Delivery-Date: Tue, 26 Aug 2014 07:56:20 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_ADSP_ALL,
	DKIM_SIGNED,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id DED511E0AF8;
	Tue, 26 Aug 2014 07:56:18 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 7E62330A4B;
	Tue, 26 Aug 2014 11:56:14 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 1CCFC30919
 for <tor-talk@lists.torproject.org>; Tue, 26 Aug 2014 11:56:11 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id DGcZrziIUpug for <tor-talk@lists.torproject.org>;
 Tue, 26 Aug 2014 11:56:11 +0000 (UTC)
Received: from diserzione.investici.org (diserzione.investici.org
 [82.221.99.153])
 by eugeni.torproject.org (Postfix) with ESMTP id DFAB930909
 for <tor-talk@lists.torproject.org>; Tue, 26 Aug 2014 11:56:09 +0000 (UTC)
Received: from [82.221.99.153] (diserzione [82.221.99.153]) (Authenticated
 sender: griffin@cryptolab.net) by localhost (Postfix) with ESMTPSA id
 BB55F180C72; Tue, 26 Aug 2014 11:50:31 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cryptolab.net;
 s=stigmate; t=1409053831;
 bh=nHQdgCfxXDGreirXUNSfQrpQC7djgnN/SStK0oUPOzA=;
 h=Date:From:To:Cc:Subject:In-Reply-To:References;
 b=CCehM5z9/1a1r9jMovq+NwSK862Eap132ynndF3NrvPLlb3kLnAzQMWzFaEwEUtg/
 1klnk8t7bnJjoym8+QbgnNX6xMP6gAccP1T4+6I3J5XxufwP5RQYI5jBoxOLgZBk9X
 HF2G5L9leQA1j9bxNenbzOl/DdEIfS9XYOBQby14=
MIME-Version: 1.0
Date: Tue, 26 Aug 2014 07:50:31 -0400
From: Griffin Boyce <griffin@cryptolab.net>
To: tor-talk@lists.torproject.org
In-Reply-To: <CAHXoDSCXBOmt73S=fQWiqkgue2gry+6t785q1u-x0LzYLrAQAA@mail.gmail.com>
References: <CAHXoDSCXBOmt73S=fQWiqkgue2gry+6t785q1u-x0LzYLrAQAA@mail.gmail.com>
Message-ID: <85ba70697fd7cb213c6cb3692967368e@cryptolab.net>
X-Sender: griffin@cryptolab.net
User-Agent: Roundcube Webmail
Subject: Re: [tor-talk] Hidden services, what is recommended
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Martin S wrote:
> Today I've had a conversation with colleague regarding email
> encryption, encrypted telephony and hidden services on the Tor
> network. In regards to the latter, what - in your opinion - would be
> suitable services to put on Tor (.onion) sites? Would you for example
> put PGP keys exchanges on there? There might be interest in running
> chat or other communications or document sharing.

   Actually, what you're describing are some of the more common uses of 
hidden services.  Some people run xmpp or irc servers as hidden services 
to have truly private chat among their friends (plus you can run a web 
client like qwebirc).  A human rights nonprofit recently asked me to set 
up a PGP public key server as a hidden service.  Lots of people run 
cozy.io instances as hidden services for "personal clouds" calendar, 
contacts, task list, documents etc.  A good friend of mine set up his 
RSS feeds to pipe into a hidden service, and just uses the Tor browser 
to read the news (even if he's in a filtered location).

   For audio chat, Mumble does okay.  I probably wouldn't recommend it as 
an enterprise solution when used over Tor, but it's pretty good when 
using it in push-to-talk mode.

hope this helps!

best,
Griffin

-- 
"I believe that usability is a security concern; systems that do
not pay close attention to the human interaction factors involved
risk failing to provide security by failing to attract users."
~Len Sassaman
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

