From eugen@leitl.org Wed Dec 8 08:19:55 2010 From: Eugen Leitl To: cypherpunks-legacy@lists.cpunks.org Subject: leaker-optimized versions of Tor Date: Wed, 08 Dec 2010 08:19:55 +0000 Message-ID: <20101208131708.GI9434@leitl.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============7316735447002682237==" --===============7316735447002682237== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit I'm thinking about high-latency (suitable for nonrealtime things like leaking and email/messaging) anonymity-enhanced versions of Tor. Delays from hours to days are tolerable here, provided the result is reliable. It would obviously have to be run as a private Tor network, though perhaps with gateways to Tor and other networks. A fraction of total nodes should be unlisted bridge relays. It would probably profit from a botnet-like approach, especially if global scrutiny increases. It should default to a much larger number of hops, introduce random delays and chaffing. Each node should come with a hidden service to Tahoe-LAFS or similar. A version should come as a convenient and containable virtual appliance, or packaged as plug computers. Comments, other suggestions? -- Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE --===============7316735447002682237==--