Hi, Patrick Schleizer wrote (06 Aug 2014 14:22:30 GMT) : > Well, with OnionCat you must involve Tor Hidden Services as well?
Well, the Debian package description reads: Description: IP-Transparent Tor hidden service connector OnionCat creates a transparent IP layer on top of Tor hidden services. It transparently transmits any kind of IP-based data through the Tor network on a location hidden basis. You can think of it as a point-to-multipoint VPN between hidden services. . OnionCat is a stand-alone application which runs in userland and is a connector between Tor and the local OS. Any protocol based on IP, such as UDP or TCP, can be transmitted. . OnionCat supports IPv6; native IPv4 forwarding, though still available, is deprecated: the recommended solution for IPv4 forwarding is to build a IPv4-through-IPv6 tunnel through OnionCat. >> how do you initiate >> a peer-to-peer conversation between two Tails users using Mumble? >> >> In other words: which Mumble server do you use, and how much do you >> need to trust it? > I would assume, that documentation would say, that one of the two Tails > user must bite the bullet and set up a Tor Hidden Service Murmur server. I'm curious: did anyone test this and confirmed that Mumble can actually work this way? > Maybe I am missing something here. Would OnionCat improve usability and > ease the process? I'm not sure. The idea (IIRC, was long ago) was to use it to make things work, using UDP if needed. > Or does Mumble have a mode for serverless peer-to-peer connections? Last time I checked, it didn't have any such thing. Cheers, -- intrigeri _______________________________________________ Tails-dev mailing list Tails-dev@boum.org https://mailman.boum.org/listinfo/tails-dev To unsubscribe from this list, send an empty email to tails-dev-unsubscr...@boum.org.