Greetings, I use the Tor hidden services features in txtorcon that Meejah and I worked on... It's a Tor controller API for Twisted Python applications. In some cases existing Twisted applications can use our Twisted Tor hidden service endpoint and parser without modifying a single line of code. Here's a powerful one-liner that reuses the Twisted webserver in a new way to service HTTP requests over a Tor hidden service: pip install txtorcon && twistd -n web --port "onion:80" --path ~/public_html you can read more about txtorcon here: http://timaq4ygg2iegci7.onion/ http://txtorcon.readthedocs.org/en/latest/ https://github.com/meejah/txtorcon You might also like the "pastebin" feature of carml: https://github.com/meejah/carml Of course txtorcon is not the only Tor controller API for python. There is also Stem which I believe has similar features that allow you to create Tor hidden services for non-Twisted python apps. Read more about it here: https://stem.torproject.org/ btw if you read the Tor Weekly News then you would have heard about these things =-) If you need verified end-to-end crypto and reliability of data storage then I'd suggest combining Tahoe-LAFS with Tor hidden services. I occasionally organize cryptoparty workshops on using Tahoe-LAFS with Tor hidden services. I can go into great detail about this if anyone is interested. Sincerely, David On Sat, Feb 7, 2015 at 10:52 AM, stef <s@ctrlc.hu> wrote:
On Thu, Feb 05, 2015 at 02:45:54PM +0200, Александр wrote:
https://github.com/micahflee/onionshare https://onionshare.org/
Well, it's too "young", but it's OpenSource and the idea is good. any thoughts?
reminds me of my: https://github.com/stef/stash/ micah has this habit of reimplementing stuff, but then maybe this is more mature or "userfriendly" than mine which i have never really used.
-- otr fp: https://www.ctrlc.hu/~stef/otr.txt