Delivery-Date: Tue, 06 Oct 2015 16:04:40 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,BODY_URI_ONLY,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,T_DKIM_INVALID,T_RP_MATCHES_RCVD
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A728D1E108D;
	Tue,  6 Oct 2015 16:04:38 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 368BB37C18;
	Tue,  6 Oct 2015 20:04:35 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 0753E37C0C
 for <tor-talk@lists.torproject.org>; Tue,  6 Oct 2015 20:04:29 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id fiipXbUjXpXV for <tor-talk@lists.torproject.org>;
 Tue,  6 Oct 2015 20:04:28 +0000 (UTC)
Received: from forward2m.mail.yandex.net (forward2m.mail.yandex.net
 [37.140.138.2])
 by eugeni.torproject.org (Postfix) with ESMTP id C2F8137C0B
 for <tor-talk@lists.torproject.org>; Tue,  6 Oct 2015 20:04:28 +0000 (UTC)
X-Greylist: delayed 357 seconds by postgrey-1.34 at eugeni;
 Tue, 06 Oct 2015 20:04:28 UTC
Received: from web12m.yandex.ru (web12m.yandex.ru [37.140.138.103])
 by forward2m.mail.yandex.net (Yandex) with ESMTP id 97AC65CA03BE
 for <tor-talk@lists.torproject.org>; Tue,  6 Oct 2015 22:58:01 +0300 (MSK)
Received: from 127.0.0.1 (localhost [127.0.0.1])
 by web12m.yandex.ru (Yandex) with ESMTP id 25D931F216F8;
 Tue,  6 Oct 2015 22:58:01 +0300 (MSK)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex.ru; s=mail;
 t=1444161481; bh=R7y9UMD3ihmboRk/HaLMQQ9sCFwgRYZyj/cx7V+zQWg=;
 h=From:To:Subject:Date;
 b=qmuxmfBjUOjt//8w4Mp10S4GRDAbwZDdvrOtsmtkzNlF7kDYGTR5F+GtWUc3TGm4J
 J/maPhwQMSmqNfeT6ygQ8iW/rSStw4j6/P9BpRuTx9pai8k946JB3Aaepc5PwTV5nu
 VcbKUN2lbTB6vTg8944wM4gXWFp/5Q7w9obRzwbY=
Received: by web12m.yandex.ru with HTTP;
	Tue, 06 Oct 2015 22:58:00 +0300
From: Alex NoName <l8930999l@yandex.ru>
To: tor-talk@lists.torproject.org
MIME-Version: 1.0
Message-Id: <196271444161480@web12m.yandex.ru>
X-Mailer: Yamail [ http://yandex.ru ] 5.0
Date: Tue, 06 Oct 2015 22:58:00 +0300
Subject: [tor-talk] tor + CryptoCoin = TorCoin
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Hello!
I have some ideas to improve tor project and I'm not sure that I'm writing in right place. I'm operating a tor exit node for a long time, and I use tor not only on computer but even on my phone. Since I first installed tor browser I feel great improvements in tor network's speed, but exiting in the external sites takes some time because lack of exit nodes. Yeah, I know that it is a problem to operate an exit node. I often receive abuses and spam problems, besides some services doesn't work at all. But today I was thinking about bitcoins and realized that this crypto-coin uses computer power to calculate some hash, the same type of calculation that exit node proceed with every package, but more complicated. May be tor project can use this calculation and power not only for asking people to do so, but to make money on their exit nodes. I suggest to create a new type of crypto-coin as TorCoin and give every exit node an digital account to store those coins. For every tcp session or pack
 age decryption exit node will receive a reward that can be used to buy smth in internal tor's network or even on external one. I think that while digital decentralized payment method is still making their own way into our everyday life, this is great opportunity for tor project to become not only a anonymous way of communication but something more, that will bring more exit nodes to this network and increase speed. And this will make people who operates exit node not to work as enthusiasts but to do it with all the responsibility as it is their main job.
Thanks for your time, this is general concept, I can develop further with technical details if you think that this is good idea and we have to spent more time on it. 
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

