xiando wrote:
>> For example, both A and B are running *non-exit* Tor servers. Now, A
>> want to secretly and securely send a file to B, he(A) doesn't need other
>> mechanisms, he doesn't need to know B's address either, all he needs is
>> B's nickname, he specifies: "I want Tor to transfer my file
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi all,
I've conceived a possibly new usage of the Tor network, I need your
comments.
The problem:
The Tor network is composed of servers run by volunteers from all over
the world, the role of these servers is solely to relay traffic, the
benefits w
Yo
> For example, both A and B are running *non-exit* Tor servers. Now, A
> want to secretly and securely send a file to B, he(A) doesn't need other
> mechanisms, he doesn't need to know B's address either, all he needs is
> B's nickname, he specifies: "I want Tor to transfer my file to
> B(nic
3 matches
Mail list logo