[tor-bugs] #6600 [Tor Hidden Services]: Hidden service communications

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri Aug 17 18:41:13 UTC 2012


#6600: Hidden service communications
---------------------------------+------------------------------------------
 Reporter:  mikeperry            |          Owner:     
     Type:  project              |         Status:  new
 Priority:  normal               |      Milestone:     
Component:  Tor Hidden Services  |        Version:     
 Keywords:  SponsorZ-large       |         Parent:     
   Points:                       |   Actualpoints:     
---------------------------------+------------------------------------------

Comment(by aagbsn):

 Replying to [ticket:6600 mikeperry]:
 > Hidden services don't have to be just for publishing. They are arbitrary
 communication endpoints.
 >
 > We could prototype hidden service-based chat and email by bundling local
 XMPP and SMTP servers for use with Tails.
 >
 > Client software developed for #6583 could then be used almost as-is to
 communicate with other hidden service endpoints.
 >
 > The benefits of hidden service communications are that you do not reveal
 your social graph to the network or even to any centralized chat or email
 infrastructure, and you get end-to-end encryption and authentication for
 free.

 And file transfer will work without proxies. Secure, single-click file
 transfer that 'just works' would be a nice feature.
 >
 > The key things that makes this a large project are that we need solid
 integration with client software, and the XMPP and SMTP servers have to
 "just work" right out of the box. If this integration and deployment is
 not seamless, almost no one will use hidden services this way, and the few
 who manage to do so will not have anyone to communicate with.

 Can other XMPP operators be persuaded to install Tor and federate with
 .onion? SMTP? Can Tor2Web make this happen transparently?

 And is there a good way to exchange contact information? On a platform
 like Android you can use QR-codes to exchange mostly unmemorable usernames
 (assuming that it's something like username at mylocal.onion), but the
 desktop experience will probably be more cumbersome.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6600#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list