Delivery-Date: Wed, 24 Feb 2016 06:08:47 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 280351E042B;
	Wed, 24 Feb 2016 06:08:45 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 8F07B399D6;
	Wed, 24 Feb 2016 11:08:40 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 89E6A3999B
 for <tor-talk@lists.torproject.org>; Wed, 24 Feb 2016 11:08:37 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id LYy6vPbITluR for <tor-talk@lists.torproject.org>;
 Wed, 24 Feb 2016 11:08:37 +0000 (UTC)
Received: from mail-wm0-x236.google.com (mail-wm0-x236.google.com
 [IPv6:2a00:1450:400c:c09::236])
 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 3E6DE39918
 for <tor-talk@lists.torproject.org>; Wed, 24 Feb 2016 11:08:37 +0000 (UTC)
Received: by mail-wm0-x236.google.com with SMTP id a4so24411276wme.1
 for <tor-talk@lists.torproject.org>; Wed, 24 Feb 2016 03:08:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=subject:to:references:from:message-id:date:user-agent:mime-version
 :in-reply-to:content-type:content-transfer-encoding;
 bh=NUm0JwKm/mJBhiVeu86eOcwgbGWtFWoH/3GpREZfKdE=;
 b=PEYM7ZHeVTGvKjxkMMzy8nQvoS4OW03PphAYeOTP1QpvnpQBfDKa/czCrjwtSf+X3c
 kwWRF65JAHOaKph626vZ+TsXKO2+KiXaKW56D2O4BtyOqCsLp3oKL49gC5OzWk+WkBY8
 4540mfF7/3DIdPnDH6LJrl1UOIee2JcouXSRBWyU3gviiafOArzN+Na7tWrHnw4LnWuv
 MLvELLXqBBWVioWj8b9E2z7KqlQCde7qxx/I3ptNLR9sVJeuofQ/hkOZg3fTBR60DVTO
 TeB+PFnHSS0kQrDddqfbo2FHtSMfjPkCA2VWOKbrf9Nh5uV3D6OnZeff8NL9H6FHGq41
 NkEQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20130820;
 h=x-gm-message-state:subject:to:references:from:message-id:date
 :user-agent:mime-version:in-reply-to:content-type
 :content-transfer-encoding;
 bh=NUm0JwKm/mJBhiVeu86eOcwgbGWtFWoH/3GpREZfKdE=;
 b=KrqTod6NArdEe0jNeJ8oxj58x2Bg641ou/RXPX18rBo/CxrKVUN9Xb9UfPQ7VODqzt
 lCxiqXHLQ+iU1tlB7RrhB76O6tJk2L6zL35lNQdSvZfZKTz+0Al4z3Vw0b9ELdry8yhU
 Vqf5WUuwAxyrFVSemMRhzinjQF/8/m4iyIGXMABp4ME6zR21ib5LS1/5wXCcx/Nt97Et
 zRoXWIs3/NhWyGjSuIbcDJOQr2+aEih+9PHyWiVZkLiv8i40Zm9EB8FtaeKLfY8dQCGS
 39u3adZFq/9RWMRLooeREqzxebzoSFnB0UXnezsAP7VZBDfRmMR5C7hSF6UzLj6nUf/q
 WU1Q==
X-Gm-Message-State: AG10YOT3G1SUAWvyKaa7HOBF2R1hhqBo4rwTlKxgvPVSsc97P/pysj0Bzpr3ffiPzplHtw==
X-Received: by 10.194.90.137 with SMTP id bw9mr38226477wjb.120.1456312113960; 
 Wed, 24 Feb 2016 03:08:33 -0800 (PST)
Received: from [192.168.1.10] (ANice-654-1-54-54.w83-201.abo.wanadoo.fr.
 [83.201.225.54])
 by smtp.googlemail.com with ESMTPSA id k8sm2457763wjr.38.2016.02.24.03.08.32
 for <tor-talk@lists.torproject.org>
 (version=TLSv1/SSLv3 cipher=OTHER);
 Wed, 24 Feb 2016 03:08:33 -0800 (PST)
To: tor-talk@lists.torproject.org
References: <56CB7795.7040501@witmond.nl> <56CC3191.1000402@beroal.in.ua>
 <56CCA590.5020506@witmond.nl> <56CCAA26.8070609@beroal.in.ua>
 <56CCC954.6080102@witmond.nl>
 <CAB7TAMmRBgO2FPvV8rpW7ZaWZ14hbvQ_3NZyhENi4bN1aKDBuw@mail.gmail.com>
 <56CCE201.7070706@witmond.nl>
 <CAB7TAM=kJZG=8eEka2sNBjyh-T7omJ7B1oBga--eDej6F_1-=A@mail.gmail.com>
From: Aymeric Vitte <vitteaymeric@gmail.com>
X-Enigmail-Draft-Status: N1110
Message-ID: <56CD8F34.4090801@gmail.com>
Date: Wed, 24 Feb 2016 12:08:36 +0100
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:38.0) Gecko/20100101
 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <CAB7TAM=kJZG=8eEka2sNBjyh-T7omJ7B1oBga--eDej6F_1-=A@mail.gmail.com>
Subject: Re: [tor-talk] Tor for everyone;
	introducing Eccentric Authentication
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

I am not sure neither to understand the interest of the system.

Why should it be better than systems such as Namecoin?

Why this (umpteenth) concept of discussing using hidden services
(unlikely to be usable by normal people) on a small network like Tor?

How do you prevent name squatting/spoofing?

Maybe missing something but interested by the problematic, currently
working on https://github.com/Ayms/node-Tor#convergence

Le 24/02/2016 00:22, Allen a =E9crit :
>>
>> Secondly, with the requirement that nickname@sitename.tld to be unique,
>> I could write that nickname on a business card and hand it out. People
>> could verify at a verification service that there is only one
>> certificate (and public key) for that name and be sure to have gotten
>> *my* public key. From that point, they can send encrypted messages to me.
>>
> =

> That's not a service that I would use myself.  If I wanted people to be
> able to get my public key from a business card, I would print the key
> itself on my card using a QR code.  The other stuff you listed also don't
> have much interest to me personally, but I can't speak for anyone else.
> =


-- =

Get the torrent dynamic blocklist: http://peersm.com/getblocklist
Check the 10 M passwords list: http://peersm.com/findmyass
Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms
-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

