Delivery-Date: Mon, 28 Jul 2014 08:26:57 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 010AC1E0A62
	for <archiver@seul.org>; Mon, 28 Jul 2014 08:26:56 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id EC05C30633;
	Mon, 28 Jul 2014 12:26:51 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5F18E30620
 for <tor-talk@lists.torproject.org>; Mon, 28 Jul 2014 12:16:09 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 59Q8DCZrzGt4 for <tor-talk@lists.torproject.org>;
 Mon, 28 Jul 2014 12:16:09 +0000 (UTC)
Received: from orcus.persephoneslair.org (tor.persephoneslair.org
 [IPv6:2605:2700:0:17::4713:9bbb])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "mail.persephoneslair.org",
 Issuer "persephoneslair.org CA (RSA-4096)" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 31618305C9
 for <tor-talk@lists.torproject.org>; Mon, 28 Jul 2014 12:16:09 +0000 (UTC)
Received: from dysnomia.persephoneslair.org ([85.182.164.202])
 by orcus.persephoneslair.org (8.14.7/8.14.7) with ESMTP id s6SCG39i020536
 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK)
 for <tor-talk@lists.torproject.org>; Mon, 28 Jul 2014 05:16:05 -0700
Received: (from andrea@localhost)
 by dysnomia.persephoneslair.org (8.14.7/8.14.7/Submit) id s6SCFv7J013513
 for tor-talk@lists.torproject.org; Mon, 28 Jul 2014 05:15:57 -0700
Date: Mon, 28 Jul 2014 05:15:57 -0700
From: Andrea Shepard <andrea@torproject.org>
To: tor-talk@lists.torproject.org
Message-ID: <20140728121556.GB13407@dysnomia.persephoneslair.org>
References: <CADop2NF77N7vqYeeCfNSPZyi1qBg8sOT2b=9DVar7qL4minJCg@mail.gmail.com>
 <53D5F18D.1030802@riseup.net>
MIME-Version: 1.0
In-Reply-To: <53D5F18D.1030802@riseup.net>
User-Agent: Mutt/1.5.21 (2010-09-15)
Subject: Re: [tor-talk] What are use cases made unpleasant by Tor's speed?
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1034130989932289579=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>


--===============1034130989932289579==
Content-Type: multipart/signed; micalg=pgp-sha512;
	protocol="application/pgp-signature"; boundary="1LKvkjL3sHcu1TtY"
Content-Disposition: inline


--1LKvkjL3sHcu1TtY
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Jul 28, 2014 at 12:45:33AM -0600, Mirimir wrote:
> On 07/27/2014 09:24 AM, Virgil Griffith wrote:
>=20
> <SNIP>
>=20
> > Any others that come to mind from anyone?
>=20
> I'm very intrigued by possibilities of multiple hidden services with
> fast HS-HS links via Tor. One use case would be the standard
> front-end/back-end website design. Another would be "smart"
> load-balancing proxies, which could detect and foil attacks such as
> DDoS, localization, and so on. Another would be full anonet-style
> darknets, using OnionCat or OpenVPN via Tor.

This might win from authenticated hidden services and then building shorter
circuits, since if the client and HS are controlled by the same person,
then preserving the client's anonymity *from the HS* rather than an
observing third party is less important.

--=20
Andrea Shepard
<andrea@torproject.org>
PGP fingerprint (ECC): BDF5 F867 8A52 4E4A BECF  DE79 A4FF BC34 F01D D536
PGP fingerprint (RSA): 3611 95A4 0740 ED1B 7EA5  DF7E 4191 13D9 D0CF BDA5

--1LKvkjL3sHcu1TtY
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20-ecc (GNU/Linux)
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=Hfrs
-----END PGP SIGNATURE-----

--1LKvkjL3sHcu1TtY--

--===============1034130989932289579==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============1034130989932289579==--

