntu.html

https://www.sky-ip.org/configure-bitcoin-node-freebsd.html

On 10/27/2014 10:03 PM, Thomas White wrote:
 I didn't realise my nodes didn't allow the bitcoin port. I'll get 
 right on it.
 
 Also, if anyone in the Tor community has spare capacity, you can
 also setup a full bitcoin node on the same server you use as an 
 exit/relay/bridge and it doesn't take up a great deal of resources 
 other than disk space (16Gb I think right now and growing slowly).
 On my series of exits there is also full bitcoin nodes accessible 
 exclusively over hidden services and others which are accessible
 over regular clearnet.
 
 -T
 
 On 27/10/2014 19:58, grarpamp wrote:
 On Thu, Oct 23, 2014 at 7:35 PM, Erik de Castro Lopo 
 mle+to...@mega-nerd.com wrote:
 
 http://arxiv.org/pdf/1410.6079v1.pdf
 
 Could this situation be improved if people ran limited exit
 nodes that only alloed the bitcoin p2p protocol to exit? I for
 one don't have enough
 
 There are about ten exit nodes that do only this today. [One of 
 which is run by Mike Hearn who has advocated building in
 censorship capabilities to Tor, and blocking (historically)
 tainted coins (such as you have now or might receive through
 otherwise completely innocent transactions with you, or from your
 own trans/mixing with others).]
 
 Then there is question if your client will select such 'only
 *coin' nodes versus those with high bandwidth and open exit
 policies.
 
 There are also a fair number of hidden services in Tor/I2P/CJDNS
  that act as bitcoin nodes.
 
 As related tangent, yes, the bitcoin protocol needs to be 
 encrypted on the wire, at least bitcoin node to bitcoin node
 with TLS, obviously and urgently so, particularly if you wish to
 guard your trans from wire listeners.
 
 You might be best to in fact run bitcoin always and entirely
 over Tor, especially while transacting. But then also routinely
 compare that received blockchain to one you receive via
 alternate/trusted sources, such as clearnet or signed bittorrent
 checkpoints.
 
 
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJUTseIAAoJEIN/pSyBJlsRvDsH/1JTXOExUnLAtec2uGhloCAu
xuacUvwPAY9iJ102/PMQhFS6O2kc9tABiKPPWa2GSAx2pBlXuBSq74Rij8Q+bpv/
8VYAxT0uyVEGvXs2k579exuWrNkQ3uRQZcBnh/+EGBC+8UybaT9HGN1qnZ0vcI0r
+zW54ma8P+FY8JfxQVauDEJZtsrAXnr+2Riwzqd47l6aScM7PVKoVq/eLBuTwf5x
TqoxmxVuFdLxDxiReq73/8g2x9ecFjvrGb1/qkLo7mdV5f01/24gYP1EpXbbN8Rf
2C2fuYXihvJfGVtRkug1X9Wf+hwTIGgiGnIc+rhwg24NP62qPm3+Kxngs/zfysE=
=law6
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread Seth David Schoen
s7r writes:

 All use Bitcoin default port 8333. These servers are up all the time
 and very fast.
 
 Hidden services are end-to-end encrypted so the risk of MITM between
 nodes does not exist. Also, if you run bitcoin in such a way with
 onlynet=tor enabled in config, nobody listening your wire can have a
 slight clue that you use bitcoin.

I don't mean to disparage the contribution of people who are running
Bitcoin hidden service nodes.  I think that's a very useful
contribution.

I do want to question three things about the benefits of doing so.

First, the security of hidden services among other things relies on the
difficulty of an 80-bit partial hash collision; even without any new
mathematical insight, that isn't regarded by NIST as an adequate hash
length for use past 2010.  (There has been some mathematical insight about
attacking SHA-1, which Tor hidden service names use, although I don't
remember whether any of it is known to be useful for generating partial
preimages.)  Tor hidden service encryption doesn't consistently use crypto
primitives that are as strong as current recommendations, though I think
they matched recommendations when the Tor hidden service protocol was
first invented.  That means that the transport encryption between a hidden
service user and the hidden service operator is not as trustworthy in
some ways as a modern TLS implementation would be.

Second, a passive attacker might be able to distinguish Bitcoin from other
protocols running over Tor by pure traffic analysis methods.  If a new
user were downloading the entire blockchain from scratch, there would
be a very characteristic and predictable amount of data that that user
downloads over Tor (namely, the current size of the entire blockchain --
23394 megabytes as of today).

Not many files are exactly that size, so it's a fairly strong guess that
that's what the user was downloading.  Even submitting new transactions
over hidden services might not be very similar to, say, web browsing,
which is a more typical use of Tor.  The amount of data sent when
submitting transactions is comparatively tiny, while blockchain updates
are comparatively large but aren't necessarily synchronized to occur
immediately after transaction submissions.  So maybe there's a distinctive
statistical signature observable from the way that the Bitcoin client
submits transactions over Tor.  It would at least be worth studying
whether this is so (especially because, if it is, someone who observes
a particular Tor user apparently submitting a transaction could try to
correlate that transaction with new transactions that the hidden services
first appeared to become aware of right around the same time).

Third, to take a simpler version of the attacks proposed in the new
paper, someone who _only_ uses Bitcoin peers that are all run by
TheCthulhu is vulnerable to double-spending attacks, and even more
devious attacks, by TheCthulhu.  (You might say that TheCthulhu is
very trustworthy and would never attack users, but that does at least
undermine the decentralization typically claimed for Bitcoin because
you have to trust a particular hidden service operator, or relatively
small community of hidden service operators, not to attack you by
manipulating your view of the blockchain and transaction history.)

Using Bitcoin over Tor hidden services might be a good choice for most
users today who want their transactions and private key ownership to
be as private as possible, but it's not free of risk, and it's probably
not an appropriate long-term solution to recommend to the general public
without fixes to some of the technologies involved!

-- 
Seth Schoen  sch...@eff.org
Senior Staff Technologist   https://www.eff.org/
Electronic Frontier Foundation  https://www.eff.org/join
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x107
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread s7r
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Seth,

Totally agree about undermining decentralization by having to trust a
single provider. Nobody recommended that, the addresses were for
informative purpose only, to be used in parallel with other nodes run
by other operators / organizations. No user is forced to use
exclusively peers run by the same operator. An user is free to add as
many hidden nodes for bootstrapping as desired.  Once connected to a
node that node will exchange information about other nodes and so on.

I agree the hidden services are old. There is a nice proposal,
hopefully it will be analyzed more and implemented as soon as possible.


On 10/28/2014 1:19 AM, Seth David Schoen wrote:
 s7r writes:
 
 All use Bitcoin default port 8333. These servers are up all the
 time and very fast.
 
 Hidden services are end-to-end encrypted so the risk of MITM
 between nodes does not exist. Also, if you run bitcoin in such a
 way with onlynet=tor enabled in config, nobody listening your
 wire can have a slight clue that you use bitcoin.
 
 I don't mean to disparage the contribution of people who are
 running Bitcoin hidden service nodes.  I think that's a very
 useful contribution.
 
 I do want to question three things about the benefits of doing so.
 
 First, the security of hidden services among other things relies on
 the difficulty of an 80-bit partial hash collision; even without
 any new mathematical insight, that isn't regarded by NIST as an
 adequate hash length for use past 2010.  (There has been some
 mathematical insight about attacking SHA-1, which Tor hidden
 service names use, although I don't remember whether any of it is
 known to be useful for generating partial preimages.)  Tor hidden
 service encryption doesn't consistently use crypto primitives that
 are as strong as current recommendations, though I think they
 matched recommendations when the Tor hidden service protocol was 
 first invented.  That means that the transport encryption between a
 hidden service user and the hidden service operator is not as
 trustworthy in some ways as a modern TLS implementation would be.
 
 Second, a passive attacker might be able to distinguish Bitcoin
 from other protocols running over Tor by pure traffic analysis
 methods.  If a new user were downloading the entire blockchain from
 scratch, there would be a very characteristic and predictable
 amount of data that that user downloads over Tor (namely, the
 current size of the entire blockchain -- 23394 megabytes as of
 today).
 
 Not many files are exactly that size, so it's a fairly strong guess
 that that's what the user was downloading.  Even submitting new
 transactions over hidden services might not be very similar to,
 say, web browsing, which is a more typical use of Tor.  The amount
 of data sent when submitting transactions is comparatively tiny,
 while blockchain updates are comparatively large but aren't
 necessarily synchronized to occur immediately after transaction
 submissions.  So maybe there's a distinctive statistical signature
 observable from the way that the Bitcoin client submits
 transactions over Tor.  It would at least be worth studying whether
 this is so (especially because, if it is, someone who observes a
 particular Tor user apparently submitting a transaction could try
 to correlate that transaction with new transactions that the hidden
 services first appeared to become aware of right around the same
 time).
 
 Third, to take a simpler version of the attacks proposed in the
 new paper, someone who _only_ uses Bitcoin peers that are all run
 by TheCthulhu is vulnerable to double-spending attacks, and even
 more devious attacks, by TheCthulhu.  (You might say that
 TheCthulhu is very trustworthy and would never attack users, but
 that does at least undermine the decentralization typically claimed
 for Bitcoin because you have to trust a particular hidden service
 operator, or relatively small community of hidden service
 operators, not to attack you by manipulating your view of the
 blockchain and transaction history.)
 
 Using Bitcoin over Tor hidden services might be a good choice for
 most users today who want their transactions and private key
 ownership to be as private as possible, but it's not free of risk,
 and it's probably not an appropriate long-term solution to
 recommend to the general public without fixes to some of the
 technologies involved!
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.22 (MingW32)

iQEcBAEBAgAGBQJUTtX0AAoJEIN/pSyBJlsRbQUIALs7C0PRT2IJa8OO5x+fVk9D
7bqL+1K1Aom62wyhBtkII2Z3/5yE6vMVmNgWfbn/oTfp1nLTmt1dGsJ7ZJmBwOXB
6tTchxeaphZzkTxGTAalE/TQ3Hdtpp0J3Z7kvXFWCyEnDfpAOc0ALF0sDNj56fGp
g9v5oifUBtu5s8XC6i+v+UkiKdZXEgZlvwHCPBTsJwNcSr64VYVu9m6bR45izfkI
RWH7dHsgxcnDsHaMd5p7oN4HFU8Gm2yooGHFdrHl5lNGtyfCHF2Jf7EnYBnzbHUN
B7J+NRR2wkj2WT6kTR4yRVr1vgeK0u66g0FPaRpMFinDT/h1MpKs5Rke15h6CKI=
=gHtN
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or 

Re: [tor-talk] Bitcoin over Tor isn’t a good idea (Alex Biryukov / Ivan Pustogarov story)

2014-10-27 Thread Zenaan Harkness
On 10/28/14, s7r s...@sky-ip.org wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Seth,

 Totally agree about undermining decentralization by having to trust a
 single provider. Nobody recommended that, the addresses were for
 informative purpose only, to be used in parallel with other nodes run
 by other operators / organizations. No user is forced to use
 exclusively peers run by the same operator. An user is free to add as
 many hidden nodes for bootstrapping as desired.  Once connected to a
 node that node will exchange information about other nodes and so on.

 I agree the hidden services are old. There is a nice proposal,
 hopefully it will be analyzed more and implemented as soon as possible.

Do you have a link to what you are thinking of?

What comes to my mind just now is DJB's black box (i.e. make it
simple for the developer to do the right thing):
http://nacl.cr.yp.to/
http://rdist.root.org/2009/07/14/nacl-djbs-new-crypto-library/

-- 
Banned for life from Debian, for suggesting Debian's CoC
is being swung in our faces a little too vigorously.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk