On 09/17/2014 03:04 PM,
bm-2cuqbqhfvdhuy34zcpl3pngkplueeer...@bitmessage.ch wrote:
> Why is Tor wasting time in implementing secure hidden services? Why not
> copy from here if they are doing it right:
> 
> Tor   I2P
> Cell  Message
> Client        Router or Client
> Circuit       Tunnel
> Directory     NetDb
> Directory Server      Floodfill Router
> Entry Guards  Fast Peers
> Entry Node    Inproxy
> Exit Node     Outproxy
> Hidden Service        Eepsite or Destination
> Hidden Service Descriptor     LeaseSet
> Introduction point    Inbound Gateway
> Node  Router
> Onion Proxy   I2PTunnel Client (more or less)
> Relay Router
> Rendezvous Point      somewhat like Inbound Gateway + Outbound Endpoint
> Router Descriptor     RouterInfo
> Server        Router
> 
> Why not distributed directory authorities and hardcoded?

Huh? Tor uses distributed directory authorities, and the main ones are
hardcoded in the software.

> Why not secure tunnels independent of guards?

Using entry guards protects against Sybil attacks.

> Or does Tor want to remain less secure?

;)

See
http://tor.stackexchange.com/questions/27/how-does-tors-threat-model-differ-from-i2ps-threat-model.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to