Delivery-Date: Wed, 31 Dec 2014 23:54:12 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID,URIBL_BLOCKED autolearn=ham
	version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 6B05C1E09FC
	for <archiver@seul.org>; Wed, 31 Dec 2014 23:54:10 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 481BE32AD5;
	Thu,  1 Jan 2015 04:54:07 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 6B67132A2C
 for <tor-talk@lists.torproject.org>; Thu,  1 Jan 2015 04:54:03 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 3odUk13o2opA for <tor-talk@lists.torproject.org>;
 Thu,  1 Jan 2015 04:54:03 +0000 (UTC)
Received: from mail-wg0-x236.google.com (mail-wg0-x236.google.com
 [IPv6:2a00:1450:400c:c00::236])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 0C77632775
 for <tor-talk@lists.torproject.org>; Thu,  1 Jan 2015 04:54:00 +0000 (UTC)
Received: by mail-wg0-f54.google.com with SMTP id z12so4943846wgg.27
 for <tor-talk@lists.torproject.org>; Wed, 31 Dec 2014 20:53:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:sender:in-reply-to:references:date:message-id:subject
 :from:to:content-type;
 bh=bP7uce6F7b5LXxR1An477qMzq0Bj0HbWvs+dAR+qZRA=;
 b=MKG1et24yhjo1InQwT3rMX30c8ngqvXvM6rYfD8FZfxgX3d5aNbs6EwZlOFB+V51tO
 o2ug8WATlgxmIy/Flli14XZ8bQmk4M3uemUtNoJQKm8L4+q496wTj2xSX7w8vDlH7C7/
 YSJxT9MxQyFeAvhavXxnOMbBf90s2Qcnr930WM1ea7JX0PEU2sl0HfgrLHA4kU+nKRzw
 N+pUio98yoZDatOKrZcMW81VWiRtCGD78h8zHscT9qLFIF9QCuj8x8CKrX/huiKBdQwZ
 t+FJciojBG9wr4ef//DcQN88S+n+qBHfPhYe2XWlfuBlogMZUz2MJpuMsFz9CAIHlC/K
 wB/g==
MIME-Version: 1.0
X-Received: by 10.194.200.1 with SMTP id jo1mr139458400wjc.64.1420088036441;
 Wed, 31 Dec 2014 20:53:56 -0800 (PST)
Received: by 10.27.179.137 with HTTP; Wed, 31 Dec 2014 20:53:56 -0800 (PST)
In-Reply-To: <54A4A69B.4020803@riseup.net>
References: <54A4A69B.4020803@riseup.net>
Date: Wed, 31 Dec 2014 23:53:56 -0500
X-Google-Sender-Auth: jq54XM-7p3qGg_9PqiS_4NdJqSM
Message-ID: <CAPKwhwuU4nu7f2WYhAvxYR+t_NsEgQ0kEQSbXEMKUx3-FvjBUA@mail.gmail.com>
From: Scott Arciszewski <scott@arciszewski.me>
To: tor-talk@lists.torproject.org
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [tor-talk] Giving Hidden Services some love
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Trigger warning: This entire reply is going to be shameless (though
non-profit) self-promotion.

The current state of diversity in Onion Land is disappointing. So many of
the sites still online emphasize things like drugs, porn, and hacking. I
think everyone would benefit from a wider swath of the population getting
involved in hosting hidden services.

Consequently, I'm specing out a FLOSS desktop self-publishing software
using node-webkit and Tor (set up to use Hidden Services).

Some of the ideas I have already include:

* Simple integration with an Onionimbus provider.
https://github.com/darkitecht/onionimbus_system/wiki
* Namecoin integration

If anyone's interested, I'll set up a repo in the AM.

On Wed, Dec 31, 2014 at 8:44 PM, Thomas White <thomaswhite@riseup.net>
wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> As per Nick's post, I fully agree that hidden services do need some
> work, but I imagine the vast majority of people on this list are not
> skilled in the languages and areas required to do any kind of
> technical reform to them. However, technical reform of them is only
> one aspect.
>
> I've been launching a few of my own hidden services recently with some
> useful things such as Tor project mirrors, as well as my own
> client-side encrypted file host/sync which I've currently got in
> private beta (email me privately if you want to give it a test drive).
> In order to make hidden services a bigger priority and to potentially
> attract more funding from sponsors to Tor Project, I think we as a
> community need to make better use of them. They are end to end
> encryption, thus have held up very well against nation state attackers
> like the NSA and GCHQ, and they do not require exits and that makes
> use of the underutilised capacity of the non-exit relays in the network.
>
> If anyone has any thoughts on what they would like to see as a hidden
> service, I am all ears to suggestion. Whether you can build it or not
> (so yeah, even if it is just an idea throw it at me) I'd love to know
> what you want to see in hidden services.
>
> One of the primary ideas in the works right now for myself is a shared
> host environment which I and a few others are experimenting with ideas
> for, but the premise is each person would be assigned a small virtual
> machine and they could host Wordpress blogs for example, or whatever
> else that would make people more comfortable using hidden services.
>
> So to conclude - if you've got ideas, I'd love to hear them!
>
> Happy new year all,
> T
>
>
> - --
> Activist, anarchist and a bit of a dreamer.
>
> PGP Keys: key.thecthulhu.com
> Current Fingerprint: E771 BE69 4696 F742 DB94 AA8C 5C2A 8C5A 0CCA 4983
> Key-ID: 0CCA4983
> Master Fingerprint: DDEF AB9B 1962 5D09 4264 2558 1F23 39B7 EF10 09F0
> Key-ID: EF1009F0
>
> Twitter: @CthulhuSec
> XMPP: thecthulhu at jabber.ccc.de
> XMPP-OTR: 4321B19F A9A3462C FE64BAC7 294C8A7E A53CC966
> -----BEGIN PGP SIGNATURE-----
>
> iQIcBAEBCgAGBQJUpKaOAAoJEFwqjFoMykmDtGgP+wSEngr2lnqLDRMvmczb2EsM
> yVBw+A0b+qZjFu4U0rJuyFh3SFyCGggm5Wzzphnw40mRgBs/7JMo2CUSdv4MJKg5
> yvvxkDJDI3dZxkH4EiWGb/dr8j3G8LXOYSDUXObHTu89xg0b0N9qP8wc0hMuhesm
> mAXAZl/MAESvnBLfX8YxoM6sT3Uohl1py+rN1icfBSrUqhLDvaRP7e5Lm127gYRj
> OCvOtHp4GGL6CXIZdXQz9u0xmGXDiytZptE7pZDC3IUOIg0mVxxJs13NEDrv95lA
> RQ8kKvcegcMLOj79KHfZ8BL7RtLbp8d9kbVL6jy/Wk+NTWTDc1zQNk+DZ/aQdekJ
> JH/5bxZRLvigfxGqZuOJfe6RcqKLaXikf02BSYM0szwQArtBvY5U62h83Z3biCRC
> dVq89HKvoP6rvxpMfsd0fW3RfiGTf/6IGxUTExOiNQBd+0c5c6Bx7aeyZMsQiMQ2
> +aDu9ioQ6Dy/4wzbXpzStU/a1g+eiVKFBmWIz6vg2ePW3YcsHKp00qnd17p4Jxox
> 0+LP0agC8F/Y/Ga0oruZm9bqAKa/sHpkiEQFBD5NTzAwSAMwFerd6V48fJrZpYnh
> J65q6dl10Gj487tfMdiOctAmALhC9MCwtbDnnEJLZbqFww5asHs01g4+UxQYDzOA
> vUpdVXXucQRC/47kzKOz
> =wNYn
> -----END PGP SIGNATURE-----
> --
> tor-talk mailing list - tor-talk@lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
>
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

