Two Tor questions:

1) Is Tor purely for clients (applications making outbound connections), 
or can Tor be used for servers (applications receiving inbound connections)?

2) Are Tor relays hosted purely by volunteers with nothing to gain, or 
is there a sort of "tit for tat" such that two peers looking to 
anonymize their traffic can "swap identities"?


I ask because I wonder if tit-for-tat anonymizing and anonymous hosting 
could go well together with a protocol based on two major operations:

- I will make a request to anywhere on the internet and give its 
response to you, if you do something for me.

- I will open up a port and send any requests I receive to you, if you 
do something for me.


That "something" could be a direct value swap -- I open a port for you, 
you open a port for me.  Or it could be anything: I make a request for 
you, and you give me a block of data.  Together it could make for a 
powerful swarming downloader with built-in onionskin network, that 
doesn't rely upon the generosity of Tor volunteers.

I got thinking along these lines when trying to come up with a 
constructive response to Will's currency-based streaming network.  (I 
hate it when people have nothing but negative feedback, so I'm trying 
not to fall into the same trap.)  But I kept getting hung up on the 
"unbacked" nature of online currency, where anybody can wipe their 
"credit history" clean and just refuse to honor past obligations without 
penalty.  (And the complexity and game-ability of solutions to that 
problem.)  This led me to think that bartering tit-for-tat style (eg, we 
immediately exchange direct value) is a more reliable form of online 
currency.  But that only works if the other side has something you want 
right now.  From there it occurred to me that onionskin networks are 
always looking for identities to route through, and that could be used: 
even if I don't have any data to give you right now, I can let you make 
requests through my identity so you can anonymize your traffic.  I get 
data, you get privacy, we all win.

But of course, this isn't at all limited to data exchange, this could be 
use to anonymize *any* server or P2P application -- HTTP webservers, SIP 
VoIP, etc.  (And with dynamic DNS you could even use real names, though 
obviously that creates a new central vulnerability, so maybe one of the 
distributed DNS layers could help out here.)



Anyway, I was just mulling this over while walking my dog so apologies 
if this idea has already been well explored, but any thoughts you have 
along these lines would be appreciated.  Thanks!

-david



_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to