On 05/18/2012 04:35 AM, Nick M. Daly wrote:
...

Tor Hidden Services (or other protocols, maybe I2P, GNUnet, etc) can act
as static IP addresses.  So, if I use that to host the FreedomBuddy
service, my friends will be able to find me, because that location is my
unchanging, cryptographic identity.

We could stop right here and have no need for the FreedomBuddy service,
but there's one functional problem: communicating over Tor is really
slow.  So, we can use the FreedomBuddy system to exchange our current IP
addresses (for any service), and connect directly to one another,
without going through any sort of proxy.  This sort of connection, while
less anonymous, is usually much faster.

this is really cool! by exposing FreedomBuddy as a Tor Hidden Service there's no DNS resolution involved for service discovery. to find a service, the client only needs to know the public key or hash thereof, which is the .onion address.

would this work together with monkeysphere to connect the ssl-cert to the gpg-cert and this way allowing verified HTTPS connections?

-michael


Finally, since we already have a whitelist of permitted users (through
their PGP keys), you could configure each service to allow only
whitelisted users to connect.

Nothing in the above is new.  However, it's nice to have a standardized
system behind it, making it more accessible to less technical users.

Nick



_______________________________________________
Freedombox-discuss mailing list
Freedombox-discuss@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss


_______________________________________________
Freedombox-discuss mailing list
Freedombox-discuss@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss

Reply via email to