Re: [tor-talk] [tahoe-dev] switching from introducers to gossip?

2012-07-11 Thread Eugen Leitl
- Forwarded message from Michael Rogers mich...@briarproject.org - From: Michael Rogers mich...@briarproject.org Date: Wed, 11 Jul 2012 14:45:21 +0100 To: jam...@echeque.com, Tahoe-LAFS development tahoe-...@tahoe-lafs.org Subject: Re: [tahoe-dev] switching from introducers to gossip?

[tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
I think the concept of hidden services has a lot potential. Not only because they are hidden. Let's face it: - You get a free domain for live. - You get transparent, free end to end encryption. No flawed root CA system. - That's something remarkable, isn't it? With some modifications/improvements

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Fabio Pietrosanti (naif)
Yo, i really appreciate such discussion about empowering TorHS, a lot of work still have to be done to make proper leverage of the capabilities that TorHS provide. On 7/11/12 5:36 PM, proper wrote: I think the concept of hidden services has a lot potential. Not only because they are hidden.

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Rejo Zenger
Hi, - You get transparent, free end to end encryption. No flawed root CA system. Just curious, maybe I am overlooking something: how would this be better than a self-signed and self-generated certificate (apart from the user not being nagged with a warning)? -- Rejo Zenger . r...@zenger.nl

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread Gregory Maxwell
On Wed, Jul 11, 2012 at 2:30 PM, Rejo Zenger r...@zenger.nl wrote: Hi, - You get transparent, free end to end encryption. No flawed root CA system. Just curious, maybe I am overlooking something: how would this be better than a self-signed and self-generated certificate (apart from the user

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
Rejo Zenger: Hi, - You get transparent, free end to end encryption. No flawed root CA system. Just curious, maybe I am overlooking something: how would this be better than a self-signed and self-generated certificate (apart from the user not being nagged with a warning)? Self-signed:

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
Fabio Pietrosanti (naif): Yo, i really appreciate such discussion about empowering TorHS, a lot of work still have to be done to make proper leverage of the capabilities that TorHS provide. On 7/11/12 5:36 PM, proper wrote: I think the concept of hidden services has a lot potential. Not

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread tor-admin
Am Mittwoch, 11. Juli 2012, 17:43:52 schrieb Fabio Pietrosanti: Don't exaggerate, it still need a software client to access them, so the usability is heavily impacted. This imply that TorHS are not for general uses in the context of mutual anonymity . What about a Firefox/Chromium addon, that

Re: [tor-talk] hidden services 2.0 brainstorming

2012-07-11 Thread proper
tor-admin: Am Mittwoch, 11. Juli 2012, 17:43:52 schrieb Fabio Pietrosanti: Don't exaggerate, it still need a software client to access them, so the usability is heavily impacted. This imply that TorHS are not for general uses in the context of mutual anonymity . What about a Firefox/Chromium