[Freedombox-discuss] Announcing Santiago Release Candidate 1

Michael Rauch l15t at miranet.ch
Sat May 19 13:45:23 UTC 2012

On 05/18/2012 04:35 AM, Nick M. Daly wrote:
> ...
> Tor Hidden Services (or other protocols, maybe I2P, GNUnet, etc) can act
> as static IP addresses.  So, if I use that to host the FreedomBuddy
> service, my friends will be able to find me, because that location is my
> unchanging, cryptographic identity.
> We could stop right here and have no need for the FreedomBuddy service,
> but there's one functional problem: communicating over Tor is really
> slow.  So, we can use the FreedomBuddy system to exchange our current IP
> addresses (for any service), and connect directly to one another,
> without going through any sort of proxy.  This sort of connection, while
> less anonymous, is usually much faster.

this is really cool! by exposing FreedomBuddy as a Tor Hidden Service 
there's no DNS resolution involved for service discovery. to find a 
service, the client only needs to know the public key or hash thereof, 
which is the .onion address.

would this work together with monkeysphere to connect the ssl-cert to 
the gpg-cert and this way allowing verified HTTPS connections?


> Finally, since we already have a whitelist of permitted users (through
> their PGP keys), you could configure each service to allow only
> whitelisted users to connect.
> Nothing in the above is new.  However, it's nice to have a standardized
> system behind it, making it more accessible to less technical users.
> Nick
> _______________________________________________
> Freedombox-discuss mailing list
> Freedombox-discuss at lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss

More information about the Freedombox-discuss mailing list