Delivery-Date: Wed, 17 Sep 2014 17:05:11 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 243891E0AB8;
	Wed, 17 Sep 2014 17:05:10 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 130402D129;
	Wed, 17 Sep 2014 21:05:03 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9CD852CCF9
 for <tor-talk@lists.torproject.org>; Wed, 17 Sep 2014 21:04:59 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id 2F7vt8lh8fuO for <tor-talk@lists.torproject.org>;
 Wed, 17 Sep 2014 21:04:59 +0000 (UTC)
Received: from mail.bitmessage.ch (mail.bitmessage.ch [146.228.112.252])
 by eugeni.torproject.org (Postfix) with SMTP id 3694526865
 for <tor-talk@lists.torproject.org>; Wed, 17 Sep 2014 21:04:58 +0000 (UTC)
dkim-signature: v=1; a=rsa-sha256; d=bitmessage.ch; s=mail;
 c=relaxed/relaxed; q=dns/txt;
 h=From:Subject:Date:Message-ID:To:MIME-Version:Content-Type:Content-Transfer-Encoding;
 bh=bVdHOZAWcxc+fLUYFKlhrrku/775SvSrbubf3Ll0sA0=;
 b=Res4SjHZ+uMjmRi9JWFNg4BioKqa4RCstOB+bycpFJ6DTPvxoEagUbhEdy0qmLf+USu7xk+fxMmyAV/2gmVyV4xp6F0BhBkpDl9kK/2VNKaTfWYfJ8o7QFACPrtXYcjeWGIB3R75iG9BvVMMviBfJNoZ9g4eW9F1qxU0FUViDuQ=
Received: from bitmailendavkbec.onion (BITMESSAGE [127.0.0.1])
 by mail.bitmessage.ch ; Wed, 17 Sep 2014 23:04:38 +0200
X-Squirrel-UserHash: BiRDVQY7AmxBcHdjACEbPlZaKU1AdAJlCg4FFyk7NmtVSglQMikMDhEDFl1DWVZQagoG
X-Squirrel-FromHash: cw9eV1VeQx8=
Message-ID: <156b8eed2e9dc784c15c238afc028330.squirrel@bitmailendavkbec.onion>
Date: Wed, 17 Sep 2014 14:04:38 -0700
From: BM-2cUqBqHFVDHuY34ZcpL3PNgkpLUEEer8ev@bitmessage.ch
To: tor-talk@lists.torproject.org
User-Agent: SquirrelMail/1.4.22
MIME-Version: 1.0
X-Priority: 3 (Normal)
Importance: Normal
Subject: [tor-talk] wake up tor devs
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Why is Tor wasting time in implementing secure hidden services? Why not
copy from here if they are doing it right:

Tor	I2P
Cell	Message
Client	Router or Client
Circuit	Tunnel
Directory	NetDb
Directory Server	Floodfill Router
Entry Guards	Fast Peers
Entry Node	Inproxy
Exit Node	Outproxy
Hidden Service	Eepsite or Destination
Hidden Service Descriptor	LeaseSet
Introduction point	Inbound Gateway
Node	Router
Onion Proxy	I2PTunnel Client (more or less)
Relay	Router
Rendezvous Point	somewhat like Inbound Gateway + Outbound Endpoint
Router Descriptor	RouterInfo
Server	Router

Why not distributed directory authorities and hardcoded?

Why not secure tunnels independent of guards?

Or does Tor want to remain less secure?


-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

