[Freedombox-discuss] Announcing Santiago Release Candidate 1
Michael Rauch
l15t at miranet.ch
Sat May 19 13:45:23 UTC 2012
On 05/18/2012 04:35 AM, Nick M. Daly wrote:
> ...
>
> Tor Hidden Services (or other protocols, maybe I2P, GNUnet, etc) can act
> as static IP addresses. So, if I use that to host the FreedomBuddy
> service, my friends will be able to find me, because that location is my
> unchanging, cryptographic identity.
>
> We could stop right here and have no need for the FreedomBuddy service,
> but there's one functional problem: communicating over Tor is really
> slow. So, we can use the FreedomBuddy system to exchange our current IP
> addresses (for any service), and connect directly to one another,
> without going through any sort of proxy. This sort of connection, while
> less anonymous, is usually much faster.
this is really cool! by exposing FreedomBuddy as a Tor Hidden Service
there's no DNS resolution involved for service discovery. to find a
service, the client only needs to know the public key or hash thereof,
which is the .onion address.
would this work together with monkeysphere to connect the ssl-cert to
the gpg-cert and this way allowing verified HTTPS connections?
-michael
> Finally, since we already have a whitelist of permitted users (through
> their PGP keys), you could configure each service to allow only
> whitelisted users to connect.
>
> Nothing in the above is new. However, it's nice to have a standardized
> system behind it, making it more accessible to less technical users.
>
> Nick
>
>
>
> _______________________________________________
> Freedombox-discuss mailing list
> Freedombox-discuss at lists.alioth.debian.org
> http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss
More information about the Freedombox-discuss
mailing list