leaker-optimized versions of Tor

Eugen Leitl eugen at leitl.org
Wed Dec 8 05:17:08 PST 2010


I'm thinking about high-latency (suitable for nonrealtime things
like leaking and email/messaging) anonymity-enhanced versions of Tor.
Delays from hours to days are tolerable here, provided the result
is reliable. 

It would obviously have to be run as a private Tor network, though
perhaps with gateways to Tor and other networks. A fraction
of total nodes should be unlisted bridge relays. It would probably
profit from a botnet-like approach, especially if global scrutiny
increases. It should default to a much larger number of hops, 
introduce random delays and chaffing. Each node should come with 
a hidden service to Tahoe-LAFS or similar. A version should come 
as a convenient and containable virtual appliance, or packaged as 
plug computers.

Comments, other suggestions?

-- 
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE





More information about the cypherpunks-legacy mailing list